[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
[PDF][PDF] Ransomware, threat and detection techniques: A review
S Kok, A Abdullah, N Jhanjhi… - Int. J. Comput. Sci. Netw …, 2019 - academia.edu
The popularity of ransomware has created a unique ecosystem of cybercriminals. Therefore,
the objectives of this paper are to provide a thorough understanding of ransomware's threat …
the objectives of this paper are to provide a thorough understanding of ransomware's threat …
[PDF][PDF] Disposition of youth in predicting sustainable development goals using the neuro-fuzzy and random forest algorithms
This paper evaluates the inclination of Asian youth regarding the achievement of
Sustainable Development Goals (SDGs). As the young population of a country holds the key …
Sustainable Development Goals (SDGs). As the young population of a country holds the key …
[HTML][HTML] Early detection of crypto-ransomware using pre-encryption detection algorithm
SH Kok, A Abdullah, NZ Jhanjhi - … of King Saud University-Computer and …, 2022 - Elsevier
Crypto ransomware is a type of malware that locks its victim's file for ransom using an
encryption algorithm. Its popularity has risen at an alarming rate among the cyber security …
encryption algorithm. Its popularity has risen at an alarming rate among the cyber security …
Evaluation metric for crypto-ransomware detection using machine learning
SH Kok, A Azween, NZ Jhanjhi - Journal of Information Security and …, 2020 - Elsevier
Ransomware is a type of malware that blocks access to its victim's resources until a ransom
is paid. Crypto-ransomware is a type of ransomware that blocks access to its victim's files by …
is paid. Crypto-ransomware is a type of ransomware that blocks access to its victim's files by …
Cyber security issues and challenges for smart cities: A survey
B Hamid, NZ Jhanjhi, M Humayun… - … and Statistics (MACS …, 2019 - ieeexplore.ieee.org
The increasing need and implementation of Information Communication Technologies (ICT)
in urban infrastructure have led to greater attention in smart cities. Smart cities make use of …
in urban infrastructure have led to greater attention in smart cities. Smart cities make use of …
Prevention of crypto-ransomware using a pre-encryption detection algorithm
Ransomware is a relatively new type of intrusion attack, and is made with the objective of
extorting a ransom from its victim. There are several types of ransomware attacks, but the …
extorting a ransom from its victim. There are several types of ransomware attacks, but the …
Design and testing novel one-class classifier based on polynomial interpolation with application to networking security
P Dini, A Begni, S Ciavarella, E De Paoli… - IEEE …, 2022 - ieeexplore.ieee.org
This work exploits the concept of one-class classifier applied to the problem of anomaly
detection in communication networks. The article presents the design of an innovative …
detection in communication networks. The article presents the design of an innovative …
Proposing a rank and wormhole attack detection framework using machine learning
Internet of Things (IoT) is a paradigm in digital technology which is prevalently
revolutionizing various sectors like healthcare, military, business and more. However, the …
revolutionizing various sectors like healthcare, military, business and more. However, the …
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
Machine learning has become widely adopted as a strategy for dealing with a variety of
cybersecurity issues, ranging from insider threat detection to intrusion and malware …
cybersecurity issues, ranging from insider threat detection to intrusion and malware …