Applying chatgpt-powered game theory in ransomware negotiations

T Zhu, X Li, W Zhang - Authorea Preprints, 2023 - techrxiv.org
This study looks into the application of game theory and ChatGPT in the context of
ransomware negotiations, providing a novel perspective on cyber threat management …

[HTML][HTML] Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation

T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng… - Computers & …, 2023 - Elsevier
This study investigated the potential of Generative Pre-trained Transformers (GPTs), a state-
of-the-art large language model, in generating cybersecurity policies to deter and mitigate …

Ransomware attacks in the context of generative artificial intelligence—an experimental study

F Teichmann - International Cybersecurity Law Review, 2023 - Springer
Ransomware attacks continue to be one of the biggest risks faced by both organizations and
governments. In this experimental study, the author tested how criminals could use …

Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss

T Meurs, M Junger, E Tews… - 2022 APWG symposium …, 2022 - ieeexplore.ieee.org
In recent years, ransomware attacks have led to disastrous consequences for victims, not
just due to the payment ransom amount but also due to the recovery costs associated with …

[HTML][HTML] Deception in double extortion ransomware attacks: An analysis of profitability and credibility

T Meurs, E Cartwright, A Cartwright, M Junger… - Computers & …, 2024 - Elsevier
Ransomware attacks have evolved with criminals using double extortion schemes, where
they signal data exfiltration to inflate ransom demands. This development is further …

Preventive portfolio against data-selling ransomware—A game theory of encryption and deception

Z Li, Q Liao - Computers & Security, 2022 - Elsevier
Ransomware has risen to be among the top cyber threats in recent years. There is an
alarming trend of ransomware stealing data in addition to locking files. Compared to …

How cyber insurance influences the ransomware payment decision: theory and evidence

A Cartwright, E Cartwright, J MacColl, G Mott… - The Geneva Papers on …, 2023 - Springer
In this paper, we analyse how cyber insurance influences the cost–benefit decision-making
process of a ransomware victim. Specifically, we ask whether organisations with cyber …

eMIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance

A Alqahtani, FT Sheldon - Sensors, 2024 - mdpi.com
Early detection of ransomware attacks is critical for minimizing the potential damage caused
by these malicious attacks. Feature selection plays a significant role in the development of …

Dynamics of targeted ransomware negotiation

P Ryan, J Fokker, S Healy, A Amann - IEEE Access, 2022 - ieeexplore.ieee.org
In this paper, we consider how the development of targeted ransomware has affected the
dynamics of ransomware negotiations to better understand how to respond to ransomware …

An investigation of individual willingness to pay ransomware

A Cartwright, E Cartwright, L Xue… - Journal of Financial …, 2023 - emerald.com
Purpose Ransomware is a relatively new form of financial extortion that is proving a major
cyber-security threat to individuals and organisations. This study aims to investigate factors …