Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3012674
Abstract: The cryptography employed against user files makes the effect of crypto-ransomware attacks irreversible even after detection and removal. Thus, detecting such attacks early, i.e. during pre-encryption phase before the encryption takes place is necessary. Existing…
read more here.
Keywords:
phase;
crypto ransomware;
pre encryption;
encryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2020.3005976
Abstract: The scale of ransomware attacks increases every year, and so does its cost, which has reached billions of dollars. A specific class of ransomware, called crypto ransomware, encrypts data of the victims for monetary gain.…
read more here.
Keywords:
encryption;
encryption key;
analysis;
crypto ransomware ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Integrated Engineering"
DOI: 10.30880/ijie.2018.10.06.011
Abstract: Crypto-ransomware employs the cryptography to lock user personal files and demands ransom to release them. By utilizing several technological utilities like cyber-currency and cloud-based developing platforms, crypto-ransomware has gained high popularity among adversaries. Motivated by…
read more here.
Keywords:
detection;
crypto ransomware;
model;
rate ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24101503
Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by the attacker until a ransom demand is met.…
read more here.
Keywords:
identification;
entropy;
entropy calculation;
crypto ransomware ... See more keywords