[HTML][HTML] Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges

M Benmalek - Internet of Things and Cyber-Physical Systems, 2024 - Elsevier
Ransomware attacks have emerged as one of the most significant cyberthreats faced by
organizations worldwide. In recent years, ransomware has also started to target critical …

[HTML][HTML] Ransomware early detection: A survey

M Cen, F Jiang, X Qin, Q Jiang, R Doss - Computer Networks, 2024 - Elsevier
In recent years, ransomware attacks have exploded globally, and it has become one of the
most significant cyber threats to digital infrastructure. Such attacks have been targeting …

[HTML][HTML] Digital forensic of Maze ransomware: A case of electricity distributor enterprise in ASEAN

K Chimmanee, S Jantavongso - Expert Systems with Applications, 2024 - Elsevier
Due to the Coronavirus pandemic (COVID-19) throughout 2020–22, remote working has
played an important part in organizations, businesses, and agencies worldwide. This …

[HTML][HTML] Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring

JA Gómez-Hernández, P García-Teodoro - Sensors, 2024 - mdpi.com
Given the high relevance and impact of ransomware in companies, organizations, and
individuals around the world, coupled with the widespread adoption of mobile and IoT …

Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective

MM Aslam, A Tufail, RAAHM Apong, LC De Silva… - IEEE …, 2024 - ieeexplore.ieee.org
Technological advancement plays a crucial role in our daily lives and constantly transforms
the industrial sector. However, these technologies also introduce new security vulnerabilities …

Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware

A Yu, J Kang, J Morris, E Bertino… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Ransomware attacks have become widespread in the last few years and have affected
many critical industries and infrastructures. Unfortunately, there are no recovery tools that …

Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models

E Pelofske, V Urias, LM Liebrock - arXiv preprint arXiv:2404.15681, 2024 - arxiv.org
Generative pre-trained transformers (GPT's) are a type of large language machine learning
model that are unusually adept at producing novel, and coherent, natural language. In this …

[HTML][HTML] TTDAT: Two-Step Training Dual Attention Transformer for Malware Classification Based on API Call Sequences

P Wang, T Lin, D Wu, J Zhu, J Wang - Applied Sciences, 2023 - mdpi.com
The surge in malware threats propelled by the rapid evolution of the internet and smart
device technology necessitates effective automatic malware classification for robust system …

Mitigating Data Exfiltration Ransomware through Advanced Decoy File Strategies

S Liu, X Chen - 2023 - researchsquare.com
This study introduces an advanced decoy file strategy utilizing Generative Adversarial
Networks (GANs) to combat data exfiltration ransomware threats. Focused on creating highly …

[PDF][PDF] An Alternative Static Taint Analysis Framework to Detect PHP Web Shell-Based Web Attacks.

K Suwais, AA Hnaif, S Almanasra - … Journal of Advances in Soft Computing …, 2023 - i-csrs.org
Web shell attacks through malicious PHP scripts allow attackers to execute system
commands remotely and take control of web servers. Most existing PHP shell detection …