Crypto-ransomware: A revision of the state of the art, advances and challenges
JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …
knowledge of it as much as possible, this work is mainly aimed at diving into and …
Malware detection with artificial intelligence: A systematic literature review
In this survey, we review the key developments in the field of malware detection using AI and
analyze core challenges. We systematically survey state-of-the-art methods across five …
analyze core challenges. We systematically survey state-of-the-art methods across five …
From text to mitre techniques: Exploring the malicious use of large language models for generating cyber attack payloads
This research article critically examines the potential risks and implications arising from the
malicious utilization of large language models (LLM), focusing specifically on ChatGPT and …
malicious utilization of large language models (LLM), focusing specifically on ChatGPT and …
HiPeR-Early detection of a ransomware attack using hardware performance counters
Ransomware has been one of the most prevalent forms of malware over the previous
decade, and it continues to be one of the most significant threats today. Recently …
decade, and it continues to be one of the most significant threats today. Recently …
Adapt: Adaptive camouflage based deception orchestration for trapping advanced persistent threats
Honeypots serve as a valuable deception technology, enabling security teams to gain
insights into the behaviour patterns of attackers and investigate cyber security breaches …
insights into the behaviour patterns of attackers and investigate cyber security breaches …
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
PVS Charan, G Ratnakaram, H Chunduri… - Computers & …, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence-
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology
Advanced Persistent Threat (APT) is a type of cyber attack that infiltrates a targeted
organization and exfiltrates sensitive data over an extended period of time or to cause …
organization and exfiltrates sensitive data over an extended period of time or to cause …
Applying moving target defense against data theft ransomware on windows os
S Liu, X Chen - 2023 - preprints.org
This study addresses the escalating threat of data theft ransomware, a form of cyberattack
that exfiltrates sensitive information from victim networks and demands ransom for its non …
that exfiltrates sensitive information from victim networks and demands ransom for its non …
RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost
Over the last decade, there has been a rise in cyberattacks, particularly ransomware,
causing significant disruption and financial repercussions across public and private sectors …
causing significant disruption and financial repercussions across public and private sectors …
Mitigating data exfiltration ransomware through advanced decoy file strategies
S Liu, X Chen - 2023 - researchsquare.com
This study introduces an advanced decoy file strategy utilizing Generative Adversarial
Networks (GANs) to combat data exfiltration ransomware threats. Focused on creating highly …
Networks (GANs) to combat data exfiltration ransomware threats. Focused on creating highly …