A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

[HTML][HTML] The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures

LY Connolly, DS Wall - Computers & Security, 2019 - Elsevier
Year in and year out the increasing adaptivity of offenders has maintained ransomware's
position as a major cybersecurity threat. The cybersecurity industry has responded with a …

A review on spreading and forensics analysis of windows-based ransomware

NM Chayal, A Saxena, R Khan - Annals of Data Science, 2024 - Springer
Ransomware is one of the most advanced malware which uses high computer resources
and services to encrypt system data once it infects a system and causes large financial data …

Deepware: Imaging performance counters with deep learning to detect ransomware

GO Ganfure, CF Wu, YH Chang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the year passed, rarely a month passes without a ransomware incident being published in
a newspaper or social media. In addition to the rise in the frequency of ransomware attacks …

Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection

BAS Al-rimy, MA Maarof, SZM Shaid - Future Generation Computer Systems, 2019 - Elsevier
The irreversible effect is what characterizes crypto-ransomware and distinguishes it from
traditional malware. That is, even after neutralizing the attack, the targeted files remain …

A survey on situational awareness of ransomware attacks—detection and prevention parameters

JA Herrera Silva, LI Barona López… - Remote Sensing, 2019 - mdpi.com
In recent years, cybercrime activities have grown significantly, compromising device security
and jeopardizing the normal activities of enterprises. The profits obtained through …

Cashing out crypto: state of practice in ransom payments

C Patsakis, E Politou, E Alepis… - International Journal of …, 2024 - Springer
The fast pace of blockchain technology and cryptocurrencies' evolution makes people
vulnerable to financial fraud and provides a relatively straightforward monetisation …

A survey on detection techniques for cryptographic ransomware

E Berrueta, D Morato, E Magaña, M Izal - IEEE Access, 2019 - ieeexplore.ieee.org
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data,
and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both …

Secure storage model for digital forensic readiness

A Singh, RA Ikuesan, H Venter - IEEE Access, 2022 - ieeexplore.ieee.org
Securing digital evidence is a key factor that contributes to evidence admissibility during
digital forensic investigations, particularly in establishing the chain of custody of digital …

Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection

BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid… - Future Generation …, 2021 - Elsevier
Crypto-ransomware is a type of malware whose effect is irreversible even after detection and
removal. Thus, early detection is crucial to protect user files from being encrypted and held …