Results 21 to 30 of about 11,522 (181)

Early detection of crypto-ransomware using pre-encryption detection algorithm

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Crypto ransomware is a type of malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber security community due to several successful worldwide attacks.
S.H. Kok, Azween Abdullah, NZ Jhanjhi
doaj   +1 more source

Deep dive into ransomware threat hunting and intelligence at fog layer [PDF]

open access: yes, 2018
Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data.
Ahmadzadeh, M   +6 more
core   +1 more source

CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]

open access: yes, 2018
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core   +3 more sources

Retaliation against Ransomware in Cloud-Enabled PureOS System

open access: yesMathematics, 2023
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades.
Atef Ibrahim   +4 more
doaj   +1 more source

The Evolution of Embedding Metadata in Blockchain Transactions [PDF]

open access: yes, 2018
The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations.
Courtois, Nicolas   +2 more
core   +2 more sources

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Open Repository for the Evaluation of Ransomware Detection Tools

open access: yesIEEE Access, 2020
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied
Eduardo Berrueta   +3 more
doaj   +1 more source

Ransomware Detection and Classification Strategies

open access: yes2022 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 2022
9 pages, 2 ...
Vehabovic, Aldin   +4 more
openaire   +2 more sources

Enhancing File Entropy Analysis to Improve Machine Learning Detection Rate of Ransomware

open access: yesIEEE Access, 2021
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal data on a computer and transmitting it through the Internet. Cybersecurity will be an important issue that everyone continues to pay attention to.
Chia-Ming Hsu   +4 more
doaj   +1 more source

Behaviour Based Ransomware Detection

open access: yesEPiC Series in Computing, 2019
Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users and companies, but what is lacking is an easier way to group, and devise practical and easy solutions which every day users can utilise.In this paper we look at the different characteristics of ransomware, and present preventative techniques to tackle ...
Christopher Chew, Vimal Kumar
openaire   +2 more sources

Home - About - Disclaimer - Privacy