Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

A comparative study on hipaa technical safeguards assessment of android mhealth applications

MR Mia, H Shahriar, M Valero, N Sakib, B Saha… - Smart Health, 2022 - Elsevier
Protecting personal health records is becoming increasingly important as more people use
Mobile Health applications (mHealth apps) to improve their health outcomes. These …

[PDF][PDF] An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks.

F Azzedin, H Suwad, MM Rahman - Computers, Materials & …, 2022 - cdn.techscience.cn
This article presents an asset-based security system where security practitioners build their
systems based on information they own and not solicited by observing attackers' behavior …

A comprehensive API call analysis for detecting Windows-based ransomware

PM Anand, PVS Charan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Ransomware has been one of the prevalent malware for the past decade, and it is
continuing to be one of the significant threats today. The API call-based analysis is a widely …

Android ransomware detection using binary Jaya optimization algorithm

M Alazab - Expert Systems, 2024 - Wiley Online Library
Ransomware is a serious security concern to mobile devices, as it prevents the use of the
device and its contents until a ransom is paid, resulting in considerable financial losses for …

TTPHunter: automated extraction of actionable intelligence as TTPs from narrative threat reports

N Rani, B Saha, V Maurya, SK Shukla - Proceedings of the 2023 …, 2023 - dl.acm.org
With the proliferation of attacks from various Advanced Persistent Threats (APT) groups, it is
essential to comprehend the threat actor's attack patterns to accelerate threat detection and …

Ransomware detection using machine learning: A review, research limitations and future directions

J Ispahany, MDR Islam, MZ Islam, MA Khan - IEEE Access, 2024 - ieeexplore.ieee.org
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to
remote work due to the COVID-19 pandemic has led more people to work online, prompting …

Analysis of the adherence of mhealth applications to hipaa technical safeguards

B Saha - 2023 - digitalcommons.kennesaw.edu
The proliferation of mobile health technology, or mHealth apps, has made it essential to
protect individual health details. People now have easy access to digital platforms that allow …

Analyzing malware from api call sequences using support vector machines

QA Al-Haija, M Krichen - International Conference on Cybersecurity …, 2022 - Springer
Malware (malicious software) are available as software or program that is deliberately
developed to cause disturbance in the computation systems such as computers, servers, or …

A Cheating Attack on a Whitelist-based Anti-Ransomware Solution and its Countermeasure

SB Cheon, GY Choi, DY Kim - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
When proposing a whitelist-based anti-ransomware solution (WAR), it was pointed out that
WAR could be vulnerable to a dynamic-link library (DLL) injection attack: An attacker can …