Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
Opportunities for early detection and prediction of ransomware attacks against industrial control systems
M Gazzan, FT Sheldon - Future Internet, 2023 - mdpi.com
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA)
systems, which control critical infrastructure such as power plants and water treatment …
systems, which control critical infrastructure such as power plants and water treatment …
[HTML][HTML] Between a rock and a hard (ening) place: Cyber insurance in the ransomware era
Cyber insurance and ransomware are two of the most studied areas within security research
and practice to date, and their interplay continues to raise concerns in industry and …
and practice to date, and their interplay continues to raise concerns in industry and …
A framework for cyber-risk insurance against ransomware: A mixed-method approach
A Mukhopadhyay, S Jain - International Journal of Information Management, 2024 - Elsevier
Hackers follow a standard cyber kill chain process and install ransomware payloads using
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …
Understanding the state of criminological scholarship on cybercrimes
TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …
The evolving menace of ransomware: A comparative analysis of pre-pandemic and mid-pandemic attacks
Drawing upon direct interviews and secondary sources, this article presents a qualitative
comparative analysis of 39 ransomware attacks, 26 of which occurred shortly before the …
comparative analysis of 39 ransomware attacks, 26 of which occurred shortly before the …
[HTML][HTML] Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach
S Kemp - Computers & Security, 2023 - Elsevier
Cybercrime is a pressing concern for governments and businesses around the globe, but
little is known about what policy interventions work to prevent and mitigate threats to …
little is known about what policy interventions work to prevent and mitigate threats to …
Developing resilient cyber-physical systems: a review of state-of-the-art malware detection approaches, gaps, and future directions
Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains
such as smart grid, healthcare, the military, and telecommunication. These systems are …
such as smart grid, healthcare, the military, and telecommunication. These systems are …
Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss
In recent years, ransomware attacks have led to disastrous consequences for victims, not
just due to the payment ransom amount but also due to the recovery costs associated with …
just due to the payment ransom amount but also due to the recovery costs associated with …
How cyber insurance influences the ransomware payment decision: theory and evidence
In this paper, we analyse how cyber insurance influences the cost–benefit decision-making
process of a ransomware victim. Specifically, we ask whether organisations with cyber …
process of a ransomware victim. Specifically, we ask whether organisations with cyber …