Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

Hybrid cyber defense strategies using Honey-X: A survey

X Qin, F Jiang, M Cen, R Doss - Computer Networks, 2023 - Elsevier
The development and adoption of network technologies reshape our daily life; however,
network-connected devices have become popular targets of cybercrimes. Honey-X-based …

An analysis of conti ransomware leaked source codes

S Alzahrani, Y Xiao, W Sun - IEEE Access, 2022 - ieeexplore.ieee.org
In recent years, there has been an increase in ransomware attacks worldwide. These attacks
aim to lock victims' machines or encrypt their files for ransom. These kinds of ransomware …

A taxonomy for threat actors' delivery techniques

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022 - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …

Cyber Kill Chain Analysis Using Artificial Intelligence

A Shehu, M Umar, A Aliyu - Asian Journal of Research in …, 2023 - asian.go4sending.com
Artificial Intelligence (AI) tools are promising multifaceted techniques for addressing the most
mundane tasks for greater efficiency and high productivity. Cyber security space is one of …

[HTML][HTML] Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023

S Hamid, MN Huda - Social Sciences & Humanities Open, 2025 - Elsevier
Data breaches in the government sector are severe threats to cybersecurity and illegal acts
that flagrantly violate security and privacy laws. It undermines public trust in government …

Técnicas Avanzadas de Ciberseguridad: Integración y Evolución de la Kill Chain en Diversos Escenarios

JD Bermudez, JJ Castro, DA Peralta… - arXiv preprint arXiv …, 2023 - arxiv.org
The document provides an in-depth analysis of the main attack chain models used in
cybersecurity, including the Lockheed Martin Cyber Kill Chain framework, the MITER …

Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks

M Zewdie, A Girma, TM Sitote - 2024 International Conference …, 2024 - ieeexplore.ieee.org
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational
data, systems, computers, and networks from unauthorized access. However, the incressing …

An Empirical Study of Ransomware Vulnerabilities Descriptions

C Lanza, A Lahmadi, F Osmond - 10th International Conference on …, 2024 - inria.hal.science
Cyber threat awareness requires the building of an accurate knowledge and analysis of the
vulnerabilities used by the attackers and their respective attack toolkits. Ransomware are …

Innovating Threat Detection: Behavioral

PR Kashyap, PR Katti, BP Hrishikesh… - … Soft Computing and …, 2024 - books.google.com
In an era defined by the relentless evolution of cyber threats, the demand for precise and
resilient malware classification and identification has reached a paramount level …