Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
A comprehensive survey on deep learning based malware detection techniques
M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
Ransomware: Recent advances, analysis, challenges and future research directions
C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …
Different institutions such as healthcare, financial, and government have been targeted …
A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …
sophistication and aggression have increased substantially over the years. Ransomware, as …
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
The age of ransomware: A survey on the evolution, taxonomy, and research directions
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …
years, causing significant financial, reputational, and operational damage to individuals and …
[HTML][HTML] Early-stage malware prediction using recurrent neural networks
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted
quickly by examining the features of an executable piece of code and matching it to …
quickly by examining the features of an executable piece of code and matching it to …
Ransomware payments in the bitcoin ecosystem
Ransomware can prevent a user from accessing a device and its files until a ransom is paid
to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has …
to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has …
[HTML][HTML] Information security breaches due to ransomware attacks-a systematic literature review
TR Reshmi - International Journal of Information Management Data …, 2021 - Elsevier
Ransomware is the most predominant cyber threat in the digital infrastructure. The attackers
launching ransomware attacks use different techniques to hijack the users' or organizations' …
launching ransomware attacks use different techniques to hijack the users' or organizations' …