A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

Influence of human factors on cyber security within healthcare organisations: A systematic review

S Nifakos, K Chandramouli, CK Nikolaou… - Sensors, 2021 - mdpi.com
Background: Cybersecurity is increasingly becoming a prominent concern among
healthcare providers in adopting digital technologies for improving the quality of care …

A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection

YA Ahmed, B Koçer, S Huda, BAS Al-rimy… - Journal of Network and …, 2020 - Elsevier
Ransomware is a special type of malicious software that encrypts the user's assets and
makes it unavailable to the users until a ransom is paid to the ransomware author. Such …

Automated analysis approach for the detection of high survivable ransomwares

YA Ahmed - 2020 - acikerisim.selcuk.edu.tr
Özet Ransomware is malicious software that encrypts the user-related files and data and
holds them to ransom. Such attacks have become one of the most widespread malwares …

Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm

MA Darwish, E Yafi, MA Al Ghamdi… - Arabian Journal for …, 2020 - Springer
Cloud computing (CC) is a distributed and centralized network of interconnected and
interrelated systems that has emerged as an area of incredible impact, potential, and growth …

Cybercrime in the context of COVID-19

M Chawki - Intelligent Computing: Proceedings of the 2021 …, 2021 - Springer
The ongoing COVID-19 pandemic acts as a major cause of the attention of the whole world.
All the aspects of life in our current world have been impacted by the advancement of …

Ransomware: An Interdisciplinary Technical and Legal Approach

M Robles-Carrillo… - Security and …, 2022 - Wiley Online Library
Ransomware constitutes a prevalent global cybersecurity threat since several years ago, but
it is almost pandemic at present. To a larger extent, the growth of this criminal practice is due …

On the Generalizability of Machine Learning-based Ransomware Detection in Block Storage

N Reategui, R Pletka, D Diamantopoulos - arxiv preprint arxiv …, 2024 - arxiv.org
Ransomware represents a pervasive threat, traditionally countered at the operating system,
file-system, or network levels. However, these approaches often introduce significant …

Dsse: distributed security shielded execution for communicable cyber threats analysis

S Singh, A Lamba, S Rela - International Journal of Current …, 2019 - papers.ssrn.com
Cloud computing is a new computing model which enables individuals and organizations to
attain access to huge computing resources without capital investment. It does mean that …

Ransomware detection based on an improved double-layer negative selection algorithm

T Lu, Y Du, J Wu, Y Bao - Testbeds and Research Infrastructures for the …, 2020 - Springer
The encrypting ransomware using public key cryptography is almost impossible to decrypt,
so early detection and prevention is more important. Signature matching technology has low …