Results 21 to 30 of about 11,686 (201)

Early detection of crypto-ransomware using pre-encryption detection algorithm

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Crypto ransomware is a type of malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber security community due to several successful worldwide attacks.
S.H. Kok, Azween Abdullah, NZ Jhanjhi
doaj   +1 more source

Retaliation against Ransomware in Cloud-Enabled PureOS System

open access: yesMathematics, 2023
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades.
Atef Ibrahim   +4 more
doaj   +1 more source

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]

open access: yes, 2020
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M   +4 more
core   +2 more sources

Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence [PDF]

open access: yes, 2017
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access by ...
Ahmadzadeh, M.   +4 more
core   +2 more sources

Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Broadly speaking an individual can invest time and effort to avoid becoming victim to a cyber attack and/or
A Cartwright   +19 more
core   +2 more sources

Ransomware Detection and Classification Strategies

open access: yes2022 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 2022
9 pages, 2 ...
Vehabovic, Aldin   +4 more
openaire   +2 more sources

A fine-tuning of decision tree classifier for ransomware detection based on memory data [PDF]

open access: yesInternational Journal of Data and Network Science
Ransomware has evolved into a pervasive and extremely disruptive cybersecurity threat, causing substantial operational and financial damage to individuals and businesses.
Mosleh M. Abualhaj   +6 more
doaj   +1 more source

Open Repository for the Evaluation of Ransomware Detection Tools

open access: yesIEEE Access, 2020
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied
Eduardo Berrueta   +3 more
doaj   +1 more source

To pay or not: game theoretic models of ransomware [PDF]

open access: yes, 2019
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August   +38 more
core   +1 more source

Home - About - Disclaimer - Privacy