Results 41 to 50 of about 21,539 (179)

A fine-tuning of decision tree classifier for ransomware detection based on memory data [PDF]

open access: yesInternational Journal of Data and Network Science
Ransomware has evolved into a pervasive and extremely disruptive cybersecurity threat, causing substantial operational and financial damage to individuals and businesses.
Mosleh M. Abualhaj   +6 more
doaj   +1 more source

An Effective Self-Configurable Ransomware Prevention Technique for IoMT

open access: yesSensors, 2022
Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated ...
Usman Tariq   +3 more
doaj   +1 more source

Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker

open access: yesMathematics
Ransomware is a group of malware that aims to make computing resources unavailable, demanding a ransom amount to return control back to users. Ransomware can be classified into two types: crypto-ransomware and locker ransomware. Crypto-ransomware employs
Xiang Fang   +4 more
doaj   +1 more source

A behavioural in‐depth analysis of ransomware infection

open access: yesIET Information Security, 2021
Ransomware is a type of malware that has spread rapidly over the last 4 years, causing significant damage, especially in Windows environments. It is designed to encrypt or block victim's data, including documents, backups, and databases, unless a ransom ...
Yassine Lemmou   +2 more
doaj   +1 more source

Ransomware through the lens of state crime: Conceptualizing ransomware groups as cyber proxies, pirates, and privateers

open access: yesState Crime, 2023
Cybercrime and other cybersecurity harms are gaining increasing political and public attention across many countries. One of the most serious and fastest growing categories of such harms relates to ransomware attacks.
James Martin, Chad Whelan
doaj   +1 more source

Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]

open access: yes, 2018
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul   +4 more
core   +3 more sources

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier

open access: yesScientific Reports, 2022
Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It’s Zero-day variants are even more hazardous, as less is known about them. In this regard, when used for ransomware attack detection, conventional machine
Umme Zahoora   +5 more
doaj   +1 more source

Ransomware detection based on machine learning models and Event Tracing for Windows

open access: yesБезопасность информационных технологий, 2022
Nowadays ransomware cyberattacks are alarmingly increasing. Ransomware is a form of malicious software that locks users’ files by modifying it or it’s parts. To get the files back the users are supposed to pay ransom. Ransomware are using different types
Artem O. Kalinkin   +3 more
doaj   +1 more source

Ransomware

open access: yes, 2018
This final work talks about who the ransomware works, the regulation regarding to ransomware, how to do the payment and also about the attack suffered in May 2017 by WannaCry.
  +5 more sources

Home - About - Disclaimer - Privacy