Results 11 to 20 of about 11,522 (181)

On the classification of Microsoft-Windows ransomware using hardware profile [PDF]

open access: yesPeerJ Computer Science, 2021
Due to the expeditious inclination of online services usage, the incidents of ransomware proliferation being reported are on the rise. Ransomware is a more hazardous threat than other malware as the victim of ransomware cannot regain access to the ...
Sana Aurangzeb   +4 more
doaj   +2 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

open access: yesIEEE Access, 2022
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.
Fatimah Aldauiji   +2 more
doaj   +1 more source

Cryptographic ransomware encryption detection: Survey

open access: yesComputers & Security, 2023
The ransomware threat has loomed over our digital life since 1989. Criminals use this type of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts in ransom. The damage ransomware causes ranges from monetary losses paid for ransom at best to endangering human lives.
Kenan, Begovic   +2 more
openaire   +4 more sources

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

open access: yesSensors, 2022
Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems.
Abdullah Alqahtani, Frederick T. Sheldon
doaj   +1 more source

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks

open access: yesIEEE Access, 2020
In recent times, ransomware has become the most significant cyber-attack targeting individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing security systems like Intrusion Detection and Prevention System (IDPS) and Anti-
S. Sibi Chakkaravarthy   +4 more
doaj   +1 more source

Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence [PDF]

open access: yes, 2017
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access by ...
Ahmadzadeh, M.   +4 more
core   +2 more sources

Detection of Ransomware Attacks Using Processor and Disk Usage Data

open access: yesIEEE Access, 2023
Ransomware often evades antivirus tools, encrypts files, and renders the target computer and its data unusable. The current approaches to detect such ransomware include monitoring processes, system calls, and file activities on the target system and ...
Kumar Thummapudi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy