AI-based ransomware detection: A comprehensive review

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEE Access, 2024 - ieeexplore.ieee.org
Ransomware attacks are becoming increasingly sophisticated, thereby rendering
conventional detection methods less effective. Recognizing this challenge, this study …

[PDF][PDF] Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks

N Ravichandran, T Tewaraja, V Rajasegaran… - Preprints. org, 2024 - preprints.org
With all the sophisticated threats to network security, intrusion detection is a section of the
security technology industry that is becoming increasingly significant. In this research paper …

[PDF][PDF] Cyber Espionage in the Age of Artificial Intelligence: A Comparative Study of State-Sponsored Campaign

OA Obioha-Val, OO Olaniyi, MO Gbadebo… - Asian Journal of …, 2025 - researchgate.net
This study investigates the transformative role of artificial intelligence (AI) in state-sponsored
cyber espionage, focusing on its dual use in offensive and defensive operations. Using data …

[HTML][HTML] Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era

A Adeyeri, H Abroshan - Information, 2024 - mdpi.com
As the digital environment progresses, the complexities of cyber threats also advance,
encompassing both hostile cyberattacks and sophisticated cyber espionage. In the face of …

Real-time system call-based ransomware detection

CJW Chew, V Kumar, P Patros, R Malik - International Journal of …, 2024 - Springer
Ransomware, particularly crypto ransomware, has emerged as the go-to malware for threat
actors aiming to compromise data on Android devices as well as in general. In this paper …

A framework for automated big data analytics in cybersecurity threat detection

MA Ameedeen, RA Hamid… - … Journal of Big Data, 2024 - mesopotamian.press
This research presents a novel framework designed to enhance cybersecurity through the
integration of Big Data analytics, addressing the critical need for scalable and real-time …

A systematic solution of distributed and trusted chain-network integration

Y Chen, P Jian, Y Zhang, J Li, Z Wu, Z Liu - Journal of Industrial Information …, 2024 - Elsevier
Blockchain, with its characteristics of decentralization, transparency, openness, and
intangibility, has become the preferred choice for enhancing the credibility of the industrial …

[PDF][PDF] A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments

J Ferdous, R Islam, A Mahboubi, MZ Islam - Sensors, 2025 - researchgate.net
Malware has emerged as a significant threat to end-users, businesses, and governments,
resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a …

Optimal Cyber Attack Strategy Using Reinforcement Learning Based on Common Vulnerability Scoring System.

BS Kim, HW Suk, YH Choi… - … in Engineering & …, 2024 - search.ebscohost.com
Currently, cybersecurity threats such as data breaches and phishing have been on the rise
due to the many different attack strategies of cyber attackers, significantly increasing risks to …

[HTML][HTML] Modeling Cybersecurity Risk: The Integration of Decision Theory and Pivot Pairwise Relative Criteria Importance Assessment with Scale for Cybersecurity …

A Šijan, D Viduka, L Ilić, B Predić, D Karabašević - Electronics, 2024 - mdpi.com
This paper presents a comprehensive model for cyber security risk assessment using the
PIPRECIA-S method within decision theory, which enables organizations to systematically …