Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems A Zimba, Z Wang, H Chen ICT Express, Elsevier, 2018 | 86 | 2018 |
Modeling and detection of the multi-stages of advanced persistent threats attacks based on semi-supervised learning and complex networks characteristics A Zimba, H Chen, Z Wang, M Chishimba Future Generation Computer Systems, Elsevier 106, 501-517, 2020 | 72 | 2020 |
Crypto mining attacks in information systems: an emerging threat to cyber security A Zimba, Z Wang, M Mulenga, NH Odongo Journal of Computer Information Systems, Taylor & Francis, 1-12, 2018 | 59 | 2018 |
Bayesian network based weighted APT attack paths modeling in cloud computing A Zimba, H Chen, Z Wang Future Generation Computer Systems, Elsevier 96, 525-537, 2019 | 51 | 2019 |
Malware-free intrusion: a novel approach to ransomware infection vectors A Zimba Int. Journal of Computer Science and Information Security 15 (2), 317, 2017 | 45 | 2017 |
On the Economic Impact of Crypto-ransomware Attacks: The State of the Art on Enterprise Systems A Zimba, M Chishimba European Journal for Security Research, Springer 4 (1), 3-31, 2019 | 41 | 2019 |
Understanding the Evolution of Ransomware: Paradigm Shifts in Attack Structures A Zimba, M Chishimba Int. Journal of Computer Network & Information Security, MECS-Press 11 (1), 26, 2019 | 35 | 2019 |
Demystifying ransomware attacks: reverse engineering and dynamic malware analysis of wannacry for network and information security A Zimba, L Simukonda, M Chishimba Zambia ICT Journal 1 (1), 35-40, 2017 | 32 | 2017 |
Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks A Zimba, Z Wang, M Mulenga Journal of Organizational Computing & E-Commerce, Taylor & Francis 29 (1), 40-59, 2019 | 29 | 2019 |
Reasoning crypto ransomware infection vectors with Bayesian networks A Zimba, Z Wang, H Chen 15th IEEE Int. Conference on Intelligence & Security Informatics (ISI), 149-151, 2017 | 26 | 2017 |
Recent advances in cryptovirology: State-of-the-art crypto mining and crypto ransomware attacks A Zimba, Z Wang, H Chen, M Mulenga KSII Transactions on Internet and Information Systems (TIIS) 13 (6), 3258-3279, 2019 | 20 | 2019 |
Towards Data Resilience: The Analytical Case of Crypto Ransomware Data Recovery Techniques A Zimba, Z Wang, L Simukonda Int. Journal of Information Technology & Computer Science, MECS-Press 10 (1 …, 2018 | 19 | 2018 |
A Dive into The Deep: Demystifying WannaCry Crypto Ransomware Network Attacks Via Digital Forensics. A Zimba, M Mulenga Int. Journal on Information Technologies & Security 4 (2), 2018 | 18 | 2018 |
A Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks A Zimba Int'l Journal of Computer Network and Information Security 14 (1), 25-39, 2022 | 17 | 2022 |
Deep learning techniques for solar tracking systems: A systematic literature review, research challenges, and open research directions M Phiri, M Mulenga, A Zimba, CI Eke Solar Energy, Elsevier 262, 111803, 2023 | 13 | 2023 |
Cyber Attacks in Cloud Computing: Modelling Multi-stage Attacks using Probability Density Curves A Zimba, V Chama Computer Network and Information Security, MECS-Press 10 (3), 25 - 36, 2018 | 10 | 2018 |
Malware-free intrusions: Exploitation of built-in pre-authentication services for APT attack vectors A Zimba, Z Wang Int. Journal of Computer Network & Information Security, MECS-Press 9 (7), 1, 2017 | 10 | 2017 |
Demystifying Cryptocurrency Mining Attacks: A Semi-supervised Learning Approach Based on Digital Forensics and Dynamic Network Characteristics A Zimba, M Chishimba, C Ngongola-Reinke, TF Mbale Zambia ICT Journal 5 (1), 1 - 8, 2021 | 9 | 2021 |
Addressing Crypto-Ransomware Attacks: Before You Decide whether To-Pay or Not-To A Zimba, Z Wang, M Chishimba Journal of Computer Information Systems, Taylor & Francis, 1-11, 2019 | 9 | 2019 |
An SDN Approach to Mitigating Network Management Challenges in Traditional Networks B Bwalya, A Zimba Int. Journal on Information Technologies and Security 13 (4), 3-14, 2021 | 7 | 2021 |