A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities

H Habibzadeh, BH Nussbaum, F Anjomshoa… - Sustainable Cities and …, 2019 - Elsevier
Abstract Deployments of Cyber Physical Systems (CPSs) in smart cities are poised to
significantly improve healthcare, transportation services, utilities, safety, and environmental …

Ransomware detection, avoidance, and mitigation scheme: a review and future directions

A Kapoor, A Gupta, R Gupta, S Tanwar, G Sharma… - Sustainability, 2021 - mdpi.com
Ransomware attacks have emerged as a major cyber-security threat wherein user data is
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation …

[PDF][PDF] A brief study of wannacry threat: Ransomware attack 2017

S Mohurle, M Patil - International journal of advanced research in …, 2017 - sbgsmedia.in
Recently Ransomware virus software spread like a cyclone winds. A cyclone wind creates
atmospheric instability; likewise ransomware creates computer data instability. Every user is …

Ransomware payments in the bitcoin ecosystem

M Paquet-Clouston, B Haslhofer… - Journal of …, 2019 - academic.oup.com
Ransomware can prevent a user from accessing a device and its files until a ransom is paid
to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has …

Predicting domain generation algorithms with long short-term memory networks

J Woodbridge, HS Anderson, A Ahuja… - arXiv preprint arXiv …, 2016 - arxiv.org
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …

DeepDGA: Adversarially-tuned domain generation and detection

HS Anderson, J Woodbridge, B Filar - … of the 2016 ACM workshop on …, 2016 - dl.acm.org
Many malware families utilize domain generation algorithms (DGAs) to establish command
and control (C&C) connections. While there are many methods to pseudorandomly generate …

Detecting ransomware with honeypot techniques

C Moore - 2016 Cybersecurity and Cyberforensics Conference …, 2016 - ieeexplore.ieee.org
Attacks of Ransomware are increasing, this form of malware bypasses many technical
solutions by leveraging social engineering methods. This means established methods of …

Ransomware behavioural analysis on windows platforms

N Hampton, Z Baig, S Zeadally - Journal of information security and …, 2018 - Elsevier
Ransomware infections have grown exponentially during the recent past to cause major
disruption in operations across a range of industries including the government. Through this …

[PDF][PDF] Ransomware: a survey and trends

S Aurangzeb, M Aleem, MA Iqbal, MA Islam - J. Inf. Assur. Secur, 2017 - researchgate.net
Ransomware are a recent scareware, a threat that is increasing gradually for last couple of
years. Usually it encrypts users's files or steal/delete important information and holds the …

Talos: no more ransomware victims with formal methods

A Cimitile, F Mercaldo, V Nardone, A Santone… - International Journal of …, 2018 - Springer
Ransomware is a very effective form of malware that is recently spreading out on an
impressive number of workstations and smartphones. This malware blocks the access to the …