A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
Ransomware detection using the dynamic analysis and machine learning: A survey and research directions
Ransomware is an ill-famed malware that has received recognition because of its lethal and
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …
The age of ransomware: A survey on the evolution, taxonomy, and research directions
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …
years, causing significant financial, reputational, and operational damage to individuals and …
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
Internet of drones security: Taxonomies, open issues, and future directions
Drones have recently become one of the most important technological breakthroughs. They
have opened the horizon for a vast array of applications and paved the way for a diversity of …
have opened the horizon for a vast array of applications and paved the way for a diversity of …
BigRC-EML: big-data based ransomware classification using ensemble machine learning
Ransomware is a subcategory of malware whose specific goal is to hold the victim's data by
using encryption techniques until a ransom is paid. With mainstream usage of the Windows …
using encryption techniques until a ransom is paid. With mainstream usage of the Windows …
Dominant feature selection and machine learning‐based hybrid approach to analyze android ransomware
Ransomware is a special malware designed to extort money in return for unlocking the
device and personal data files. Smartphone users store their personal as well as official data …
device and personal data files. Smartphone users store their personal as well as official data …
Boost‐Defence for resilient IoT networks: A head‐to‐toe approach
Abstract The Internet of Things (IoT) is an emerging technology that is considered a key
enabler for next‐generation smart cities, industries, security services and economies. IoT …
enabler for next‐generation smart cities, industries, security services and economies. IoT …
[PDF][PDF] The evolution of ransomware: tactics, techniques, and mitigation strategies
G Nagar - International Journal of Scientific Research and …, 2024 - academia.edu
Ransomware has developed into one of the most dangerous cyber threats. It is developed
for the purpose of encrypting the data, and the owner is to pay the specified amount of …
for the purpose of encrypting the data, and the owner is to pay the specified amount of …