Results 131 to 140 of about 1,242 (180)
A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction. [PDF]
Talukder MA, Khalid M, Sultana N.
europepmc +1 more source
Combatting ransomware in ZephyrOS-activated industrial IoT environments. [PDF]
Tariq U.
europepmc +1 more source
A hierarchical deep learning framework with doubly regularized loss for robust malware detection and family categorization. [PDF]
Abed Alsaedi S +6 more
europepmc +1 more source
AI in Combating Cyber Threats to Indian Pharmaceutical Intellectual Property: Legal Perspectives.
Sharma G +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Ransomware: stages, detection and evasion
2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), 2021Ransomware attacks has been increasing lately with companies suffer monetarily, wasted business opportunity and wasted time. Big companies are now targeted as they are more profitable for ransomware threat actor. This paper discuses on stages of ransomware attacks starting from reconnaissance to extortion.
Yus Kamalrul Bin Mohamed Yunus +1 more
openaire +1 more source
Detecting Ransomware using GURLS
2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC), 2018Ransomware is a malware, which upon execution scrambles the framework and it denies the client from accessing the data until the point when a payoff sum is not met from the victim. Recently, this kind of malware has shown a massive growth and had affected nearly 100 nations around the globe.
N.B Harikrishnan, K.P Soman
openaire +1 more source
Extinguishing ransomware - a hybrid approach to android ransomware detection
2018Mobile ransomware is on the rise and effective defense from it is of utmost importance to guarantee security of mobile users’ data. Current solutions provided by antimalware vendors are signature-based and thus ineffective in removing ransomware and restoring the infected devices and files.
Ferrante A +5 more
openaire +3 more sources
Ransomware Detection and Defense
International Journal for Electronic Crime Investigation, 2019Like other criminals in world, cyber-criminals are using different illegal and unethical ways to gain their mischievous purposes. Malware known as Ransomware is a new threat to world used by cyber hackers to blackmail individuals and organizations and has been identified as a major threat to network and computer security across the world [1 ...
openaire +1 more source
2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2019
Ransomware poses a major threat to information integrity and availability. This type of malware will encrypt files on infected computers and demand ransom in return to restoring access. These scale to companies and institutions with devastating consequences. The goal of this paper is to propose a solution based on low cost hardware that will serve as a
Cristian Pascariu, Ionut-Daniel Barbu
openaire +1 more source
Ransomware poses a major threat to information integrity and availability. This type of malware will encrypt files on infected computers and demand ransom in return to restoring access. These scale to companies and institutions with devastating consequences. The goal of this paper is to propose a solution based on low cost hardware that will serve as a
Cristian Pascariu, Ionut-Daniel Barbu
openaire +1 more source

