|
|
|
Hend Khalid Alkahtani, Khalid Mahmood, Majdi Khalid, Mahmoud Othman, Mesfer Al Duhayyim, Azza Elneil Osman, Amani A. Alneil and Abu Sarwar Zamani
The fast development of the Internet of Things (IoT) and widespread utilization in a large number of areas, such as vehicle IoT, industrial control, healthcare, and smart homes, has made IoT security increasingly prominent. Ransomware is a type of malwar...
ver más
|
|
|
|
|
|
|
Ibrahim Ba?abbad and Omar Batarfi
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa...
ver más
|
|
|
|
|
|
|
Hui Shao, Yuxin Miao, Fabián G. Fernández, Newell R. Kitchen, Curtis J. Ransom, James J. Camberato, Paul R. Carter, Richard B. Ferguson, David W. Franzen, Carrie A. M. Laboski, Emerson D. Nafziger, John E. Sawyer and John F. Shanahan
Plant N concentration (PNC) has been commonly used to guide farmers in assessing maize (Zea mays L.) N status and making in-season N fertilization decisions. However, PNC varies based on the development stage. Therefore, a relationship between biomass an...
ver más
|
|
|
|
|
|
|
Mahmoud Al-Dwairi, Ahmed S. Shatnawi, Osama Al-Khaleel and Basheer Al-Duwairi
In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infected ma...
ver más
|
|
|
|
|
|
|
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi...
ver más
|
|
|
|
|
|
|
Yassine Lemmou, Jean-Louis Lanet and El Mamoun Souidi
During recent years, many papers have been published on ransomware, but to the best of our knowledge, no previous academic studies have been conducted on ransom note files. In this paper, we present the results of a depth study on filenames and the conte...
ver más
|
|
|
|
|
|
|
S. H. Kok, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
ver más
|
|
|
|
|
|
|
Márcio Ricardo FERREIRA,Cynthia KAWAKAMI
Pág. 5 - 14
|
|
|
|
|
|
|
Michael R Ransom
This paper examined the effect of the construction of light rail transit stations on surrounding residential property values in Seattle, Washington. It studied sales of homes in the areas around the seven stations that serve primarily residential areas i...
ver más
|
|
|
|
|
|
|
Abdulkabir OS
Pág. 1 - 6
Nigeria was globally declared as one of the horrible country to subsist in the world because of the widespread of corruption, injustice, violence and lack of security that exposed many innocent lives to end up in the hitch of kidnappers. This manuscript ...
ver más
|
|
|
|