Results 41 to 50 of about 21,539 (179)
A fine-tuning of decision tree classifier for ransomware detection based on memory data [PDF]
Ransomware has evolved into a pervasive and extremely disruptive cybersecurity threat, causing substantial operational and financial damage to individuals and businesses.
Mosleh M. Abualhaj +6 more
doaj +1 more source
An Effective Self-Configurable Ransomware Prevention Technique for IoMT
Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated ...
Usman Tariq +3 more
doaj +1 more source
Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker
Ransomware is a group of malware that aims to make computing resources unavailable, demanding a ransom amount to return control back to users. Ransomware can be classified into two types: crypto-ransomware and locker ransomware. Crypto-ransomware employs
Xiang Fang +4 more
doaj +1 more source
A behavioural in‐depth analysis of ransomware infection
Ransomware is a type of malware that has spread rapidly over the last 4 years, causing significant damage, especially in Windows environments. It is designed to encrypt or block victim's data, including documents, backups, and databases, unless a ransom ...
Yassine Lemmou +2 more
doaj +1 more source
Cybercrime and other cybersecurity harms are gaining increasing political and public attention across many countries. One of the most serious and fastest growing categories of such harms relates to ransomware attacks.
James Martin, Chad Whelan
doaj +1 more source
Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul +4 more
core +3 more sources
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It’s Zero-day variants are even more hazardous, as less is known about them. In this regard, when used for ransomware attack detection, conventional machine
Umme Zahoora +5 more
doaj +1 more source
Ransomware detection based on machine learning models and Event Tracing for Windows
Nowadays ransomware cyberattacks are alarmingly increasing. Ransomware is a form of malicious software that locks users’ files by modifying it or it’s parts. To get the files back the users are supposed to pay ransom. Ransomware are using different types
Artem O. Kalinkin +3 more
doaj +1 more source
This final work talks about who the ransomware works, the regulation regarding to ransomware, how to do the payment and also about the attack suffered in May 2017 by WannaCry.
+5 more sources

