Results 51 to 60 of about 21,893 (200)

Ransomware detection based on machine learning models and Event Tracing for Windows

open access: yesБезопасность информационных технологий, 2022
Nowadays ransomware cyberattacks are alarmingly increasing. Ransomware is a form of malicious software that locks users’ files by modifying it or it’s parts. To get the files back the users are supposed to pay ransom. Ransomware are using different types
Artem O. Kalinkin   +3 more
doaj   +1 more source

PROVIDE: hiding from automated network scans with proofs of identity [PDF]

open access: yes, 2016
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core   +3 more sources

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

A cyber-kill-chain based taxonomy of crypto-ransomware features [PDF]

open access: yes, 2019
In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of ransomware families are requesting for a ransom payment to restore a custodian access or decrypt data ...
Benedetto, L   +5 more
core   +2 more sources

An Effective Self-Configurable Ransomware Prevention Technique for IoMT

open access: yesSensors, 2022
Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated ...
Usman Tariq   +3 more
doaj   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

Safeguarding the healthcare sector from ransomware attacks: insights from a literature review [PDF]

open access: yesPeerJ Computer Science
Cybersecurity integrates a broad spectrum of concerns, addressing numerous cyber threats and malicious factors that pose significant risks to the system’s integrity and functionality.
Amna Shahzadi   +7 more
doaj   +2 more sources

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

open access: yesSensors, 2022
Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems.
Abdullah Alqahtani, Frederick T. Sheldon
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy