A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …
[HTML][HTML] The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
Year in and year out the increasing adaptivity of offenders has maintained ransomware's
position as a major cybersecurity threat. The cybersecurity industry has responded with a …
position as a major cybersecurity threat. The cybersecurity industry has responded with a …
A review on spreading and forensics analysis of windows-based ransomware
Ransomware is one of the most advanced malware which uses high computer resources
and services to encrypt system data once it infects a system and causes large financial data …
and services to encrypt system data once it infects a system and causes large financial data …
Deepware: Imaging performance counters with deep learning to detect ransomware
In the year passed, rarely a month passes without a ransomware incident being published in
a newspaper or social media. In addition to the rise in the frequency of ransomware attacks …
a newspaper or social media. In addition to the rise in the frequency of ransomware attacks …
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
The irreversible effect is what characterizes crypto-ransomware and distinguishes it from
traditional malware. That is, even after neutralizing the attack, the targeted files remain …
traditional malware. That is, even after neutralizing the attack, the targeted files remain …
A survey on situational awareness of ransomware attacks—detection and prevention parameters
JA Herrera Silva, LI Barona López… - Remote Sensing, 2019 - mdpi.com
In recent years, cybercrime activities have grown significantly, compromising device security
and jeopardizing the normal activities of enterprises. The profits obtained through …
and jeopardizing the normal activities of enterprises. The profits obtained through …
Cashing out crypto: state of practice in ransom payments
The fast pace of blockchain technology and cryptocurrencies' evolution makes people
vulnerable to financial fraud and provides a relatively straightforward monetisation …
vulnerable to financial fraud and provides a relatively straightforward monetisation …
A survey on detection techniques for cryptographic ransomware
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data,
and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both …
and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both …
Secure storage model for digital forensic readiness
Securing digital evidence is a key factor that contributes to evidence admissibility during
digital forensic investigations, particularly in establishing the chain of custody of digital …
digital forensic investigations, particularly in establishing the chain of custody of digital …
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection
Crypto-ransomware is a type of malware whose effect is irreversible even after detection and
removal. Thus, early detection is crucial to protect user files from being encrypted and held …
removal. Thus, early detection is crucial to protect user files from being encrypted and held …