A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

The age of ransomware: A survey on the evolution, taxonomy, and research directions

S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …

A survey of crypto ransomware attack detection methodologies: an evolving outlook

A Alqahtani, FT Sheldon - Sensors, 2022 - mdpi.com
Recently, ransomware attacks have been among the major threats that target a wide range
of Internet and mobile users throughout the world, especially critical cyber physical systems …

[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention

M Humayun, NZ Jhanjhi, A Alsayat… - Egyptian Informatics …, 2021 - Elsevier
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …

Ransomware detection, avoidance, and mitigation scheme: a review and future directions

A Kapoor, A Gupta, R Gupta, S Tanwar, G Sharma… - Sustainability, 2021 - mdpi.com
Ransomware attacks have emerged as a major cyber-security threat wherein user data is
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation …

A combination method for android malware detection based on control flow graphs and machine learning algorithms

Z Ma, H Ge, Y Liu, M Zhao, J Ma - IEEE access, 2019 - ieeexplore.ieee.org
Android malware severely threaten system and user security in terms of privilege escalation,
remote control, tariff theft, and privacy leakage. Therefore, it is of great importance and …

[HTML][HTML] Information security breaches due to ransomware attacks-a systematic literature review

TR Reshmi - International Journal of Information Management Data …, 2021 - Elsevier
Ransomware is the most predominant cyber threat in the digital infrastructure. The attackers
launching ransomware attacks use different techniques to hijack the users' or organizations' …

The rise of ransomware: Forensic analysis for windows based ransomware attacks

I Kara, M Aydos - Expert Systems with Applications, 2022 - Elsevier
While information technologies grow and propagate worldwide, malwares have modified
and risen their efficiency towards information system. Recently, the attackers have started to …

Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection

MS Abbasi, H Al-Sahaf, M Mansoori, I Welch - Applied Soft Computing, 2022 - Elsevier
Ransomware is malware that encrypts the victim's data and demands a ransom for a
decryption key. The increasing number of ransomware families and their variants renders …

A survey on windows-based ransomware taxonomy and detection mechanisms

R Moussaileb, N Cuppens, JL Lanet… - ACM Computing Surveys …, 2021 - dl.acm.org
Ransomware remains an alarming threat in the 21st century. It has evolved from being a
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …