Ransomware: Recent advances, analysis, challenges and future research directions

C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …

IPFS and friends: A qualitative comparison of next generation peer-to-peer data networks

E Daniel, F Tschorsch - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Decentralized, distributed storage offers a way to reduce the impact of data silos as often
fostered by centralized cloud storage. While the intentions of this trend are not new, the topic …

[PDF][PDF] Detecting stealthy ransomware in ipfs networks using machine learning

J Chen, G Zhang - 2024 - files.osf.io
Ransomware remains one of the most pernicious threats in cybersecurity, with its distribution
mechanisms evolving alongside technological advancements. This study explores the …

A survey on windows-based ransomware taxonomy and detection mechanisms

R Moussaileb, N Cuppens, JL Lanet… - ACM Computing Surveys …, 2021 - dl.acm.org
Ransomware remains an alarming threat in the 21st century. It has evolved from being a
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …

The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?

F Teichmann, SR Boticiu, BS Sergi - International Cybersecurity Law …, 2023 - Springer
This article aims to analyze the current unpredictable cyber climate. In particular, Russia's
invasion of Ukraine has heightened concerns about security incidents, and ransomware …

On blockchain and IoT integration platforms: current implementation challenges and future perspectives

C Nartey, ET Tchao, JD Gadze… - Wireless …, 2021 - Wiley Online Library
Digitization and automation have engulfed every scope and sphere of life. Internet of Things
(IoT) has been the main enabler of the revolution. There still exist challenges in IoT that …

Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review

E Badawi, GV Jourdan - IEEE Access, 2020 - ieeexplore.ieee.org
Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-
anonymity and privacy they offer. Researchers have been actively working on analyzing and …

Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system

NK Dewangan, P Chandrakar, S Kumari… - Multimedia Tools and …, 2023 - Springer
Blockchain technology is popular due to properties such as immutability, transparency,
distributed storage, and control decentralisation. Student certificates and skill verification are …

Decentralization and web3 technologies

G Korpal, D Scott - Authorea Preprints, 2022 - techrxiv.org
Today, the majority of the web's content and user data is controlled by a few large tech
companies. There is a growing movement to devolve this control evenly across the entire …

Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …