[HTML][HTML] Ransomware detection, avoidance, and mitigation scheme: A review and future directions

A Kapoor, A Gupta, R Gupta, S Tanwar, G Sharma… - Sustainability, 2021 - mdpi.com
Ransomware attacks have emerged as a major cyber-security threat wherein user data is
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation …

Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems

M Shahin, M Maghanaki, A Hosseinzadeh… - Advanced Engineering …, 2024 - Elsevier
The increasing use of Industrial Internet of Things (IIoT) devices has heightened concerns
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …

Ten deadly cyber security threats amid COVID-19 pandemic

NA Khan, SN Brohi, N Zaman - Authorea Preprints, 2023 - authorea.com
World Health Organization declared COVID-19 as a pandemic after the breakout in the city
of Wuhan, China. The disease has negatively affected the global economy and daily life …

[HTML][HTML] Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data

A Singh, Z Mushtaq, HA Abosaq, SNF Mursal, M Irfan… - Electronics, 2023 - mdpi.com
Ransomware attacks on cloud-encrypted data pose a significant risk to the security and
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …

[HTML][HTML] Early detection of crypto-ransomware using pre-encryption detection algorithm

SH Kok, A Abdullah, NZ Jhanjhi - … of King Saud University-Computer and …, 2022 - Elsevier
Crypto ransomware is a type of malware that locks its victim's file for ransom using an
encryption algorithm. Its popularity has risen at an alarming rate among the cyber security …

An effective strategy for ransomware mitigation on android devices via android os file system api

M Ozturk, B Yilmaz, Z Arslan, A Demirbas - 2024 - researchsquare.com
The development and effectiveness of an API-based system for mitigating ransomware
threats on Android devices was explored in this study. Leveraging the Android/Linux file …

Evolution, mitigation, and prevention of ransomware

IA Chesti, M Humayun, NU Sama… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
Tremendous growth of ransom malware demands valuable security methods to protect
individuals and organizations. Ransomware or ransom malware is a type of malware that …

[PDF][PDF] Securing the digital supply chain: Cybersecurity best practices for logistics and ship** companies,'

AC Odimarha, SA Ayodeji, EA Abaku - World Journal of Advanced …, 2024 - academia.edu
The review investigates the pressing need for robust cybersecurity measures within the
logistics and ship** sector, where the digital supply chain is vulnerable to a myriad of …

[HTML][HTML] Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review

L Albshaier, S Almarri, MMH Rahman - Information, 2024 - mdpi.com
Cybersecurity is normally defined as protecting systems against all kinds of cyberattacks;
however, due to the rapid and permanent expansion of technology and digital …

Ransomware prevention using moving target defense based approach

MM Khan, MF Hyder, SM Khan… - Concurrency and …, 2023 - Wiley Online Library
Over the past decade, there has been a rapidly rising trend of malware (ransomware) that
limits user access by encrypting the data and demanding the ransom against the decryption …