Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …
sophistication and aggression have increased substantially over the years. Ransomware, as …
A survey of the recent trends in deep learning based malware detection
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying
malicious activity. Malicious activities potentially lead to a system breach or data …
malicious activity. Malicious activities potentially lead to a system breach or data …
A review of computer vision methods in network security
J Zhao, R Masood, S Seneviratne - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Network security has become an area of significant importance more than ever as
highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure …
highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure …
Intercepting ransomware attacks with staged event-driven access control
T McIntosh - 2022 - opal.latrobe.edu.au
A thesis submitted in total fulfillment of the requirements for the degree of Doctor of
Philosophy to the Department of Computer Science and Information Technology, School of …
Philosophy to the Department of Computer Science and Information Technology, School of …
Resolving the cybersecurity data sharing paradox to scale up cybersecurity via a co-production approach towards data sharing
A Atapour-Abarghouei, AS McGough… - … Conference on Big …, 2020 - ieeexplore.ieee.org
As cybercriminals scale up their operations to increase their profits or inflict greater harm, we
argue that there is an equal need to respond to their threats by scaling up cyber-security. To …
argue that there is an equal need to respond to their threats by scaling up cyber-security. To …
Understanding ransomware actions through behavioral feature analysis
CC Moreira, CS de Sales Jr… - Journal of Communication …, 2022 - jcis.sbrt.org.br
Crypto ransomware attacks have substantially increased in recent years, and owing to their
highly profitable nature, this growth will evidently escalate in the future. To better understand …
highly profitable nature, this growth will evidently escalate in the future. To better understand …
Volenti non fit injuria: Ransomware and its Victims
A Atapour-Abarghouei, S Bonner… - … Conference on Big …, 2019 - ieeexplore.ieee.org
With the recent growth in the number of malicious activities on the internet, cybersecurity
research has seen a boost in the past few years. However, as certain variants of malware …
research has seen a boost in the past few years. However, as certain variants of malware …
Machine learning in automated detection of ransomware: Scope, benefits and challenges
V Thangapandian - Illumination of Artificial Intelligence in Cybersecurity …, 2022 - Springer
Background Ransomware is a special kind of malware which is rapidly blooming around the
world in different forms. In recent times, Ransomware plays havoc in individual and …
world in different forms. In recent times, Ransomware plays havoc in individual and …
A grammar-based behavioral distance measure between ransomware variants
HVD Parunak - IEEE Transactions on Computational Social …, 2021 - ieeexplore.ieee.org
Effective attribution of ransomware attacks requires a way to characterize different variants
and estimates their similarity to one another. Unlike other malware, ransomware deliberately …
and estimates their similarity to one another. Unlike other malware, ransomware deliberately …
[PDF][PDF] Innovative Malware Detection: Practical Swarm Optimization and fuzzyKNN Model in Honeypot Environment.
H Othman, MA Alhija, MA Al Sharaiah - … of Advances in Soft Computing & …, 2024 - i-csrs.org
Effective malware detection remains a critical challenge in cybersecurity. In this study, we
propose an innovative method that combines swarm intelligence through Particle Swarm …
propose an innovative method that combines swarm intelligence through Particle Swarm …