Articles with "ransomware detection" as a keyword



An intelligent ransomware based cyberthreat detection model using multi head attention-based recurrent neural networks with optimization algorithm in IoT environment

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-92711-4

Abstract: The rapid growth of the Internet of Things (IoT) and its extensive use in many regions, such as smart homes, healthcare, and vehicles, have made IoT security increasingly critical. Ransomware is an advanced and adjustable… read more here.

Keywords: ransomware; model; head attention; ransomware detection ... See more keywords

Machine Learning Algorithms and Frameworks in Ransomware Detection

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3218779

Abstract: Ransomware has been one of the biggest cyber threats against consumers in recent years. It can leverage various attack vectors while it also evolves in terms of finding more innovative ways to invade different cyber… read more here.

Keywords: detection; machine learning; ransomware detection; learning algorithms ... See more keywords

Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3397921

Abstract: Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.… read more here.

Keywords: detection; review; machine learning; research ... See more keywords

A Survey of Ransomware Detection Methods

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3556187

Abstract: Ransomware attacks continue to pose a significant challenge to cybersecurity, causing substantial financial and reputational damage to individuals and organizations. These attacks typically encrypt user data and demand a ransom for its release. There is… read more here.

Keywords: detection; survey ransomware; ransomware; detection methods ... See more keywords

Efficient Ransomware Detection in Resource-Constrained Environments Using Optimized Multi-Layer Perceptron Networks

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3569184

Abstract: Ransomware attacks represent a significant cybersecurity threat, particularly in resource-constrained environments such as the Internet of Things (IoT) and edge computing systems. Traditional detection methods face considerable challenges in these environments due to limited computational… read more here.

Keywords: detection; resource constrained; ransomware; ransomware detection ... See more keywords

Explainable and Uncertainty Aware AI-Based Ransomware Detection

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3581424

Abstract: Ransomware poses a serious and evolving threat, demanding detection methods that can adapt to new attack vectors while maintaining transparency and reliability. This study proposes a comprehensive framework that integrates data augmentation, explainable artificial intelligence,… read more here.

Keywords: detection; explainable uncertainty; uncertainty aware; ransomware detection ... See more keywords

Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2024.3410511

Abstract: Ransomware is a rapidly evolving type of malware crafted to encrypt user files, rendering them inaccessible and demanding a ransom. The impact of ransomware attacks on both enterprises and individuals is significant. However, early detection… read more here.

Keywords: detection; early ransomware; ransomware; kernel level ... See more keywords
Photo from wikipedia

Optimizing Extreme Learning Machines Using Chains of Salps for Efficient Android Ransomware Detection

Sign Up to like & get
recommendations!
Published in 2020 at "Applied Sciences"

DOI: 10.3390/app10113706

Abstract: Nowadays, smartphones are an essential part of people’s lives and a sign of a contemporary world. Even that smartphones bring numerous facilities, but they form a wide gate into personal and financial information. In recent… read more here.

Keywords: android ransomware; detection; extreme learning; ransomware detection ... See more keywords

Ransomware Detection Model Based on Adaptive Graph Neural Network Learning

Sign Up to like & get
recommendations!
Published in 2024 at "Applied Sciences"

DOI: 10.3390/app14114579

Abstract: Ransomware is a type of malicious software that encrypts or locks user files and demands a high ransom. It has become a major threat to cyberspace security, especially as it continues to be developed and… read more here.

Keywords: detection; information; model; network ... See more keywords

Adaptive Ransomware Detection Using Similarity-Preserving Hashing

Sign Up to like & get
recommendations!
Published in 2024 at "Applied Sciences"

DOI: 10.3390/app14209548

Abstract: Crypto-ransomware is a type of ransomware that encrypts the victim’s files and demands a ransom to return the files. This type of attack has been on the rise in recent years, as it offers a… read more here.

Keywords: detection; adaptive ransomware; detection using; ransomware ... See more keywords

A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24020239

Abstract: Ransomware consists of malicious codes that restrict users from accessing their own files while demanding a ransom payment. Since the advent of ransomware, new and variant ransomwares have caused critical damage around the world, thus… read more here.

Keywords: entropy measurement; detection technologies; ransomware detection; detection ... See more keywords