Results 61 to 70 of about 21,893 (200)

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection

open access: yesIEEE Access, 2022
Among the prevalent cyberattacks on Android devices, a ransomware attack is the most common and damaging. Although there are many solutions for detecting Android ransomware attacks, existing solutions have limited detection accuracy and high ...
Md. Sakir Hossain   +7 more
doaj   +1 more source

Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence [PDF]

open access: yes, 2017
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access by ...
Ahmadzadeh, M.   +4 more
core   +2 more sources

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches

open access: yesSensors, 2023
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In recent years various malware detection and classification approaches have been proposed to analyze and explore malicious software precisely.
Iman Almomani   +2 more
doaj   +1 more source

Community-Based Security for the Internet of Things

open access: yes, 2018
With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized ...
Börgers   +12 more
core   +1 more source

The dynamics of criminal collaboration: Multiplex ties in mafia networks

open access: yesCriminology, EarlyView.
Abstract This study examines how social embeddedness and multiplex relationships shape criminal collaboration within organized crime networks. Drawing on data from three major investigations into the ‘Ndrangheta, we analyze how kinship, clan affiliation, leadership, and prior interactions influence participation in meetings and phone calls.
Francesco Calderoni   +2 more
wiley   +1 more source

Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion

open access: yesIEEE Access
Cyber-criminals frequently use crypto-ransomware to gain financial benefit by encrypting victims’ valuable digital assets, such as photos and documents.
Il Hyeon Ju, Huy Kang Kim
doaj   +1 more source

Dynamics of Targeted Ransomware Negotiation

open access: yesIEEE Access, 2022
In this paper, we consider how the development of targeted ransomware has affected the dynamics of ransomware negotiations to better understand how to respond to ransomware attacks.
Pierce Ryan   +3 more
doaj   +1 more source

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

Home - About - Disclaimer - Privacy