[HTML][HTML] Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus

M Gimenez-Aguilar, JM de Fuentes… - International Journal of …, 2023 - Springer
The permanent availability and relative obscurity of blockchains is the perfect ground for
using them for malicious purposes. However, the use of blockchains by malwares has not …

Advanced Petya ransomware and mitigation strategies

JS Aidan, U Garg - 2018 First International Conference on …, 2018 - ieeexplore.ieee.org
In this cyber era, the cyber threats have reached a new level of menace and maturity. One of
the major threat in this cyber world nowadays is ransomware attack which had affected …

A qualitative study exploring security practices healthcare providers need to reduce the risk of successful ransomware attacks on electronic health record systems

M Ofe - 2023 - search.proquest.com
The healthcare industry has seen an upsurge in successful ransomware attacks on EHR
systems, posing a serious risk to patient data privacy and confidentiality. The purpose of the …

[HTML][HTML] СОВЕРШЕНСТВОВАНИЕ ПЕРЕЧНЯ УГРОЗ, РЕГЛАМЕНТИРОВАННОГО В СТАТЬЕ 163 УК РФ, КАК МЕРА ПРОТИВОДЕЙСТВИЯ ВЫМОГАТЕЛЬСТВУ

ИН Мосечкин - Всероссийский криминологический журнал, 2022 - cyberleninka.ru
Статья посвящена исследованию проблем применения положений законодательства
об уголовной ответственности за вымогательство в зависимости от способа …

Analyze and designing low-cost network monitoring system using Icinga and Raspberry Pi

H Maulana - IOP Conference Series: Earth and Environmental …, 2021 - iopscience.iop.org
The development of information and data communication technology field in the world has
now increasingly led to the development of the Internet of Things devices. The development …

Analysis of the Effectiveness of Online Learning Using Eda Data Science and Machine Learning

H Maulana, AK Al-Khowarizmi - Sinkron: jurnal dan penelitian …, 2021 - jurnal.polgan.ac.id
In educational institutions, it is important to evaluate the performance of lecturers. One
aspect that can be used as a reference in assessing the performance of lecturers is the …

Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion

P Derasari, K Gogineni… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Rapid rise in malware attacks has added significant costs to cyber operations. As
adversaries evolve, there is a growing need for fast, targeted defenses that effectively guard …

Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies

GS Prabith, S Abhishek, T Anjali… - … on Security of …, 2023 - ieeexplore.ieee.org
This research paper provides an in-depth study of zero click exploits and malware exploring
their techniques, implications and real-world instances. Our primary objective is to offer a …

Ransomware Extraction Using Static Portable Executable (PE) Feature-Based Approach

IMM Matin - 2023 6th International Conference of Computer and …, 2023 - ieeexplore.ieee.org
Currently cyberspace has often been used for crime. Ransomware is a type of malware that
takes the victim's data hostage by asking for a ransom accompanied by threats. This attack is …

A zero trust security approach with FIDO2

S Bavendiek - 2022 - researchsquare.com
Common IT infrastructures are built with a perimeter firewall, that separates the internal from
the external network environment. Systems within the internal network are considered as …