A comprehensive survey on deep learning based malware detection techniques
M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
Ransomware: Recent advances, analysis, challenges and future research directions
C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …
Different institutions such as healthcare, financial, and government have been targeted …
A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …
sophistication and aggression have increased substantially over the years. Ransomware, as …
The age of ransomware: A survey on the evolution, taxonomy, and research directions
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …
years, causing significant financial, reputational, and operational damage to individuals and …
[HTML][HTML] The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
Year in and year out the increasing adaptivity of offenders has maintained ransomware's
position as a major cybersecurity threat. The cybersecurity industry has responded with a …
position as a major cybersecurity threat. The cybersecurity industry has responded with a …
[HTML][HTML] Applying staged event-driven access control to combat ransomware
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics
A Zimba, H Chen, Z Wang, M Chishimba - Future Generation Computer …, 2020 - Elsevier
Abstract Advanced Persistent Threats (APT) present the most sophisticated types of attacks
to modern networks which have proved to be very challenging to address. Using …
to modern networks which have proved to be very challenging to address. Using …
Crypto-ransomware: A revision of the state of the art, advances and challenges
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …
knowledge of it as much as possible, this work is mainly aimed at diving into and …
RansomSpector: An introspection-based approach to detect crypto ransomware
F Tang, B Ma, J Li, F Zhang, J Su, J Ma - Computers & Security, 2020 - Elsevier
Crypto ransomware encrypts user files and then extorts a ransom for decryption, thus it
brings a big threat to users. To address this problem, we propose RansomSpector, an …
brings a big threat to users. To address this problem, we propose RansomSpector, an …