Ransomware: Recent advances, analysis, challenges and future research directions

C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021‏ - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …

[HTML][HTML] Introduction of the ARDS—anti-ransomware defense System model—based on the systematic review of worldwide ransomware attacks

V Szücs, G Arányi, Á Dávid - Applied Sciences, 2021‏ - mdpi.com
We live in a world of digital information communication and digital data storage. Following
the development of technology, demands from the user side also pose serious challenges …

[HTML][HTML] MFMCNS: A multi-feature and multi-classifier network-based system for ransomworm detection

AO Almashhadani, D Carlin, M Kaiiali, S Sezer - Computers & Security, 2022‏ - Elsevier
Ransomware is a type of advanced malware that can encrypt a user's files or lock a
computer system until a ransom has been paid. Ransomworm is a type of malware that …

[PDF][PDF] Ransomware protection in loT using software defined networking

A Wani, S Revathi - Int. J. Electr. Comput. Eng, 2020‏ - academia.edu
Internet of things (IoT) is the network of physical objects connected to provide various
services. IoT is expanding rapidly, and is positively influencing many areas. The impact of …

[PDF][PDF] Ransomware prevention and mitigation techniques

H Alshaikh, N Ramadan, HA Hefny - Int. J. Comput. Appl, 2020‏ - academia.edu
Ransomware is a malware family that using security techniques such as cryptography to
hijacking user files and associated resources and requests cryptocurrency in exchange for …

Information security risk estimation for cloud infrastructure.

AV Tsaregorodtsev, OJ Kravets… - International …, 2018‏ - search.ebscohost.com
Due to the fact that cloud computing bring with them new challenges in the field of
information security, it is imperative for organizations to control the process of information …

The growing influence of ransomware

MA Mos, MM Chowdhury - 2020 IEEE international conference …, 2020‏ - ieeexplore.ieee.org
Ransomware is a malicious cyber-attack in which a user's files are encrypted and rendered
inaccessible until the attacker receives a ransomed amount in return for the decryption key …

Technical and behavioural training and awareness solutions for mitigating ransomware attacks

A Bello, A Maurushat - Applied Informatics and Cybernetics in Intelligent …, 2020‏ - Springer
Over the years, there has been a significant increase in cyber security risks and
vulnerabilities with one of the most severe threat being ransomware attacks. Ransomware, a …

A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise

S Eswaran, A Srinivasan, P Honnavalli - Network Security, 2021‏ - magonlinelibrary.com
IT functions in organisations produce enormous quantities of data, logs and events. In the
current IT world, handling a large amount of data is a challenging task and it is the …

[PDF][PDF] A framework for evaluation of web-based learning content

V Atanasov, A Ivanova - International Journal on Information …, 2022‏ - ijits-bg.com
A framework for adding qualitative and quantitative metadescriptions of WEB based learning
content is discussed in this work. The purpose is to be provided sufficient information about …