The age of ransomware: A survey on the evolution, taxonomy, and research directions

S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …

[HTML][HTML] Cryptographic ransomware encryption detection: Survey

K Begovic, A Al-Ali, Q Malluhi - Computers & Security, 2023 - Elsevier
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …

FeSAD ransomware detection framework with machine learning using adaption to concept drift

DW Fernando, N Komninos - Computers & Security, 2024 - Elsevier
This paper proposes FeSAD, a framework that will allow a machine learning classifier to
detect evolutionary ransomware. Ransomware is a critical player in the malware space that …

[HTML][HTML] Behavioral fingerprinting to detect ransomware in resource-constrained devices

AH Celdrán, PMS Sánchez, J von der Assen… - Computers & …, 2023 - Elsevier
Abstract The Internet of Things (IoT), a network of interconnected devices, has grown and
gained traction over the last few years. This paradigm can impact our lives while also …

Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review

SA Wadho, A Yichiet, ML Gan, LC Kang… - … and Data Sciences …, 2023 - ieeexplore.ieee.org
Ransomware has emerged as a serious and evolving cybersecurity threat. This research
paper examines the advancements and improvements observed in ransomware attacks, as …

Similarity analysis of ransomware attacks based on ATT&CK Matrix

Z Song, Y Tian, J Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, there has been an increasingly prevalent trend of ransomware attacks, with
malicious organizations employing various techniques to gain system privileges and …

Ransomware early detection using machine learning approach and pre-encryption boundary identification

W Zanoramy, MF Abdollah, O Abdollah… - Journal of Advanced …, 2024 - semarakilmu.com.my
The escalating ransomware threat has catalysed the formation of a sophisticated network of
cybercriminal enterprises. Addressing this issue, our research provides a detailed …

Enhancing ransomware classification with multi-stage feature selection and data imbalance correction

FC Onwuegbuche, AD Jurcut, L Pasquale - International Symposium on …, 2023 - Springer
Ransomware is a critical security concern, and developing applications for ransomware
detection is paramount. Machine learning models are helpful in detecting and classifying …

[HTML][HTML] Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience

N Basheer, S Islam, MKS Alwaheidi, S Papastergiou - Sensors, 2024 - mdpi.com
System-to-system communication via Application Programming Interfaces (APIs) plays a
pivotal role in the seamless interaction among software applications and systems for efficient …

A novel ransomware virus detection technique using machine and deep learning methods

A Charmilisri, I Harshi… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Malware is typically found only after the victim gets a ransom demand. Ransomware
detection systems detect the threat more quickly, allowing victims to take action before …