IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review
Ransomware has emerged as a serious and evolving cybersecurity threat. This research
paper examines the advancements and improvements observed in ransomware attacks, as …
paper examines the advancements and improvements observed in ransomware attacks, as …
Comparison of entropy calculation methods for ransomware encrypted file identification
SR Davies, R Macfarlane, WJ Buchanan - Entropy, 2022 - mdpi.com
Ransomware is a malicious class of software that utilises encryption to implement an attack
on system availability. The target's data remains encrypted and is held captive by the …
on system availability. The target's data remains encrypted and is held captive by the …
Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach
A Raj, V Narayan, V Muskan, A Sani… - Security and …, 2024 - Wiley Online Library
Ransomware is a menace to the vibrant digital ecosystem. The exponential growth in
ransomware attacks, its detrimental impacts, and the ever‐changing methods adopted by …
ransomware attacks, its detrimental impacts, and the ever‐changing methods adopted by …
Algebraic structures induced by the insertion and detection of malware
AM Cañadas, OM Mendez, JDC Vega - Computation, 2023 - mdpi.com
Since its introduction, researching malware has had two main goals. On the one hand,
malware writers have been focused on developing software that can cause more damage to …
malware writers have been focused on developing software that can cause more damage to …
Comparison Of Common Mathematical Techniques Used In The Calculation Of File Entropy
SR Davies, R Macfarlane - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The research described in this paper focuses on the use of mathematical techniques to
identify high entropy encrypted files generated during the execution of ransomware. A …
identify high entropy encrypted files generated during the execution of ransomware. A …
Cloud Backup Architectures Resistant to Ransomware Attacks
TM Egge, O Jonuzi, ÅH Stemland - 2022 - ntnuopen.ntnu.no
Løsepengevirusangrep har sett en økning globalt de siste årene. De representerer en
alvorlig trussel mot enhver bedrifts data, omdømme og operasjonelle kapabiliteter …
alvorlig trussel mot enhver bedrifts data, omdømme og operasjonelle kapabiliteter …
Mitigating Ransomware Attacks: A Multi-Tiered Approach to Defence
A Raj, V Narayan, V Muskan, A Sani, P Sharma… - Available at SSRN … - papers.ssrn.com
Ransomware poses a significant threat to the digital ecosystem, with increasing attacks and
evolving methods employed by threat actors. This study aims to comprehensively …
evolving methods employed by threat actors. This study aims to comprehensively …