IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review

SA Wadho, A Yichiet, ML Gan, LC Kang… - … and Data Sciences …, 2023 - ieeexplore.ieee.org
Ransomware has emerged as a serious and evolving cybersecurity threat. This research
paper examines the advancements and improvements observed in ransomware attacks, as …

Comparison of entropy calculation methods for ransomware encrypted file identification

SR Davies, R Macfarlane, WJ Buchanan - Entropy, 2022 - mdpi.com
Ransomware is a malicious class of software that utilises encryption to implement an attack
on system availability. The target's data remains encrypted and is held captive by the …

Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach

A Raj, V Narayan, V Muskan, A Sani… - Security and …, 2024 - Wiley Online Library
Ransomware is a menace to the vibrant digital ecosystem. The exponential growth in
ransomware attacks, its detrimental impacts, and the ever‐changing methods adopted by …

Algebraic structures induced by the insertion and detection of malware

AM Cañadas, OM Mendez, JDC Vega - Computation, 2023 - mdpi.com
Since its introduction, researching malware has had two main goals. On the one hand,
malware writers have been focused on developing software that can cause more damage to …

Comparison Of Common Mathematical Techniques Used In The Calculation Of File Entropy

SR Davies, R Macfarlane - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The research described in this paper focuses on the use of mathematical techniques to
identify high entropy encrypted files generated during the execution of ransomware. A …

Cloud Backup Architectures Resistant to Ransomware Attacks

TM Egge, O Jonuzi, ÅH Stemland - 2022 - ntnuopen.ntnu.no
Løsepengevirusangrep har sett en økning globalt de siste årene. De representerer en
alvorlig trussel mot enhver bedrifts data, omdømme og operasjonelle kapabiliteter …

Mitigating Ransomware Attacks: A Multi-Tiered Approach to Defence

A Raj, V Narayan, V Muskan, A Sani, P Sharma… - Available at SSRN … - papers.ssrn.com
Ransomware poses a significant threat to the digital ecosystem, with increasing attacks and
evolving methods employed by threat actors. This study aims to comprehensively …