Articles with "crypto ransomware" as a keyword



Photo by arthurbizkit from unsplash

A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3012674

Abstract: The cryptography employed against user files makes the effect of crypto-ransomware attacks irreversible even after detection and removal. Thus, detecting such attacks early, i.e. during pre-encryption phase before the encryption takes place is necessary. Existing… read more here.

Keywords: phase; crypto ransomware; pre encryption; encryption ... See more keywords
Photo by dawson2406 from unsplash

Analysis of Encryption Key Generation in Modern Crypto Ransomware

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3005976

Abstract: The scale of ransomware attacks increases every year, and so does its cost, which has reached billions of dollars. A specific class of ransomware, called crypto ransomware, encrypts data of the victims for monetary gain.… read more here.

Keywords: encryption; encryption key; analysis; crypto ransomware ... See more keywords
Photo by thinkmagically from unsplash

Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Integrated Engineering"

DOI: 10.30880/ijie.2018.10.06.011

Abstract: Crypto-ransomware employs the cryptography to lock user personal files and demands ransom to release them. By utilizing several technological utilities like cyber-currency and cloud-based developing platforms, crypto-ransomware has gained high popularity among adversaries. Motivated by… read more here.

Keywords: detection; crypto ransomware; model; rate ... See more keywords
Photo from wikipedia

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24101503

Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by the attacker until a ransom demand is met.… read more here.

Keywords: identification; entropy; entropy calculation; crypto ransomware ... See more keywords