Opportunities for early detection and prediction of ransomware attacks against industrial control systems
M Gazzan, FT Sheldon - Future Internet, 2023 - mdpi.com
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA)
systems, which control critical infrastructure such as power plants and water treatment …
systems, which control critical infrastructure such as power plants and water treatment …
A survey on ransomware threats: Contrasting static and dynamic analysis methods
Q Kang, Y Gu - 2023 - preprints.org
The proliferation of ransomware poses a significant threat to global cybersecurity. This study
presents a comprehensive review of the methodologies employed in the detection and …
presents a comprehensive review of the methodologies employed in the detection and …
Analyzing Data Theft Ransomware Traffic Patterns Using BERT
G Almeida, F Vasconcelos - 2023 - preprints.org
This research looks into the evolving dynamics of ransomware, shifting from conventional
encryption-based attacks to sophisticated data exfiltration strategies. Employing the …
encryption-based attacks to sophisticated data exfiltration strategies. Employing the …
PANGA: Attention-based Principal Neighborhood Aggregation for Forecasting Future Cyber Attacks
AK Trivedi, P Bagade - … on Trust, Security and Privacy in …, 2023 - ieeexplore.ieee.org
There has been a significant spike in cyber attacks with serious economic, security, and
privacy concerns recently. The effectiveness of older NIDS (Network Intrusion Detection …
privacy concerns recently. The effectiveness of older NIDS (Network Intrusion Detection …
Enhancing Ransomware Detection: A Windows API Min Max Relevance Refinement Approach
Q Kang, Y Gu - 2023 - preprints.org
Ransomware constitutes a distinctive category of pernicious software that sequesters a
user's digital assets by encryption, holding them hostage until a sum is extorted from the …
user's digital assets by encryption, holding them hostage until a sum is extorted from the …
[PDF][PDF] INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING
ALT Shahad, QA Al-Haija - researchgate.net
Mobile devices, in particular, have revolutionized how financial transactions are conducted,
making secure mobile payment (SMP) a primary method for completing transactions. The …
making secure mobile payment (SMP) a primary method for completing transactions. The …