Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions

T McIntosh, ASM Kayes, YPP Chen, A Ng… - ACM Computing …, 2021 - dl.acm.org
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …

A survey on windows-based ransomware taxonomy and detection mechanisms

R Moussaileb, N Cuppens, JL Lanet… - ACM Computing Surveys …, 2021 - dl.acm.org
Ransomware remains an alarming threat in the 21st century. It has evolved from being a
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …

The difficulty of computing stable and accurate neural networks: On the barriers of deep learning and Smale's 18th problem

MJ Colbrook, V Antun, AC Hansen - … of the National Academy of Sciences, 2022 - pnas.org
Deep learning (DL) has had unprecedented success and is now entering scientific
computing with full force. However, current DL methods typically suffer from instability, even …

A framework for analyzing ransomware using machine learning

S Poudyal, KP Subedi… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
Ransomware attacks increased in recent years causing significant damages and disruptions
to businesses. Forensic analysis such as reverse engineering of executables (or binary files) …

Adversarial attacks against supervised machine learning based network intrusion detection systems

E Alshahrani, D Alghazzawi, R Alotaibi, O Rabie - Plos one, 2022 - journals.plos.org
Adversarial machine learning is a recent area of study that explores both adversarial attack
strategy and detection systems of adversarial attacks, which are inputs specially crafted to …

Dynamic user-centric access control for detection of ransomware attacks

T McIntosh, ASM Kayes, YPP Chen, A Ng… - Computers & Security, 2021 - Elsevier
Ransomware attacks are often catastrophic, yet existing reactive and preventative measures
could only partially mitigate ransomware damage, often not in a timely manner, and often …

Quantum-inspired analysis of neural network vulnerabilities: the role of conjugate variables in system attacks

JJ Zhang, D Meng - National Science Review, 2024 - academic.oup.com
Neural networks demonstrate vulnerability to small, non-random perturbations, emerging as
adversarial attacks. Such attacks, born from the gradient of the loss function relative to the …

[PDF][PDF] A few-shot learning approach with a twin neural network utilizing entropy features for ransomware classification

F Wang - 2023 - preprints.org
Ransomware attacks have rapidly proliferated, inflicting severe financial damages on
businesses and individuals. Machine learning approaches to automate ransomware …

Avaddon ransomware: An in-depth analysis and decryption of infected systems

J Yuste, S Pastrana - Computers & Security, 2021 - Elsevier
Malware is an emerging and popular threat flourishing in the underground economy. The
commoditization of Malware-as-a-Service (MaaS) allows criminals to obtain financial …

Static malware analysis to identify ransomware properties

D Vidyarthi, CRS Kumar, S Rakshit… - … Journal of Computer …, 2019 - search.proquest.com
The study in this paper presents the results of ransomware analysis to identify the
characteristic properties that distinguish ransomware executable from other malware and …