A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions

T McIntosh, ASM Kayes, YPP Chen, A Ng… - ACM Computing …, 2021 - dl.acm.org
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …

The age of ransomware: A survey on the evolution, taxonomy, and research directions

S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …

A survey on windows-based ransomware taxonomy and detection mechanisms

R Moussaileb, N Cuppens, JL Lanet… - ACM Computing Surveys …, 2021 - dl.acm.org
Ransomware remains an alarming threat in the 21st century. It has evolved from being a
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …

[HTML][HTML] Early detection of crypto-ransomware using pre-encryption detection algorithm

SH Kok, A Abdullah, NZ Jhanjhi - … of King Saud University-Computer and …, 2022 - Elsevier
Crypto ransomware is a type of malware that locks its victim's file for ransom using an
encryption algorithm. Its popularity has risen at an alarming rate among the cyber security …

Data flooding against ransomware: Concepts and implementations

D Berardi, S Giallorenzo, A Melis, S Melloni, L Onori… - Computers & …, 2023 - Elsevier
Ransomware is one of the most infamous kinds of malware, particularly the “crypto”
subclass, which encrypts users' files, asking for some monetary ransom in exchange for the …

[HTML][HTML] Cybersecurity and cyber forensics for smart cities: a comprehensive literature review and survey

K Kim, IM Alshenaifi, S Ramachandran, J Kim, T Zia… - Sensors, 2023 - mdpi.com
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial
intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart …

Detecting ransomware attacks using intelligent algorithms: Recent development and next direction from deep learning and big data perspectives

I Bello, H Chiroma, UA Abdullahi, AY Gital… - Journal of Ambient …, 2021 - Springer
Recently, cybercriminals have infiltrated different sectors of the human venture to launch
ransomware attacks against information technology infrastructure. They demand ransom …

[HTML][HTML] MFMCNS: A multi-feature and multi-classifier network-based system for ransomworm detection

AO Almashhadani, D Carlin, M Kaiiali, S Sezer - Computers & Security, 2022 - Elsevier
Ransomware is a type of advanced malware that can encrypt a user's files or lock a
computer system until a ransom has been paid. Ransomworm is a type of malware that …

[HTML][HTML] Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …