A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions

T McIntosh, ASM Kayes, YPP Chen, A Ng… - ACM Computing …, 2021 - dl.acm.org
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …

Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms

M Al-Hawawreh, M Alazab, MA Ferrag… - Journal of Network and …, 2024 - Elsevier
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …

Opportunities for early detection and prediction of ransomware attacks against industrial control systems

M Gazzan, FT Sheldon - Future Internet, 2023 - mdpi.com
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA)
systems, which control critical infrastructure such as power plants and water treatment …

Ransomware detection using deep learning in the SCADA system of electric vehicle charging station

M Basnet, S Poudyal, MH Ali… - 2021 IEEE PES …, 2021 - ieeexplore.ieee.org
The Supervisory control and data acquisition (SCADA) systems have been continuously
leveraging the evolution of network architecture, communication protocols, next-generation …

[HTML][HTML] Ransomware early detection: A survey

M Cen, F Jiang, X Qin, Q Jiang, R Doss - Computer Networks, 2024 - Elsevier
In recent years, ransomware attacks have exploded globally, and it has become one of the
most significant cyber threats to digital infrastructure. Such attacks have been targeting …

Know thy ransomware response: a detailed framework for devising effective ransomware response strategies

P Bajpai, R Enbody - Digital Threats: Research and Practice, 2023 - dl.acm.org
Ransomware has evolved into one of the most severe cyberthreats against private and
public sectors alike. Organizations are inundated with a barrage of intrusion attempts that …

[HTML][HTML] Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges

M Benmalek - Internet of Things and Cyber-Physical Systems, 2024 - Elsevier
Ransomware attacks have emerged as one of the most significant cyberthreats faced by
organizations worldwide. In recent years, ransomware has also started to target critical …

Intercepting ransomware attacks with staged event-driven access control

T McIntosh - 2022 - opal.latrobe.edu.au
A thesis submitted in total fulfillment of the requirements for the degree of Doctor of
Philosophy to the Department of Computer Science and Information Technology, School of …

Ransomware-as-a-Weapon (RaaW): A Futuristic Approach for Understanding Malware as a Social Weapon

K Mohanty, GS Bopche, S Brahnam… - … Challenges for Cyber …, 2023 - igi-global.com
The use of information technology has widened in the past few years. With the evolving IT
industries and infrastructure comes an ocean of development and opportunities and a series …