Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

Ransomware: Recent advances, analysis, challenges and future research directions

C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …

A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions

T McIntosh, ASM Kayes, YPP Chen, A Ng… - ACM Computing …, 2021 - dl.acm.org
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …

Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms

M Al-Hawawreh, M Alazab, MA Ferrag… - Journal of Network and …, 2024 - Elsevier
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …

The age of ransomware: A survey on the evolution, taxonomy, and research directions

S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …

[HTML][HTML] Early-stage malware prediction using recurrent neural networks

M Rhode, P Burnap, K Jones - computers & security, 2018 - Elsevier
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted
quickly by examining the features of an executable piece of code and matching it to …

Ransomware payments in the bitcoin ecosystem

M Paquet-Clouston, B Haslhofer… - Journal of …, 2019 - academic.oup.com
Ransomware can prevent a user from accessing a device and its files until a ransom is paid
to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has …

[HTML][HTML] Information security breaches due to ransomware attacks-a systematic literature review

TR Reshmi - International Journal of Information Management Data …, 2021 - Elsevier
Ransomware is the most predominant cyber threat in the digital infrastructure. The attackers
launching ransomware attacks use different techniques to hijack the users' or organizations' …