Dynamic behavioural analysis of privacy-breaching and data theft ransomware

M Ozturk, A Demir, Z Arslan, O Caliskan - 2024 - researchsquare.com
This study presents a comprehensive analysis of privacy-breaching ransomware,
emphasizing the dynamic behavioral patterns and techniques employed by these malicious …

An Effective Strategy for Ransomware Mitigation on Android Devices via Android OS File System API

M Ozturk, B Yilmaz, Z Arslan, A Demirbas - 2024 - researchsquare.com
The development and effectiveness of an API-based system for mitigating ransomware
threats on Android devices was explored in this study. Leveraging the Android/Linux file …

[PDF][PDF] Detecting Ransomware Attacks on IoT Platforms Using Multisource Transfer Learning: A Review

IZ Yakubu - researchgate.net
The rapid expansion of Internet of Things (IoT) devices has led to increased vulnerability to
ransomware attacks, posing significant security challenges. This review paper explores the …

[PDF][PDF] Detecting Stealthy Ransomware in IPFS Networks Using Machine Learning

J Chen, G Zhang - files.osf.io
Ransomware remains one of the most pernicious threats in cybersecurity, with its distribution
mechanisms evolving alongside technological advancements. This study explores the …

The Battle for Cloud Supremacy and the Remaking of Enterprise Security

M Ryan, F den Hartog - Next-Generation Enterprise Security and …, 2022 - taylorfrancis.com
The 21st century has ushered in a new wave of disruptive information technology and
networking technologies that have generated new business opportunities for enterprises …

[PDF][PDF] A study on Zero-Day Ransomware Mitigation Through Threat Intelligence Sharing Platforms

R Okonkwo - researchgate.net
The present study focuses on the volatile character of the zero-day ransomware risks,
bringing into focus the preventive measures and importance of threat intelligence sharing …