Results 51 to 60 of about 21,539 (179)

Unveiling evasive ransomware and breaking through the predicament: a comprehensive review of evasion techniques and defense mechanisms

open access: yesCybersecurity
Ransomware has become one of the most destructive cyberattacks worldwide in recent years and has caused billions of dollars. Numerous defense mechanisms have been proposed to mitigate the ransomware threat.
Lingbo Zhao   +3 more
doaj   +1 more source

The social and legislative principles of counteracting ransomware crime

open access: yesEntrepreneurship and Sustainability Issues, 2020
This article aims to analyze the relationship between the threat of ransomware and new effective counteraction principles for law enforcement agencies to utilize. Moreover, it contemplates on how specific behavior of persons can help reduce the threat of
Mafura Uandykova   +6 more
doaj   +1 more source

Safeguarding the healthcare sector from ransomware attacks: insights from a literature review [PDF]

open access: yesPeerJ Computer Science
Cybersecurity integrates a broad spectrum of concerns, addressing numerous cyber threats and malicious factors that pose significant risks to the system’s integrity and functionality.
Amna Shahzadi   +7 more
doaj   +2 more sources

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks

open access: yesIEEE Access, 2020
In recent times, ransomware has become the most significant cyber-attack targeting individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing security systems like Intrusion Detection and Prevention System (IDPS) and Anti-
S. Sibi Chakkaravarthy   +4 more
doaj   +1 more source

Early detection of crypto-ransomware using pre-encryption detection algorithm

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Crypto ransomware is a type of malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber security community due to several successful worldwide attacks.
S.H. Kok, Azween Abdullah, NZ Jhanjhi
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches

open access: yesSensors, 2023
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In recent years various malware detection and classification approaches have been proposed to analyze and explore malicious software precisely.
Iman Almomani   +2 more
doaj   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

open access: yesSensors, 2022
Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems.
Abdullah Alqahtani, Frederick T. Sheldon
doaj   +1 more source

Home - About - Disclaimer - Privacy