Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions

T McIntosh, ASM Kayes, YPP Chen, A Ng… - ACM Computing …, 2021 - dl.acm.org
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

BAS Al-Rimy, MA Maarof, SZM Shaid - Computers & Security, 2018 - Elsevier
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …

[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention

M Humayun, NZ Jhanjhi, A Alsayat… - Egyptian Informatics …, 2021 - Elsevier
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …

Cybersecurity in healthcare: A systematic review of modern threats and trends

CS Kruse, B Frederick, T Jacobson… - … and Health Care, 2017 - content.iospress.com
BACKGROUND: The adoption of healthcare technology is arduous, and it requires planning
and implementation time. Healthcare organizations are vulnerable to modern trends and …

Paybreak: Defense against cryptographic ransomware

E Kolodenker, W Koch, G Stringhini… - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral
means to achieve monetary gains. Recently, malware known as ransomware started to …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence

S Homayoun, A Dehghantanha… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A
crypto ransomware removes data custodian access by encrypting valuable data on victims' …

[HTML][HTML] Ransomware detection using random forest technique

BM Khammas - ICT Express, 2020 - Elsevier
Nowadays, the ransomware became a serious threat challenge the computing world that
requires an immediate consideration to avoid financial and moral blackmail. So, there is a …

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer

S Homayoun, A Dehghantanha, M Ahmadzadeh… - Future Generation …, 2019 - Elsevier
Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat
to fog layer nodes as such nodes typically contain considerably amount of sensitive data …

A Cyber-Kill-Chain based taxonomy of crypto-ransomware features

T Dargahi, A Dehghantanha, PN Bahrami… - Journal of Computer …, 2019 - Springer
In spite of being just a few years old, ransomware is quickly becoming a serious threat to our
digital infrastructures, data and services. Majority of ransomware families are requesting for …