Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
Ransomware detection using machine learning: A survey
A Alraizza, A Algarni - Big Data and Cognitive Computing, 2023 - mdpi.com
Ransomware attacks pose significant security threats to personal and corporate data and
information. The owners of computer-based resources suffer from verification and privacy …
information. The owners of computer-based resources suffer from verification and privacy …
[HTML][HTML] Cryptographic ransomware encryption detection: Survey
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …
Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data
Ransomware attacks on cloud-encrypted data pose a significant risk to the security and
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
AI-based Ransomware Detection: A Comprehensive Review
Ransomware attacks are becoming increasingly sophisticated, thereby rendering
conventional detection methods less effective. Recognizing this challenge, this study …
conventional detection methods less effective. Recognizing this challenge, this study …
[HTML][HTML] Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work
Modern organizations have migrated from localized physical offices to work-from-home
environments. This surge in remote work culture has exponentially increased the demand …
environments. This surge in remote work culture has exponentially increased the demand …
A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks
In today's world, cybersecurity is critical in the field of information technology. With the rise of
cyber-attacks, including ransomware attacks, protecting user data has become a top priority …
cyber-attacks, including ransomware attacks, protecting user data has become a top priority …
A Systematic Literature Review on Blockchain-based Cybersecurity Models for Ransomware Mitigation
AI Fajri, MI Irawan, F Mahananto - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
This systematic literature review (SLR) examines blockchain-based cybersecurity models
designed for ransomware mitigation, addressing the significant threat ransomware poses to …
designed for ransomware mitigation, addressing the significant threat ransomware poses to …
[PDF][PDF] DEVELOPING EFFECTIVE SOLUTIONS: RESEARCH DIRECTIONS AND IMPLEMENTATION STRATEGIES FOR EARLY RANSOMWARE DETECTION
AHR ABOGAMOUS - Journal of Theoretical and Applied Information …, 2024 - jatit.org
Ransomware attacks, employing advanced encryption to hold data hostage, pose a critical
threat to targets ranging from individuals to critical infrastructure. Our study, analyzing over …
threat to targets ranging from individuals to critical infrastructure. Our study, analyzing over …
[PDF][PDF] Zero Trust VPN (ZT-VPN): A Cybersecurity Framework for Modern Enterprises to Enhance IT Security and Privacy in Remote Work Environments
Modern organizations have migrated from localized physical offices to work-from-home
environments. This surge in remote work culture has exponentially increased the demand …
environments. This surge in remote work culture has exponentially increased the demand …