Deep learning and big data technologies for IoT security

MA Amanullah, RAA Habeeb, FH Nasaruddin… - Computer …, 2020 - Elsevier
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …

[HTML][HTML] Ransomware detection, avoidance, and mitigation scheme: A review and future directions

A Kapoor, A Gupta, R Gupta, S Tanwar, G Sharma… - Sustainability, 2021 - mdpi.com
Ransomware attacks have emerged as a major cyber-security threat wherein user data is
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation …

[HTML][HTML] Ransomware early detection: A survey

M Cen, F Jiang, X Qin, Q Jiang, R Doss - Computer Networks, 2024 - Elsevier
In recent years, ransomware attacks have exploded globally, and it has become one of the
most significant cyber threats to digital infrastructure. Such attacks have been targeting …

[HTML][HTML] Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

Ransomware attacks in the context of generative artificial intelligence—an experimental study

F Teichmann - International Cybersecurity Law Review, 2023 - Springer
Ransomware attacks continue to be one of the biggest risks faced by both organizations and
governments. In this experimental study, the author tested how criminals could use …

Keamanan IoT Dengan Deep Learning dan Teknologi Big Data

Z Munawar, NI Putri - TEMATIK, 2020 - jurnal.plb.ac.id
Saat ini dalam kehidupan manusia sangat tergantung dengan teknologi, apalagi ditunjang
dengan perkembangan dari Internet of Things (IoT), yang memungkinkan komunikasi dan …

A basic malware analysis method

I Kara - Computer Fraud & Security, 2019 - Elsevier
With the development and spread of information technologies in recent years, malware has
started to manifest itself as a widespread threat that can affect large networks rather than …

Cyber fraud: Detection and analysis of the crypto-ransomware

K Ilker, M Aydos - 2020 11th IEEE Annual Ubiquitous …, 2020 - ieeexplore.ieee.org
Currently as the widespread use of virtual monetary units (like Bitcoin, Ethereum, Ripple,
Litecoin) has begun, people with bad intentions have been attracted to this area and have …

Targeted Ransomware Attacks and Detection to Strengthen Cybersecurity Strategies

BJ Chinmaya, SA Kudtarkar - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Ransomware attacks have emerged as the most trending malware in recent eras.
Ransomware attacks hold data and devices hostage until a ransom is paid. The proposed …

Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware

A Yu, J Kang, J Morris, E Bertino… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Ransomware attacks have become widespread in the last few years and have affected
many critical industries and infrastructures. Unfortunately, there are no recovery tools that …