The age of ransomware: A survey on the evolution, taxonomy, and research directions

S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023‏ - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …

A survey on windows-based ransomware taxonomy and detection mechanisms

R Moussaileb, N Cuppens, JL Lanet… - ACM Computing Surveys …, 2021‏ - dl.acm.org
Ransomware remains an alarming threat in the 21st century. It has evolved from being a
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …

Crypto mining attacks in information systems: An emerging threat to cyber security

A Zimba, Z Wang, M Mulenga… - Journal of Computer …, 2020‏ - Taylor & Francis
The popularity of cryptocurrencies has continued to grow drastically over the past decade
and this has drawn significant attention to various threat actors. Cybercriminals are now …

Technical and behavioural training and awareness solutions for mitigating ransomware attacks

A Bello, A Maurushat - Applied Informatics and Cybernetics in Intelligent …, 2020‏ - Springer
Over the years, there has been a significant increase in cyber security risks and
vulnerabilities with one of the most severe threat being ransomware attacks. Ransomware, a …

Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems

M Abdallah, D Woods, P Naghizadeh… - … IEEE Symposium on …, 2022‏ - ieeexplore.ieee.org
We consider interdependent systems managed by multiple defenders that are under the
threat of step**-stone attacks. We model such systems via game-theoretic models and …

Recent advances in cryptovirology: State-of-the-art crypto mining and crypto ransomware attacks

A Zimba, Z Wang, H Chen… - KSII Transactions on …, 2019‏ - koreascience.kr
Original file was jvis_final.tex Page 1 KSII TRANSACTIONS ON INTERNET AND INFORMATION
SYSTEMS VOL. 13, NO. 6, Jun. 2019 3258 Copyright ⓒ 2019 KSII Recent Advances in …

DeepGuard: Deep generative user-behavior analytics for ransomware detection

GO Ganfure, CF Wu, YH Chang… - 2020 IEEE International …, 2020‏ - ieeexplore.ieee.org
In the last couple of years, the move to cyberspace provides a fertile environment for
ransomware criminals like ever before. Notably, since the introduction of WannaCry …

Why ransomware needs a human touch

A Ferreira - 2018 International Carnahan Conference on …, 2018‏ - ieeexplore.ieee.org
Ransomware is currently one of the biggest threats in malware attacks. Although the first
known attack occurred in 1989, only in the last 6 years has this threat greatly increased and …

The age of ransomware: Understanding ransomware and its countermeasures.

MU Kiru, AB Jantan - Artificial Intelligence and Security Challenges in …, 2019‏ - igi-global.com
This chapter focuses on the world's most frightening cybersecurity threat known as
ransomware. Experts popularly describe ransomware as scareware that makes data and …

[PDF][PDF] Towards data resilience: The analytical case of crypto ransomware data recovery techniques

A Zimba, Z Wang, L Simukonda - International Journal of Information …, 2018‏ - academia.edu
Crypto ransomware has earned an infamous reputation in the malware landscape and its
sound sends a lot of shivers to many despite being a new entrant. The media has not helped …