A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism.

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEE Access, 2023 - ieeexplore.ieee.org
The increasing sophistication of malware threats has led to growing concerns in the anti-
malware community, as malware poses a significant danger to online users despite the …

Detection of ransomware attacks using processor and disk usage data

K Thummapudi, P Lama, RV Boppana - IEEE Access, 2023 - ieeexplore.ieee.org
Ransomware often evades antivirus tools, encrypts files, and renders the target computer
and its data unusable. The current approaches to detect such ransomware include …

Ransomware detection using machine learning: A review, research limitations and future directions

J Ispahany, MDR Islam, MZ Islam, MA Khan - IEEE Access, 2024 - ieeexplore.ieee.org
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to
remote work due to the COVID-19 pandemic has led more people to work online, prompting …

Processing 2D barcode data with metaheuristic based CNN models and detection of malicious PDF files

M Toğaçar, B Ergen - Applied Soft Computing, 2024 - Elsevier
Abstract Portable Document Format (PDF) is a file format created to create portable and
printable documents across platforms. PDF files are one of the most widely used application …

A Sysmon Incremental Learning System for Ransomware Analysis and Detection

J Ispahany, MD Islam, MA Khan, MD Islam - arXiv preprint arXiv …, 2025 - arxiv.org
In the face of increasing cyber threats, particularly ransomware attacks, there is a pressing
need for advanced detection and analysis systems that adapt to evolving malware …

Pre-Encryption Ransomware Detection (PERD) Taxonomy, and Research Directions: Systematic Literature Review.

MF Hassan, R Akbar, R Ullah… - International …, 2024 - search.ebscohost.com
Today's era is witnessing an alarming surge in ransomware attacks, propelled by the
increasingly sophisticated obfuscation tools deployed by cybercriminals to evade …

Advanced techniques of malware evasion and bypass in the age of antivirus

K Parveen - International Journal for Electronic Crime Investigation, 2024 - ijeci.lgu.edu.pk
The use of antivirus software as the main line of protection against growing cyber threats
highlights the necessity of comprehending and resolving its limits. This study provides light …

[PDF][PDF] Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions

MDZ ISLAM - 2024 - researchoutput.csu.edu.au
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to
remote work due to the COVID-19 pandemic has led more people to work online, prompting …

Exploring Defensive Security Strategies It Leaders Need to Safeguard Their Information Assets in Private Higher Education: A Qualitative Study

S Steelman - 2024 - search.proquest.com
Private higher educational institutions are at a high risk of cyber-attacks based on the
amount of data they consume about students, their families, donors, faculty, and employees …

Detection of Live Ransomware Attacks Using Processor and Disk Usage Data

AK Thummapudi - 2024 - search.proquest.com
Ransomware attacks continue to be the top risk for organizations today. Recent studies have
focused on the behavioral and runtime analysis of ransomware. However, the existing …