Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
M Al-Hawawreh, M Alazab, MA Ferrag… - Journal of Network and …, 2023 - Elsevier
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
The rise of ransomware and emerging security challenges in the Internet of Things
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …
Review on the security threats of internet of things
Internet of Things (IoT) is being considered as the growth engine for industrial revolution 4.0.
The combination of IoT, cloud computing and healthcare can contribute in ensuring well …
The combination of IoT, cloud computing and healthcare can contribute in ensuring well …
Targeted ransomware: A new cyber threat to edge system of brownfield industrial Internet of Things
M Al-Hawawreh, F Den Hartog… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Much value in a brownfield Industrial Internet of Things (IIoT) implementation resides at its
edge tier, where new types of devices and technologies are deployed to interoperate the …
edge tier, where new types of devices and technologies are deployed to interoperate the …
[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
Opportunities for early detection and prediction of ransomware attacks against industrial control systems
M Gazzan, FT Sheldon - Future Internet, 2023 - mdpi.com
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA)
systems, which control critical infrastructure such as power plants and water treatment …
systems, which control critical infrastructure such as power plants and water treatment …
Ransomware and internet of things: A new security nightmare
SR Zahra, MA Chishti - … on cloud computing, data science & …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has dramatically revolutionized different aspects of living over the
past few years. IoT is a huge network of devices that are able to sense and hold sensitive …
past few years. IoT is a huge network of devices that are able to sense and hold sensitive …
[HTML][HTML] Information security breaches due to ransomware attacks-a systematic literature review
TR Reshmi - International Journal of Information Management Data …, 2021 - Elsevier
Ransomware is the most predominant cyber threat in the digital infrastructure. The attackers
launching ransomware attacks use different techniques to hijack the users' or organizations' …
launching ransomware attacks use different techniques to hijack the users' or organizations' …
A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …
Leveraging deep learning models for ransomware detection in the industrial internet of things environment
M Al-Hawawreh, E Sitnikova - 2019 military communications …, 2019 - ieeexplore.ieee.org
Local Area Network (LAN) workstations that operate at the edge tier of Industrial Internet of
Things systems (IIoT) and have direct or indirect interaction with critical control devices could …
Things systems (IIoT) and have direct or indirect interaction with critical control devices could …