Security of cryptocurrencies: A view on the state-of-the-art research and current developments

P Weichbroth, K Wereszko, H Anacka, J Kowal - Sensors, 2023 - mdpi.com
[Context] The goal of security is to protect digital assets, devices, and services from being
disrupted, exploited or stolen by unauthorized users. It is also about having reliable …

A systematic literature review of mitigating cyber security risk

S Kamarudin, L Tang, J Bolong, NA Adzharuddin - Quality & Quantity, 2023 - Springer
Increasing internet consumption and constant technological development, specifically
smartphones, have led to an increasingly urgent need for cyber awareness. Generally …

Ransomware economics: a two-step approach to model ransom paid

T Meurs, E Cartwright, A Cartwright… - … on Electronic Crime …, 2023 - ieeexplore.ieee.org
Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts
aim to reduce the profitability of ransomware attacks. Nevertheless, limited research has …

Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT

J Jeon, S Baek, B Jeong, YS Jeong - Connection Science, 2023 - Taylor & Francis
The healthcare industry is collecting considerable patient and medical data by using Internet
of Things (IoT) devices. Consequently, ransomware attacks to encrypt healthcare systems or …

[PDF][PDF] Cybercrime Unmasked: Investigating cases and digital evidence.

H Azam, MI Dulloo, MH Majeed… - … Science & Artificial …, 2023 - pdfs.semanticscholar.org
The advent of rapid digital technology has opened doors to a new domain for criminal
activities, commonly termed as computer crimes. Stringent penalties have been instituted by …

Ransomware attack on the educational sector

U Butt, Y Dauda, B Shaheer - AI, Blockchain and Self-Sovereign Identity in …, 2023 - Springer
The world today is confronted with the challenging task of juggling the adoption of innovative
technology with securing information systems and data that enables essential everyday …

A proactive approach to protect cloud computing environment against a distributed denial of service (DDoS) attack

MM Ahmed, A El-Hajjar - AI, Blockchain and Self-Sovereign Identity in …, 2023 - Springer
The current range of technological and physical advances mostly rely on load dispersion as
well as demand delays which modern security solutions are equipped to defend against …

Cybersecurity in universities: an evaluation model

MA Haque, S Ahmad, A John, K Mishra, BK Mishra… - SN Computer …, 2023 - Springer
Cybercriminals have been increasingly targeting higher education institutions during the
COVID-19 pandemic. The shift to online learning and remote work has created new …

The threat of ransomware in the food supply chain: a challenge for food defence

L Manning, A Kowalska - Trends in Organized Crime, 2023 - Springer
In the food industry, the level of awareness of the need for food defence strategies has
accelerated in recent years, in particular, mitigating the threat of ransomware. During the …

Applying Neutralisation Theory to Better Understand Ransomware Offenders

L Connolly, H Borrion, B Arief… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
The work presented in this paper investigates the crime of ransomware from the perspective
of neutralisation theory. In particular, this research-in-progress paper aims to explore the …