Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-025-92711-4
Abstract: The rapid growth of the Internet of Things (IoT) and its extensive use in many regions, such as smart homes, healthcare, and vehicles, have made IoT security increasingly critical. Ransomware is an advanced and adjustable…
read more here.
Keywords:
ransomware;
model;
head attention;
ransomware detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3218779
Abstract: Ransomware has been one of the biggest cyber threats against consumers in recent years. It can leverage various attack vectors while it also evolves in terms of finding more innovative ways to invade different cyber…
read more here.
Keywords:
detection;
machine learning;
ransomware detection;
learning algorithms ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3397921
Abstract: Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.…
read more here.
Keywords:
detection;
review;
machine learning;
research ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3556187
Abstract: Ransomware attacks continue to pose a significant challenge to cybersecurity, causing substantial financial and reputational damage to individuals and organizations. These attacks typically encrypt user data and demand a ransom for its release. There is…
read more here.
Keywords:
detection;
survey ransomware;
ransomware;
detection methods ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3569184
Abstract: Ransomware attacks represent a significant cybersecurity threat, particularly in resource-constrained environments such as the Internet of Things (IoT) and edge computing systems. Traditional detection methods face considerable challenges in these environments due to limited computational…
read more here.
Keywords:
detection;
resource constrained;
ransomware;
ransomware detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3581424
Abstract: Ransomware poses a serious and evolving threat, demanding detection methods that can adapt to new attack vectors while maintaining transparency and reliability. This study proposes a comprehensive framework that integrates data augmentation, explainable artificial intelligence,…
read more here.
Keywords:
detection;
explainable uncertainty;
uncertainty aware;
ransomware detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2024.3410511
Abstract: Ransomware is a rapidly evolving type of malware crafted to encrypt user files, rendering them inaccessible and demanding a ransom. The impact of ransomware attacks on both enterprises and individuals is significant. However, early detection…
read more here.
Keywords:
detection;
early ransomware;
ransomware;
kernel level ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Applied Sciences"
DOI: 10.3390/app10113706
Abstract: Nowadays, smartphones are an essential part of people’s lives and a sign of a contemporary world. Even that smartphones bring numerous facilities, but they form a wide gate into personal and financial information. In recent…
read more here.
Keywords:
android ransomware;
detection;
extreme learning;
ransomware detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Applied Sciences"
DOI: 10.3390/app14114579
Abstract: Ransomware is a type of malicious software that encrypts or locks user files and demands a high ransom. It has become a major threat to cyberspace security, especially as it continues to be developed and…
read more here.
Keywords:
detection;
information;
model;
network ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Applied Sciences"
DOI: 10.3390/app14209548
Abstract: Crypto-ransomware is a type of ransomware that encrypts the victim’s files and demands a ransom to return the files. This type of attack has been on the rise in recent years, as it offers a…
read more here.
Keywords:
detection;
adaptive ransomware;
detection using;
ransomware ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24020239
Abstract: Ransomware consists of malicious codes that restrict users from accessing their own files while demanding a ransom payment. Since the advent of ransomware, new and variant ransomwares have caused critical damage around the world, thus…
read more here.
Keywords:
entropy measurement;
detection technologies;
ransomware detection;
detection ... See more keywords