Ransomware detection and classification strategies

A Vehabovic, N Ghani, E Bou-Harb… - … Sea Conference on …, 2022 - ieeexplore.ieee.org
Ransomware uses encryption methods to make data inaccessible to legitimate users. To
date a wide range of ransomware families have been developed and deployed, causing …

Applying chatgpt-powered game theory in ransomware negotiations

T Zhu, X Li, W Zhang - Authorea Preprints, 2023 - advance.sagepub.com
This study looks into the application of game theory and ChatGPT in the context of
ransomware negotiations, providing a novel perspective on cyber threat management …

Mitigating data exfiltration ransomware through advanced decoy file strategies

S Liu, X Chen - 2023 - researchsquare.com
This study introduces an advanced decoy file strategy utilizing Generative Adversarial
Networks (GANs) to combat data exfiltration ransomware threats. Focused on creating highly …

Federated learning approach for distributed ransomware analysis

A Vehabovic, H Zanddizari, F Shaikh, N Ghani… - … Conference on Applied …, 2023 - Springer
Ransomware is a form of malware that uses encryption methods to prevent legitimate users
from accessing their data files. To date, many ransomware families have been released …

Ntfs+: An enhanced ntfs file system against ransomware invasions

Y Gu, Q Kang - 2023 - researchsquare.com
Ransomware poses a significant threat to digital security, evolving rapidly with sophisticated
encryption and data exfiltration tactics. This study introduces NTFS+, an enhanced version of …

Ransomware Defense Empowered: Deep Learning for Real-Time Family Identification with a Proprietary Dataset

HJ Hadi, Y Cao, N Ahmad… - 2024 8th International …, 2024 - ieeexplore.ieee.org
Ransomware, employing encryption techniques, presents a significant threat by rendering
data inaccessible. The emergence of diverse ransomware families has inflicted substantial …