[HTML][HTML] Cryptographic ransomware encryption detection: Survey

K Begovic, A Al-Ali, Q Malluhi - Computers & Security, 2023 - Elsevier
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …

[HTML][HTML] Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation

LF de Loaysa Babiano, R Macfarlane… - Forensic Science …, 2023 - Elsevier
Ransomware has been established as one of the largest current threats to organisations,
small businesses, governments, and individuals alike. The appearance of cryptocurrencies …

Cybersecurity concerns under COVID-19: representations on increasing digital literacy in higher education

J Lourenço, JC Morais, S Sá, N Neves… - Perspectives and Trends …, 2023 - Springer
The COVID-19 brought several new challenges for the students and lecturers, particularly in
higher education. The conventional physical classroom was almost instantly pushed into a …

Mayavi: A cyber-deception hardware for memory load-stores

P Derasari, K Gogineni, G Venkataramani - Proceedings of the Great …, 2023 - dl.acm.org
Rapid evolution of security attacks presents a perpetual challenge to computer system
defenders in terms of continuously upgrading their defense capabilities and being aware of …

[HTML][HTML] Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus

M Gimenez-Aguilar, JM de Fuentes… - International Journal of …, 2023 - Springer
The permanent availability and relative obscurity of blockchains is the perfect ground for
using them for malicious purposes. However, the use of blockchains by malwares has not …

Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion

P Derasari, K Gogineni… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Rapid rise in malware attacks has added significant costs to cyber operations. As
adversaries evolve, there is a growing need for fast, targeted defenses that effectively guard …

Cyber Insurance for Cyber Resilience

S Liu, Q Zhu - arXiv preprint arXiv:2312.02921, 2023 - arxiv.org
Cyber insurance is a complementary mechanism to further reduce the financial impact on
the systems after their effort in defending against cyber attacks and implementing resilience …

A qualitative study exploring security practices healthcare providers need to reduce the risk of successful ransomware attacks on electronic health record systems

M Ofe - 2023 - search.proquest.com
The healthcare industry has seen an upsurge in successful ransomware attacks on EHR
systems, posing a serious risk to patient data privacy and confidentiality. The purpose of the …

Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies

GS Prabith, S Abhishek, T Anjali… - … on Security of …, 2023 - ieeexplore.ieee.org
This research paper provides an in-depth study of zero click exploits and malware exploring
their techniques, implications and real-world instances. Our primary objective is to offer a …

Ransomware Extraction Using Static Portable Executable (PE) Feature-Based Approach

IMM Matin - 2023 6th International Conference of Computer and …, 2023 - ieeexplore.ieee.org
Currently cyberspace has often been used for crime. Ransomware is a type of malware that
takes the victim's data hostage by asking for a ransom accompanied by threats. This attack is …