Results 61 to 70 of about 21,893 (200)
Detecting Android Locker-Ransomware on Chinese Social Networks
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su +3 more
doaj +1 more source
Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection
Among the prevalent cyberattacks on Android devices, a ransomware attack is the most common and damaging. Although there are many solutions for detecting Android ransomware attacks, existing solutions have limited detection accuracy and high ...
Md. Sakir Hossain +7 more
doaj +1 more source
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence [PDF]
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access by ...
Ahmadzadeh, M. +4 more
core +2 more sources
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In recent years various malware detection and classification approaches have been proposed to analyze and explore malicious software precisely.
Iman Almomani +2 more
doaj +1 more source
Community-Based Security for the Internet of Things
With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized ...
Börgers +12 more
core +1 more source
The dynamics of criminal collaboration: Multiplex ties in mafia networks
Abstract This study examines how social embeddedness and multiplex relationships shape criminal collaboration within organized crime networks. Drawing on data from three major investigations into the ‘Ndrangheta, we analyze how kinship, clan affiliation, leadership, and prior interactions influence participation in meetings and phone calls.
Francesco Calderoni +2 more
wiley +1 more source
Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion
Cyber-criminals frequently use crypto-ransomware to gain financial benefit by encrypting victims’ valuable digital assets, such as photos and documents.
Il Hyeon Ju, Huy Kang Kim
doaj +1 more source
Dynamics of Targeted Ransomware Negotiation
In this paper, we consider how the development of targeted ransomware has affected the dynamics of ransomware negotiations to better understand how to respond to ransomware attacks.
Pierce Ryan +3 more
doaj +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source

