Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
A comprehensive survey on deep learning based malware detection techniques
M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
Ransomware: Recent advances, analysis, challenges and future research directions
C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …
Different institutions such as healthcare, financial, and government have been targeted …
Evaluating large language models in ransomware negotiation: A comparative analysis of chatgpt and claude
T Kumamoto, Y Yoshida, H Fujima - 2023 - researchsquare.com
This study presents a comprehensive analysis of the application of Large Language Models
(LLMs), specifically ChatGPT and Claude, in the context of ransomware negotiation …
(LLMs), specifically ChatGPT and Claude, in the context of ransomware negotiation …
Entropy and memory forensics in ransomware analysis: Utilizing llama-7b for advanced pattern recognition
W Zhang, X Li, T Zhu - Authorea Preprints, 2023 - techrxiv.org
This study investigated the utilization of memory forensics and the Large Language Model
LLaMA-7B for the purpose of detecting and analyzing contemporary ransomware. It …
LLaMA-7B for the purpose of detecting and analyzing contemporary ransomware. It …
Ransomcillin: Leveraging ntfs spare space to recover from ransomware attacks
K Takeuchi, H Fujima, T Kumamoto, Y Yoshida - 2023 - researchsquare.com
This study investigates an innovative method to combat ransomware, leveraging the New
Technology File System (NTFS) spare space in Windows operating systems. The focus is on …
Technology File System (NTFS) spare space in Windows operating systems. The focus is on …
The age of ransomware: A survey on the evolution, taxonomy, and research directions
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …
years, causing significant financial, reputational, and operational damage to individuals and …
Decentralized identity verification system for data access to prevent data exfiltration ransomware
K Takeuchi, T Kumamoto, Y Yoshida, H Fujima - Authorea Preprints, 2023 - techrxiv.org
The escalating sophistication of ransomware has catalyzed the transition from traditional
encryption-focused attacks to more pernicious data exfiltration techniques. This research …
encryption-focused attacks to more pernicious data exfiltration techniques. This research …
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …
sophistication and aggression have increased substantially over the years. Ransomware, as …
A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …