Results 41 to 50 of about 11,686 (201)
On the Economics of Ransomware
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with
Farhang, Sadegh +2 more
core +1 more source
Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion
Cyber-criminals frequently use crypto-ransomware to gain financial benefit by encrypting victims’ valuable digital assets, such as photos and documents.
Il Hyeon Ju, Huy Kang Kim
doaj +1 more source
Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems
Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to ...
Rana Almohaini +2 more
doaj +1 more source
Ransomware Early Detection Techniques
Ransomware has become a significant threat to individuals and organizations worldwide, causing substantial financial losses and disruptions. Early detection of ransomware is crucial to mitigate its impact. The significance of early detection lies in the capture of ransomware in the act of encrypting sample files, thus thwarting its progression.
Asma A. Alhashmi +5 more
openaire +1 more source
AI-Based Ransomware Detection: A Comprehensive Review
Ransomware attacks are becoming increasingly sophisticated, thereby rendering conventional detection methods less effective. Recognizing this challenge, this study reviews advanced detection mechanisms and explores the potential of artificial ...
Jannatul Ferdous +3 more
doaj +1 more source
Ransomware detection based on machine learning models and Event Tracing for Windows
Nowadays ransomware cyberattacks are alarmingly increasing. Ransomware is a form of malicious software that locks users’ files by modifying it or it’s parts. To get the files back the users are supposed to pay ransom. Ransomware are using different types
Artem O. Kalinkin +3 more
doaj +1 more source
Malware detection techniques for mobile devices
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core +1 more source
The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models
Several supervised machine learning models have been proposed and used to detect Android ransomware. These models were trained using different datasets from different sources.
Qussai M. Yaseen
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Phishing Techniques in Mobile Devices
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core +1 more source

