A novel technique for ransomware detection using image based dynamic features and transfer learning to address dataset limitations. [PDF]
Ferdous J +3 more
europepmc +1 more source
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring. [PDF]
Gómez-Hernández JA, García-Teodoro P.
europepmc +1 more source
DETECTING RANSOMWARE THROUGH POWER ANALYSIS
Cyber criminals are increasingly using malicious programs to take control of and exploit individuals’, businesses’, and governments’ data. A large portion of malware is a type called ransomware, which finds a way to restrict the infected user’s access to data until a payment is obtained.
openaire +1 more source
Enhancing ransomware detection using Siamese network
Organizations in the current digital era are exposed to a variety of cybersecurity threats that can often result in financial losses and harm to their reputation. Among these threats, ransomware attacks can cause significant damage. Attackers are constantly improving their techniques to bypass security channels, which makes it challenging to monitor ...
openaire +1 more source
Autonomous Ransomware Detection through Deep Ransomware Fingerprint Mapping
Joseph Briser +4 more
openaire +1 more source
Two-Tier heuristic search for ransomware-as-a-service based cyberattack défense analysis using explainable Bayesian deep learning model. [PDF]
Almuflih AS.
europepmc +1 more source
A multi-label visualisation approach for malware behaviour analysis. [PDF]
Uysal DT +4 more
europepmc +1 more source
Cacography based Ransomware Email Phishing Attack Prevention using Language Pack Tuned Transformer Language Model. [PDF]
Abiramasundari S, Ramaswamy V.
europepmc +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
HoneyLite: A Lightweight Honeypot Security Solution for SMEs. [PDF]
AlQahtan N +3 more
europepmc +1 more source

