Sign Up to like & get
recommendations!
0
Published in 2018 at "ICT Express"
DOI: 10.1016/j.icte.2017.12.007
Abstract: Abstract The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging…
read more here.
Keywords:
multi stage;
critical infrastructure;
industrial control;
ransomware ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3023764
Abstract: In recent times, ransomware has become the most significant cyber-attack targeting individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing security systems like Intrusion Detection and Prevention System (IDPS) and Anti-virus (AV) as…
read more here.
Keywords:
using social;
detection honeypot;
ransomware;
intrusion detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3181278
Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.…
read more here.
Keywords:
threat hunting;
cyber threat;
ransomware attacks;
ransomware ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3207757
Abstract: In recent years, there has been an increase in ransomware attacks worldwide. These attacks aim to lock victims’ machines or encrypt their files for ransom. These kinds of ransomware differ in their implementation and techniques,…
read more here.
Keywords:
ransomware;
analysis;
source codes;
conti ransomware ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3268535
Abstract: The proliferation of ransomware has become a significant threat to cybersecurity in recent years, causing significant financial, reputational, and operational damage to individuals and organizations. This paper aims to provide a comprehensive overview of the…
read more here.
Keywords:
machine learning;
age ransomware;
survey;
ransomware ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3209687
Abstract: Connected vehicle technology is rapidly evolving. In the U.S., the government targets that 50% of all vehicles be electric by 2030 in order to reduce climate change. This initiative comes in the wake of an…
read more here.
Keywords:
business impact;
novel framework;
vehicle;
impact ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IT Professional"
DOI: 10.1109/mitp.2022.3157208
Abstract: Ransomware attacks are growing rapidly. In this paper, the authors look at different types of costs to victims of such attacks.
read more here.
Keywords:
ransomware;
ransomware business;
business raab;
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2022.3208795
Abstract: Ransomware is a type of malicious program or software that encrypts the contents on a hard disc and prevents the users from accessing them unless they pay an amount (called a ransom). Most of the…
read more here.
Keywords:
bsfr;
security;
smart healthcare;
ransomware attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2020.3005976
Abstract: The scale of ransomware attacks increases every year, and so does its cost, which has reached billions of dollars. A specific class of ransomware, called crypto ransomware, encrypts data of the victims for monetary gain.…
read more here.
Keywords:
encryption;
encryption key;
analysis;
crypto ransomware ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3214781
Abstract: Encryption has become an indispensable technology for preserving confidentiality. Unfortunately, cybercriminals have re-purposed this technology to deny users access to their data. This trend has sparked an onslaught of ransomware attacks, that resulted in several…
read more here.
Keywords:
seamlessly safeguarding;
safeguarding data;
maliciously encrypted;
encrypted data ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2017.2787905
Abstract: In recent years, we witnessed a drastic increase of ransomware, especially on popular mobile platforms including Android. Ransomware extorts victims for a sum of money by taking control of their devices or files. In light…
read more here.
Keywords:
android ransomware;
time detection;
ransomware;
real time ... See more keywords