Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism.
The increasing sophistication of malware threats has led to growing concerns in the anti-
malware community, as malware poses a significant danger to online users despite the …
malware community, as malware poses a significant danger to online users despite the …
E2E-RDS: Efficient End-to-End ransomware detection system based on Static-Based ML and Vision-Based DL approaches
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In
recent years various malware detection and classification approaches have been proposed …
recent years various malware detection and classification approaches have been proposed …
AI-based ransomware detection: A comprehensive review
Ransomware attacks are becoming increasingly sophisticated, thereby rendering
conventional detection methods less effective. Recognizing this challenge, this study …
conventional detection methods less effective. Recognizing this challenge, this study …
Enhancing Cloud Computing Analysis: A CCE-Based HTTP-GET Log Dataset
The Hypertext Transfer Protocol (HTTP) is a common target of distributed denial-of-service
(DDoS) attacks in today's cloud computing environment (CCE). However, most existing …
(DDoS) attacks in today's cloud computing environment (CCE). However, most existing …
Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
S Rani, K Tripathi, A Kumar - International Journal on Interactive Design …, 2023 - Springer
In the last decade, the number of computer malware has grown rapidly. Currently,
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
An intelligent ransomware attack detection and classification using dual vision transformer with Mantis Search Split Attention Network
K Ashwini, KB Nagasundara - Computers and Electrical Engineering, 2024 - Elsevier
Ransomware attacks pose significant cybersecurity threats, compromising computer
systems, data centers and various applications across sectors. Their sophistication …
systems, data centers and various applications across sectors. Their sophistication …
[PDF][PDF] Comparative analysis of machine learning models for PDF malware detection: Evaluating different training and testing criteria
The proliferation of maliciously coded documents as file transfers increase has led to a rise
in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major …
in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major …
Ransomware Attack Detection in the Internet of Things using Machine Learning Approaches
Ransomware is a well-known virus variant that has become increasingly prevalent because
of the severe and long-lasting damage it causes to its users. Because ransomware causes …
of the severe and long-lasting damage it causes to its users. Because ransomware causes …
Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions
In cybersecurity, personal data breaches have become one of the significant issues. This
fact indicates that data breaches require unique detection systems, techniques, and …
fact indicates that data breaches require unique detection systems, techniques, and …