Articles with "ransomware attacks" as a keyword



Photo by sebastianpoc from unsplash

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181278

Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.… read more here.

Keywords: threat hunting; cyber threat; ransomware attacks; ransomware ... See more keywords
Photo from wikipedia

BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2022.3208795

Abstract: Ransomware is a type of malicious program or software that encrypts the contents on a hard disc and prevents the users from accessing them unless they pay an amount (called a ransom). Most of the… read more here.

Keywords: bsfr; security; smart healthcare; ransomware attacks ... See more keywords
Photo by campaign_creators from unsplash

Seamlessly Safeguarding Data Against Ransomware Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3214781

Abstract: Encryption has become an indispensable technology for preserving confidentiality. Unfortunately, cybercriminals have re-purposed this technology to deny users access to their data. This trend has sparked an onslaught of ransomware attacks, that resulted in several… read more here.

Keywords: seamlessly safeguarding; safeguarding data; maliciously encrypted; encrypted data ... See more keywords
Photo from wikipedia

Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems

Sign Up to like & get
recommendations!
Published in 2023 at "Future Internet"

DOI: 10.3390/fi15040144

Abstract: Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware attacks. These… read more here.

Keywords: ransomware; prediction ransomware; industrial control; ransomware attacks ... See more keywords
Photo from wikipedia

Securing IoT Devices Running PureOS from Ransomware Attacks: Leveraging Hybrid Machine Learning Techniques

Sign Up to like & get
recommendations!
Published in 2023 at "Mathematics"

DOI: 10.3390/math11112481

Abstract: Internet-enabled (IoT) devices are typically small, low-powered devices used for sensing and computing that enable remote monitoring and control of various environments through the Internet. Despite their usefulness in achieving a more connected cyber-physical world,… read more here.

Keywords: iot devices; machine learning; devices running; ransomware attacks ... See more keywords
Photo from wikipedia

RBEF: Ransomware Efficient Public Blockchain Framework for Digital Healthcare Application

Sign Up to like & get
recommendations!
Published in 2023 at "Sensors"

DOI: 10.3390/s23115256

Abstract: These days, the use of digital healthcare has been growing in practice. Getting remote healthcare services without going to the hospital for essential checkups and reports is easy. It is a cost-saving and time-saving process.… read more here.

Keywords: blockchain; digital healthcare; ransomware attacks; rbef ... See more keywords