Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
[Retracted] Integration of Artificial Intelligence and Blockchain Technology in Healthcare and Agriculture
Over the last decade, the healthcare sector has accelerated its digitization and electronic
health records (EHRs). As information technology progresses, the notion of intelligent health …
health records (EHRs). As information technology progresses, the notion of intelligent health …
[Retracted] Contextualization of Trait Nexus and Gene Action for Quantitative and Qualitative Characteristics in Indian Mustard
SP Chand, S Debnath, M Rahimi… - Journal of Food …, 2022 - Wiley Online Library
After soybean and palm oil, the world's third largest oil seed crop is rapeseed mustard. Out
of the seven consumable oil seed crops grown in India, rapeseed mustard is responsible for …
of the seven consumable oil seed crops grown in India, rapeseed mustard is responsible for …
Ransomware detection using machine learning: A survey
A Alraizza, A Algarni - Big Data and Cognitive Computing, 2023 - mdpi.com
Ransomware attacks pose significant security threats to personal and corporate data and
information. The owners of computer-based resources suffer from verification and privacy …
information. The owners of computer-based resources suffer from verification and privacy …
Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data
Ransomware attacks on cloud-encrypted data pose a significant risk to the security and
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
Blockchain and AI-empowered healthcare insurance fraud detection: an analysis, architecture, and future prospects
Nowadays, health insurance has become an essential part of people's lives as the number
of health issues increases. Healthcare emergencies can be troublesome for people who …
of health issues increases. Healthcare emergencies can be troublesome for people who …
[PDF][PDF] The evolution of ransomware: tactics, techniques, and mitigation strategies
G Nagar - International Journal of Scientific Research and …, 2024 - academia.edu
Ransomware has developed into one of the most dangerous cyber threats. It is developed
for the purpose of encrypting the data, and the owner is to pay the specified amount of …
for the purpose of encrypting the data, and the owner is to pay the specified amount of …
Improving ransomware detection based on portable executable header using xception convolutional neural network
All malware are harmful to computer systems; however, crypto-ransomware specifically
leads to irreparable data loss and causes substantial economic prejudice. Ransomware …
leads to irreparable data loss and causes substantial economic prejudice. Ransomware …
Crypto-ransomware: A revision of the state of the art, advances and challenges
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …
knowledge of it as much as possible, this work is mainly aimed at diving into and …