Results 51 to 60 of about 1,242 (180)
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok +3 more
doaj +1 more source
A Comparative Assessment of Obfuscated Ransomware Detection Methods [PDF]
Ransomware represents a class of malicious applications that encrypts the files of infected system and demands from victims a payment in cryptocurrency in order to receive the decryption key.
Sergiu SECHEL
doaj +1 more source
SDN-Based Detection of Self-Propagating Ransomware: The Case of BadRabbit
In the last decade, many ransomware attacks had the ability to spread within local networks or even outside them. At the same time, software defined networking (SDN) has provided a major boost to networks by transferring intelligence from network devices
Fahad M. Alotaibi +1 more
doaj +1 more source
The dynamics of criminal collaboration: Multiplex ties in mafia networks
Abstract This study examines how social embeddedness and multiplex relationships shape criminal collaboration within organized crime networks. Drawing on data from three major investigations into the ‘Ndrangheta, we analyze how kinship, clan affiliation, leadership, and prior interactions influence participation in meetings and phone calls.
Francesco Calderoni +2 more
wiley +1 more source
A Wide and Weighted Deep Ensemble Model for Behavioral Drifting Ransomware Attacks
Ransomware is a type of malware that leverages encryption to execute its attacks. Its continuous evolution underscores its dynamic and ever-changing nature.
Umara Urooj +7 more
doaj +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems
With the advent of big data and cloud services, user data has become an important issue. Although a variety of detection and prevention technologies are used to protect user data, ransomware that demands money in exchange for one's data has emerged.
Kyungroul Lee +2 more
doaj +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
Resilient IT: Winning With People and Process
ABSTRACT In today's dynamic environment, IT organisations face numerous challenges from disruptions such as natural disasters, cybersecurity threats, international conflicts, evolving regulations, pandemics and recent global incidents such as the CrowdStrike outage.
Wesam Helou +2 more
wiley +1 more source
Android Ransomware and Its Detection Methods
Ransom ware is the most dangerous malware which locks the entire system data (files/folders) of user and demands ransom form user in order to decrypt data. Ransomware attacks are increasing day by day. Mobile phones are used not only for communication purpose but users also store their personal data and many other things in their mobile phone.
Manish Kaushik* +2 more
openaire +1 more source

