27   Artículos

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Amjad Alraizza and Abdulmohsen Algarni    
Ransomware attacks pose significant security threats to personal and corporate data and information. The owners of computer-based resources suffer from verification and privacy violations, monetary losses, and reputational damage due to successful ransom... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Recent ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly ou... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hend Khalid Alkahtani, Khalid Mahmood, Majdi Khalid, Mahmoud Othman, Mesfer Al Duhayyim, Azza Elneil Osman, Amani A. Alneil and Abu Sarwar Zamani    
The fast development of the Internet of Things (IoT) and widespread utilization in a large number of areas, such as vehicle IoT, industrial control, healthcare, and smart homes, has made IoT security increasingly prominent. Ransomware is a type of malwar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Avinash Singh, Richard Adeyemi Ikuesan and Hein Venter    
The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to combat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ibrahim Ba?abbad and Omar Batarfi    
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos    
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mahmoud Al-Dwairi, Ahmed S. Shatnawi, Osama Al-Khaleel and Basheer Al-Duwairi    
In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infected ma... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yassine Lemmou, Jean-Louis Lanet and El Mamoun Souidi    
During recent years, many papers have been published on ransomware, but to the best of our knowledge, no previous academic studies have been conducted on ransom note files. In this paper, we present the results of a depth study on filenames and the conte... ver más
Revista: Computers    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »