25   Artículos

 
en línea
Hend Khalid Alkahtani, Khalid Mahmood, Majdi Khalid, Mahmoud Othman, Mesfer Al Duhayyim, Azza Elneil Osman, Amani A. Alneil and Abu Sarwar Zamani    
The fast development of the Internet of Things (IoT) and widespread utilization in a large number of areas, such as vehicle IoT, industrial control, healthcare, and smart homes, has made IoT security increasingly prominent. Ransomware is a type of malwar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ibrahim Ba?abbad and Omar Batarfi    
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Hui Shao, Yuxin Miao, Fabián G. Fernández, Newell R. Kitchen, Curtis J. Ransom, James J. Camberato, Paul R. Carter, Richard B. Ferguson, David W. Franzen, Carrie A. M. Laboski, Emerson D. Nafziger, John E. Sawyer and John F. Shanahan    
Plant N concentration (PNC) has been commonly used to guide farmers in assessing maize (Zea mays L.) N status and making in-season N fertilization decisions. However, PNC varies based on the development stage. Therefore, a relationship between biomass an... ver más
Revista: Agronomy    Formato: Electrónico

 
en línea
Mahmoud Al-Dwairi, Ahmed S. Shatnawi, Osama Al-Khaleel and Basheer Al-Duwairi    
In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infected ma... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos    
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yassine Lemmou, Jean-Louis Lanet and El Mamoun Souidi    
During recent years, many papers have been published on ransomware, but to the best of our knowledge, no previous academic studies have been conducted on ransom note files. In this paper, we present the results of a depth study on filenames and the conte... ver más
Revista: Computers    Formato: Electrónico

 
en línea
S. H. Kok, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam    
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Márcio Ricardo FERREIRA,Cynthia KAWAKAMI     Pág. 5 - 14

 
en línea
Michael R Ransom    
This paper examined the effect of the construction of light rail transit stations on surrounding residential property values in Seattle, Washington. It studied sales of homes in the areas around the seven stations that serve primarily residential areas i... ver más
Revista: Journal of Transport and Land Use    Formato: Electrónico

 
en línea
Abdulkabir OS     Pág. 1 - 6
Nigeria was globally declared as one of the horrible country to subsist in the world because of the widespread of corruption, injustice, violence and lack of security that exposed many innocent lives to end up in the hitch of kidnappers. This manuscript ... ver más
Revista: Journal of Political Sciences & Public Affairs    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »