The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ransomware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2005-2016 (30) 2017 (43) 2018 (95) 2019 (88) 2020 (100) 2021 (101) 2022 (128) 2023 (137) 2024 (42)
Publication types (Num. hits)
article(377) book(2) data(3) incollection(4) inproceedings(373) phdthesis(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7 occurrences of 7 keywords

Results
Found 764 publication records. Showing 764 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
46Cristian Pascariu, Ionut-Daniel Barbu Ransomware Honeypot: Honeypot solution designed to detect a ransomware infection identify the ransomware family. Search on Bibsonomy ECAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Globus Alliance, Global Grid Forum, ransomware, essay-grading software, predictive model-building, self-replicating robots, grid computing, robotics, standards, software, microprocessors, Web security, hackers
31Md. Ahsan Ayub, Ambareen Siraj Understanding the Behavior of Ransomware: An I/O Request Packet (IRP) Driven Study on Ransomware Detection against Execution Time. Search on Bibsonomy CIC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
31Ilker Kara, Murat Aydos The rise of ransomware: Forensic analysis for windows based ransomware attacks. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Donghyun Min, Yungwoo Ko, Ryan Walker, Junghee Lee, Youngjae Kim 0001 A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Erick Galinkin Winning the Ransomware Lottery: A Game-Theoretic Model for Mitigating Ransomware Attacks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
31Erick Galinkin Winning the Ransomware Lottery - A Game-Theoretic Approach to Preventing Ransomware Attacks. Search on Bibsonomy GameSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
31D. Arivudainambi, K. A. Varun Kumar, R. Vinoth Kumar, P. Visu Ransomware Traffic Classification Using Deep Learning Models: Ransomware Traffic Classification. Search on Bibsonomy Int. J. Web Portals The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Ziya Alper Genç, Gabriele Lenzini Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Zhen Li 0025, Qi Liao 0002 Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Ahmad O. Almashhadani, Mustafa Kaiiali, Sakir Sezer, Philip O'Kane A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Nitin Naik, Paul Jenkins, Jonathan Gillett, Haralambos Mouratidis, Kshirasagar Naik, Jingping Song Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering. Search on Bibsonomy SSCI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices. Search on Bibsonomy J. Inf. Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Mingcan Cen, Frank Jiang 0001, Xingsheng Qin, Qinghong Jiang, Robin Doss Ransomware early detection: A survey. Search on Bibsonomy Comput. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Davide Berardi, Saverio Giallorenzo, Andrea Melis 0001, Simone Melloni, Marco Prandini Ranflood: A mitigation tool based on the principles of data flooding against ransomware. Search on Bibsonomy SoftwareX The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Umara Urooj, Bander Ali Saleh Al-Rimy, Anazida Binti Zainal, Faisal Saeed, Abdelzahir Abdelmaboud, Wamda Nagmeldin Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Arunabha Mukhopadhyay, Swati Jain A framework for cyber-risk insurance against ransomware: A mixed-method approach. Search on Bibsonomy Int. J. Inf. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Dan Li 0028, Wenbo Shi, Ning Lu, Sang-Su Lee, Sokjoon Lee ARdetector: android ransomware detection framework. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Moutaz Alazab Android ransomware detection using binary Jaya optimization algorithm. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15B. N. Chaithanya, S. H. Brahmananda Revolutionizing ransomware detection and criticality assessment: Multiclass hybrid machine learning and semantic similarity-based end2end solution. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Tien Quang Dam, Nghia Thinh Nguyen, Viet Trung Le, Duc Tran Le, Sylvestre Uwizeyemungu, Thang Le Dinh Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Martin Dukek Ransomware-as-a-Service. Search on Bibsonomy Datenschutz und Datensicherheit (dud) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Mohammed Rauf Ali Khan Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. Search on Bibsonomy Secur. Priv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki, Marianne A. Azer A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Mazen Gazzan, Frederick T. Sheldon An Incremental Mutual Information-Selection Technique for Early Ransomware Detection. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Omar Dib, Zhenghan Nan, Jinkua Liu Machine learning-based ransomware classification of Bitcoin transactions. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Alex Zarifis, Xusen Cheng, Uchitha Jayawickrama, Simone Corsi Can global, extended and repeated ransomware attacks overcome the users status quo bias and cause a switch of system. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Jan von der Assen, Chao Feng, Alberto Huertas Celdrán, Róbert Oles, Gérôme Bovet, Burkhard Stiller GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Ali Mehrban, Shirin Karimi Geransayeh Ransomware threat mitigation through network traffic analysis and machine learning techniques. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Salko Korac, Leandros Maglaras, Naghmeh Moradpoor, Bill Buchanan 0001, Berk Canberk Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Mike Wa Nkongolo, Mahmut Tokmak Ransomware detection using stacked autoencoder for feature selection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Giyoon Kim, Soojin Kang, Seungjun Baek 0002, Kimoon Kim, Jongsung Kim A Method for Decrypting Data Infected with Rhysida Ransomware. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Mike Nkongolo Ransomware Detection Dynamics: Insights and Implications. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Dionysios Diamantopolous, Roman A. Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis WannaLaugh: A Configurable Ransomware Emulator - Learning to Mimic Malicious Storage Traces. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Muna Al-Hawawreh, Mamoun Alazab, Mohamed Amine Ferrag, M. Shamim Hossain Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Stephen S. Kirkman, Steven Fulton, Jeffrey Hemmes, Christopher Mark Garcia, Justin C. Wilson A Blockchain Architecture to Increase the Resilience of Industrial Control Systems from the Effects of a Ransomware Attack: A Proposal and Initial Results. Search on Bibsonomy ACM Trans. Cyber Phys. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone Explainable Ransomware Detection with Deep Learning Techniques. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hashida Haidros Rahima Manzil, S. Manohar Naik Android ransomware detection using a novel hamming distance based feature selection. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Stephen Gilbert, Francesco Ricciardi, Tauseef Mehrali, Constantinos Patsakis Can we learn from an imagined ransomware attack on a hospital at home platform? Search on Bibsonomy npj Digit. Medicine The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta Deception in double extortion ransomware attacks: An analysis of profitability and credibility. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Damien Warren Fernando, Nikos Komninos FeSAD ransomware detection framework with machine learning using adaption to concept drift. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Amnah Albin Ahmed, Afrah Shaahid, Fatima Alnasser, Shahad Alfaddagh, Shadha Binagag, Deemah A. Alqahtani Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Jiseok Bang, Jeong Nyeo Kim, Seungkwang Lee Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Abdullah Alqahtani 0003, Frederick T. Sheldon eMIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Laxmi Bhagwat, Balaji Patil Behavioural analysis and results of malware and ransomware using optimal behavioural feature set. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Xizhen Deng, Mingcan Cen, M. Jiang, Meiqu Lu Ransomware early detection using deep reinforcement learning on portable executable header. Search on Bibsonomy Clust. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond An Empirical Study of Ransomware Vulnerabilities Descriptions. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Truong (Jack) P. Luu, Michael Jones, Binny Samuel The Effects of Dark Triad Traits and Perceived Law Enforcement Competence in Responding to Ransomware Attacks. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
15W. Alec Cram, Albert Chan, Jonathan Yuan, Dennis Joo Conceal or Communicate? Organizational Notifications to Stakeholders Following Ransomware Attacks. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
15Farhad Mofidi, Sena Hounsinou, Gedare Bloom L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hamdi Abu-Helo, Huthaifa Ashqar Early Ransomware Detection System Based on Network Behavior. Search on Bibsonomy AINA (5) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Akash Panzade, Deepak Kumar, Mahendra Rathor, Urbi Chatterjee Vig-WaR: Vigilantly Watching Ransomware for Robust Trapping and Containment. Search on Bibsonomy VLSID The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Luis Fernandez de Loaysa Babiano, Richard Macfarlane, Simon R. Davies Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mazen Gazzan, Frederick T. Sheldon Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mazen Gazzan, Frederick T. Sheldon An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Nada Lachtar, Duha Ibdah, Hamza Khan, Anys Bacha RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Muhammad Mubashir Khan, Muhammad Faraz Hyder, Shariq Mahmood Khan, Junaid Arshad Ransomware prevention using moving target defense based approach. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Chunming Zhang, Fengji Luo, Gianluca Ranzi Multistage Game Theoretical Approach for Ransomware Attack and Defense. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Zhida Li, Ana Laura Gonzalez Rios, Ljiljana Trajkovic Machine Learning for Detecting the WestRock Ransomware Attack Using BGP Routing Records. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Soohan Lee, Suhyeon Lee 0001, Jiwon Park, Kyoungmin Kim 0001, Kyungho Lee Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Horacio Rodriguez-Bazan, Grigori Sidorov, Ponciano Jorge Escamilla-Ambrosio Android Ransomware Analysis Using Convolutional Neural Network and Fuzzy Hashing Features. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Salwa Razaulla, Claude Fachkha, Christine Markarian, Amjad Gawanmeh, Wathiq Mansoor, Benjamin C. M. Fung, Chadi Assi The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Kumar Thummapudi, Palden Lama, Rajendra V. Boppana Detection of Ransomware Attacks Using Processor and Disk Usage Data. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Zheyu Song, Yonghong Tian, Junjin Zhang Similarity Analysis of Ransomware Attacks Based on ATT&CK Matrix. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Zubair A. Baig, Sri Harsha Mekala, Sherali Zeadally Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors. Search on Bibsonomy IT Prof. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Asad Waqar Malik, Zahid Anwar, Anis Ur Rahman 0001 A Novel Framework for Studying the Business Impact of Ransomware on Connected Vehicles. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim, Digvijaysinh Rathod Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Muhammad Junaid Iqbal, Sana Aurangzeb, Muhammad Aleem, Gautam Srivastava 0001, Jerry Chun-Wei Lin RThreatDroid: A Ransomware Detection Approach to Secure IoT Based Healthcare Systems. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Chutitep Woralert, Chen Liu 0001, Zander Blasingame HARD-Lite: A Lightweight Hardware Anomaly Realtime Detection Framework Targeting Ransomware. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Suleiman Ali Alsaif Machine Learning-Based Ransomware Classification of Bitcoin Transactions. Search on Bibsonomy Appl. Comput. Intell. Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy 0003 Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP. Search on Bibsonomy Discov. Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Preeti S. Chauhan, Nir Kshetri Ransomware as a Service Kit: A Novel Cybercrime Strategy to Monetize Victims' Data. Search on Bibsonomy Computer The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Gaddisa Olani Ganfure, Chun-Feng Wu, Yuan-Hao Chang 0001, Wei-Kuan Shih DeepWare: Imaging Performance Counters With Deep Learning to Detect Ransomware. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jaskaran Singh, Keshav Sharma, Mohammad Wazid, Ashok Kumar Das SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Qussai M. Yaseen The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Shivani Tripathy, Debiprasanna Sahoo, Manoranjan Satpathy, Madhu Mutyam Formal Modeling and Verification of Security Properties of a Ransomware-Resistant SSD. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Amjad Alraizza, Abdulmohsen Algarni Ransomware Detection Using Machine Learning: A Survey. Search on Bibsonomy Big Data Cogn. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Ibrahim Ba'abbad, Omar Batarfi Proactive Ransomware Detection Using Extremely Fast Decision Tree (EFDT) Algorithm: A Case Study. Search on Bibsonomy Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Purushottam Sharma, Shaurya Kapoor, Richa Sharma Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach. Search on Bibsonomy Int. J. Syst. Assur. Eng. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Suriya Badrinath, Roshni Dodhi, Raja Muthalagu Ransomware Detection Service: Execution and Analysis Using Machine Learning Techniques. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jueun Jeon, Seungyeon Baek, Byeonghui Jeong, Young-Sik Jeong Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT. Search on Bibsonomy Connect. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mohammad Wazid, Ashok Kumar Das, Sachin Shetty BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, A. Selcuk Uluagac, Mohamed Rahouti, Elias Bou-Harb, Morteza Safaei Pour Ransomware Detection Using Federated Learning with Imbalanced Datasets. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini Minerva: A File-Based Ransomware Detector. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan It's more than just money: The real-world harms from ransomware attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Naresh Kshetri, Mir Mehedi Rahman, Sayed Abu Sayeed, Irin Sultana cryptoRAN: A review on cryptojacking and ransomware attacks w.r.t. banking industry - threats, challenges, & problems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Kenan Begovic, Abdulaziz Al-Ali 0001, Qutaibah M. Malluhi Cryptographic ransomware encryption detection: Survey. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Wenjia Song, Sanjula Karanam, Ya Xiao, Jingyuan Qi, Nathan Dautenhahn, Na Meng 0001, Danfeng Yao Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Simon R. Davies, Richard Macfarlane, William J. Buchanan Majority Voting Approach to Ransomware Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Estelle Ruellan, Masarah Paquet-Clouston, Sebastián García Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Kavitha Kunku, ANK Zaman, Kaushik Roy Ransomware Detection and Classification using Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegül Yayimli Ransomware Detection and Classification Strategies. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Marco Venturini, Francesco Freda, Emanuele Miotto, Alberto Giaretta 0001, Mauro Conti Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller RansomAI: AI-powered Ransomware for Stealthy Encryption. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 764 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license