WannaLaugh: A Configurable Ransomware Emulator-Learning to Mimic Malicious Storage Traces

D Diamantopoulos, R Pletka, S Sarafijanovic… - Proceedings of the 17th …, 2024 - dl.acm.org
Ransomware, a fearsome and an evolving cybersecurity threat, continues to inflict severe
consequences on individuals and organizations worldwide. Traditional detection methods …

L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT

F Mofidi, SG Hounsinou, G Bloom - 2024 IEEE 14th Annual …, 2024 - ieeexplore.ieee.org
Ransomware is increasingly targeting Internet of Things (IoT) devices, and the resource
constraints of these devices make detecting and mitigating such attacks a significant …

Ransomware Attack: An Evolving Targeted Threat

M Aggarwal - 2023 14th International Conference on …, 2023 - ieeexplore.ieee.org
Ransomware typically locks the system to prevent users from accessing their own system or
personal files. Only after receiving ransom demand by the attacker, the access is regranted …

Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data

CMR Da Silva, PAL De Castro… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
The ransomware attack has become a lucrative business for cybercriminals and has
impacted several companies, as data hijacking interrupts business continuity. Several …

[PDF][PDF] DEVELOPING EFFECTIVE SOLUTIONS: RESEARCH DIRECTIONS AND IMPLEMENTATION STRATEGIES FOR EARLY RANSOMWARE DETECTION

AHR ABOGAMOUS - Journal of Theoretical and Applied Information …, 2024 - jatit.org
Ransomware attacks, employing advanced encryption to hold data hostage, pose a critical
threat to targets ranging from individuals to critical infrastructure. Our study, analyzing over …

Deep Learning Approaches for Ransomware Detection: Assessing CNN and CNN-LSTM Models using Class Imbalance Methods

H Shwetha, N Vineeth, GR Asha - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Ransomware continues to provide a serious risk to smartphone users by restricting access
to data until a ransom is paid. Traditional malware detection methods, such as statistical …

Machine Learning Approach to Detect Ransomware Threats in Health Care Systems

V Sapra, A Vishnoi, L Sapra - Cyber Forensics and Investigation …, 2024 - benthamdirect.com
With the advancement in healthcare technology, the industry is moving from conventional
diagnosis methods to digital health platforms. These digital health platforms are useful for …

Analysis of Ransomware Impact on Android Systems using Machine Learning Techniques.

ASM Al-Ruwili, AM Mostafa - International Journal of …, 2023 - search.ebscohost.com
Ransomware is a significant threat to Android systems. Traditional methods of detection and
prediction have been used, but with the advancement of technology and artificial …

Design and development of an assisted communication system, using machine learning and natural language processing, for the detection of fake news on Twitter

BO Altamirano Perez, OD Valencia… - Proceedings of the …, 2023 - dl.acm.org
Misleading news has always existed in the world, it has become much easier to spread false
information in new communication technologies, allowing users to be not only consumers …

Targeted Ransomware Attacks and Detection to Strengthen Cybersecurity Strategies

BJ Chinmaya, SA Kudtarkar - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Ransomware attacks have emerged as the most trending malware in recent eras.
Ransomware attacks hold data and devices hostage until a ransom is paid. The proposed …