A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …
The age of ransomware: A survey on the evolution, taxonomy, and research directions
S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …
years, causing significant financial, reputational, and operational damage to individuals and …
A survey of crypto ransomware attack detection methodologies: an evolving outlook
A Alqahtani, FT Sheldon - Sensors, 2022 - mdpi.com
Recently, ransomware attacks have been among the major threats that target a wide range
of Internet and mobile users throughout the world, especially critical cyber physical systems …
of Internet and mobile users throughout the world, especially critical cyber physical systems …
[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
Ransomware detection, avoidance, and mitigation scheme: a review and future directions
Ransomware attacks have emerged as a major cyber-security threat wherein user data is
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation …
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation …
A combination method for android malware detection based on control flow graphs and machine learning algorithms
Z Ma, H Ge, Y Liu, M Zhao, J Ma - IEEE access, 2019 - ieeexplore.ieee.org
Android malware severely threaten system and user security in terms of privilege escalation,
remote control, tariff theft, and privacy leakage. Therefore, it is of great importance and …
remote control, tariff theft, and privacy leakage. Therefore, it is of great importance and …
[HTML][HTML] Information security breaches due to ransomware attacks-a systematic literature review
TR Reshmi - International Journal of Information Management Data …, 2021 - Elsevier
Ransomware is the most predominant cyber threat in the digital infrastructure. The attackers
launching ransomware attacks use different techniques to hijack the users' or organizations' …
launching ransomware attacks use different techniques to hijack the users' or organizations' …
The rise of ransomware: Forensic analysis for windows based ransomware attacks
While information technologies grow and propagate worldwide, malwares have modified
and risen their efficiency towards information system. Recently, the attackers have started to …
and risen their efficiency towards information system. Recently, the attackers have started to …
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection
Ransomware is malware that encrypts the victim's data and demands a ransom for a
decryption key. The increasing number of ransomware families and their variants renders …
decryption key. The increasing number of ransomware families and their variants renders …
A survey on windows-based ransomware taxonomy and detection mechanisms
R Moussaileb, N Cuppens, JL Lanet… - ACM Computing Surveys …, 2021 - dl.acm.org
Ransomware remains an alarming threat in the 21st century. It has evolved from being a
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …