Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data
Ransomware attacks on cloud-encrypted data pose a significant risk to the security and
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
privacy of cloud-based businesses and their consumers. We present RANSOMNET+, a state …
Combatting ransomware in ZephyrOS-activated industrial IoT environments
U Tariq - Heliyon, 2024 - cell.com
The rapid growth of the Industrial Internet of Things (IIoT) has opened up new avenues for
cyber threats, with ransomware being a primary area of concern. In response to this …
cyber threats, with ransomware being a primary area of concern. In response to this …
P4-HLDMC: A novel framework for DDoS and ARP attack detection and mitigation in SD-IoT networks using machine learning, stateful P4, and distributed multi …
Distributed Denial of Service (DDoS) and Address Resolution Protocol (ARP) attacks pose
significant threats to the security of Software-Defined Internet of Things (SD-IoT) networks …
significant threats to the security of Software-Defined Internet of Things (SD-IoT) networks …
LLaMa Assisted Reverse Engineering of Modern Ransomware: A Comparative Analysis with Early Crypto-Ransomware
FE Vasconcelos, GS Almeida - 2023 - researchsquare.com
The evolution of ransomware from crypto-ransomware to sophisticated data theft
ransomware presents new challenges in cybersecurity. This study investigates the strategic …
ransomware presents new challenges in cybersecurity. This study investigates the strategic …
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements
Abstract The Internet of Things (IoT) has the potential to bring unprecedented accessibility
and efficiency to a wide range of critical applications and access control services. With the …
and efficiency to a wide range of critical applications and access control services. With the …
Towards Unveiling Vulnerabilities and Securing IoT Devices: An Ontology-Based Approach
In the rapidly expanding landscape of Internet of Things (IoT), sensors have emerged as
pivotal components, playing a critical role in sensing and data collection. However, this …
pivotal components, playing a critical role in sensing and data collection. However, this …
[PDF][PDF] Insights of machine learning-based threat identification schemes in advanced network system
T Narasimhamurthy, GH Swamy - International Journal of Electrical …, 2024 - academia.edu
An advanced network system (ANS) is characterized by extensive communication features
that can support a sophisticated collaborative network structure. This is essential to hosting …
that can support a sophisticated collaborative network structure. This is essential to hosting …
Complex Proportional Assessment Based Neutrosophic Approach for Ransomware Detection in Cybersecurity IoT System
LA Maghrabi - International Journal of Neutrosophic Science, 2025 - americaspg.com
A neutrosophic set (NS) is an advanced computational technique that accesses uncertain
information via three membership functions. A soft expert set (SES) is derived from the …
information via three membership functions. A soft expert set (SES) is derived from the …
Ransomware Detection in the Internet of Things (IoT): Challenges and Emerging Solutions
ST Albassam, KA Alamoudi… - … Women in Data …, 2024 - ieeexplore.ieee.org
Ransomware attacks cause significant security risks to organizations and individuals, which
can lead to financial loss and reputational damage. Therefore, it is essential to mitigate such …
can lead to financial loss and reputational damage. Therefore, it is essential to mitigate such …