I Kara, M Aydos - Expert Systems with Applications, 2022 - Elsevier
While information technologies grow and propagate worldwide, malwares have modified and risen their efficiency towards information system. Recently, the attackers have started to …
T Gera, J Singh, A Mehbodniya… - Security and …, 2021 - Wiley Online Library
Ransomware is a special malware designed to extort money in return for unlocking the device and personal data files. Smartphone users store their personal as well as official data …
Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual “arms race” …
Ransomware being the most threatening mobile malware type; extorts money by taking control of the user's confidential data. Ransomware targets finances that result in …
Android is open source and the most popular operating system. Increased popularity and dependency on Smartphone have instigated attackers to exploit Android vulnerabilities for …
KP Deepta, A Salim - Advances in Computing and Data Sciences: First …, 2017 - Springer
Classification and detection of malware includes detecting instances and variants of the existing known malwares. Traditional signature based approaches fails when byte level …
Ransomware is a special malware designed to extort money in return for unlocking the device and personal data files. Smartphone users store their personal as well as official data …
Crypto-ransomware is a malware that leverages cryptography to encrypt files for extortion purposes. Even after neutralizing such attacks, the targeted files remain encrypted. This …