Results 31 to 40 of about 11,686 (201)

Behaviour Based Ransomware Detection

open access: yesEPiC Series in Computing, 2019
Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users and companies, but what is lacking is an easier way to group, and devise practical and easy solutions which every day users can utilise.In this paper we look at the different characteristics of ransomware, and present preventative techniques to tackle ...
Christopher Chew, Vimal Kumar
openaire   +2 more sources

Enhancing File Entropy Analysis to Improve Machine Learning Detection Rate of Ransomware

open access: yesIEEE Access, 2021
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal data on a computer and transmitting it through the Internet. Cybersecurity will be an important issue that everyone continues to pay attention to.
Chia-Ming Hsu   +4 more
doaj   +1 more source

Ransomware and reputation [PDF]

open access: yes, 2019
open access articleRansomware is a particular form of cyber-attack in which a victim loses access to either his electronic device or files unless he pays a ransom to criminals.
Anna Cartwright   +8 more
core   +2 more sources

Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection

open access: yesIEEE Access, 2022
Among the prevalent cyberattacks on Android devices, a ransomware attack is the most common and damaging. Although there are many solutions for detecting Android ransomware attacks, existing solutions have limited detection accuracy and high ...
Md. Sakir Hossain   +7 more
doaj   +1 more source

Ransomware in High-Risk Environments [PDF]

open access: yes, 2016
In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems.
Aziz, Shallaw M
core   +5 more sources

CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]

open access: yes, 2018
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core   +3 more sources

A Survey on Ransomware Malware and Ransomware Detection Techniques

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: is a kind of malignant programming (malware) that takes steps to distribute or hinders admittance to information or a PC framework, for the most part by scrambling it, until the casualty pays a payoff expense to the assailant. As a rule, the payoff request accompanies a cutoff time.
openaire   +1 more source

Ransomware Detection using Process Memory

open access: yesInternational Conference on Cyber Warfare and Security, 2022
Ransomware attacks have increased significantly in recent years, causing great destruction and damage to critical systems and business operations. Attackers are unfailingly finding innovative ways to bypass detection mechanisms, which encouraged the adoption of artificial intelligence.
Singh, Avinash   +2 more
openaire   +3 more sources

Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker

open access: yesMathematics
Ransomware is a group of malware that aims to make computing resources unavailable, demanding a ransom amount to return control back to users. Ransomware can be classified into two types: crypto-ransomware and locker ransomware. Crypto-ransomware employs
Xiang Fang   +4 more
doaj   +1 more source

Deep dive into ransomware threat hunting and intelligence at fog layer [PDF]

open access: yes, 2018
Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data.
Ahmadzadeh, M   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy