Articles with "ransomware" as a keyword



Photo by worldsbetweenlines from unsplash

Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

Sign Up to like & get
recommendations!
Published in 2018 at "ICT Express"

DOI: 10.1016/j.icte.2017.12.007

Abstract: Abstract The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging… read more here.

Keywords: multi stage; critical infrastructure; industrial control; ransomware ... See more keywords
Photo by karsten116 from unsplash

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3023764

Abstract: In recent times, ransomware has become the most significant cyber-attack targeting individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing security systems like Intrusion Detection and Prevention System (IDPS) and Anti-virus (AV) as… read more here.

Keywords: using social; detection honeypot; ransomware; intrusion detection ... See more keywords
Photo by sebastianpoc from unsplash

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181278

Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.… read more here.

Keywords: threat hunting; cyber threat; ransomware attacks; ransomware ... See more keywords
Photo by dawson2406 from unsplash

An Analysis of Conti Ransomware Leaked Source Codes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3207757

Abstract: In recent years, there has been an increase in ransomware attacks worldwide. These attacks aim to lock victims’ machines or encrypt their files for ransom. These kinds of ransomware differ in their implementation and techniques,… read more here.

Keywords: ransomware; analysis; source codes; conti ransomware ... See more keywords
Photo from wikipedia

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3268535

Abstract: The proliferation of ransomware has become a significant threat to cybersecurity in recent years, causing significant financial, reputational, and operational damage to individuals and organizations. This paper aims to provide a comprehensive overview of the… read more here.

Keywords: machine learning; age ransomware; survey; ransomware ... See more keywords
Photo by andrewtneel from unsplash

A Novel Framework for Studying the Business Impact of Ransomware on Connected Vehicles

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3209687

Abstract: Connected vehicle technology is rapidly evolving. In the U.S., the government targets that 50% of all vehicles be electric by 2030 in order to reduce climate change. This initiative comes in the wake of an… read more here.

Keywords: business impact; novel framework; vehicle; impact ... See more keywords
Photo by andrewtneel from unsplash

Ransomware as a Business (RaaB)

Sign Up to like & get
recommendations!
Published in 2022 at "IT Professional"

DOI: 10.1109/mitp.2022.3157208

Abstract: Ransomware attacks are growing rapidly. In this paper, the authors look at different types of costs to victims of such attacks. read more here.

Keywords: ransomware; ransomware business; business raab;
Photo from wikipedia

BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2022.3208795

Abstract: Ransomware is a type of malicious program or software that encrypts the contents on a hard disc and prevents the users from accessing them unless they pay an amount (called a ransom). Most of the… read more here.

Keywords: bsfr; security; smart healthcare; ransomware attacks ... See more keywords
Photo by dawson2406 from unsplash

Analysis of Encryption Key Generation in Modern Crypto Ransomware

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3005976

Abstract: The scale of ransomware attacks increases every year, and so does its cost, which has reached billions of dollars. A specific class of ransomware, called crypto ransomware, encrypts data of the victims for monetary gain.… read more here.

Keywords: encryption; encryption key; analysis; crypto ransomware ... See more keywords
Photo by campaign_creators from unsplash

Seamlessly Safeguarding Data Against Ransomware Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3214781

Abstract: Encryption has become an indispensable technology for preserving confidentiality. Unfortunately, cybercriminals have re-purposed this technology to deny users access to their data. This trend has sparked an onslaught of ransomware attacks, that resulted in several… read more here.

Keywords: seamlessly safeguarding; safeguarding data; maliciously encrypted; encrypted data ... See more keywords
Photo by jontyson from unsplash

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2017.2787905

Abstract: In recent years, we witnessed a drastic increase of ransomware, especially on popular mobile platforms including Android. Ransomware extorts victims for a sum of money by taking control of their devices or files. In light… read more here.

Keywords: android ransomware; time detection; ransomware; real time ... See more keywords