4.2 Article

Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

Ransomware detection using machine learning algorithms

Seong Il Bae et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Theory & Methods

Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes

Bin Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Review Computer Science, Information Systems

Deep learning and big data technologies for IoT security

Mohamed Ahzam Amanullah et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions

Rajat Chaudhary et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Ransomware protection using the moving target defense perspective

Suhyeon Lee et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Information Systems

On the effectiveness of system API-related information for Android ransomware detection

Michele Scalas et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things

Muna Al-Hawawreh et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures

Lena Y. Connolly et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Theory & Methods

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer

Sajad Homayoun et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Classification of ransomware families with machine learning based on N-gram of opcodes

Hanqi Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection

Bander Ali Saleh Al-rimy et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Detecting Android Locker-Ransomware on Chinese Social Networks

Dan Su et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Survey on Detection Techniques for Cryptographic Ransomware

Eduardo Berrueta et al.

IEEE ACCESS (2019)

Proceedings Paper Engineering, Electrical & Electronic

Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment

Muna Al-Hawawreh et al.

2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS) (2019)

Article Computer Science, Information Systems

A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware

Ahmad O. Almashhadani et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

R-Locker: Thwarting ransomware action through a honeyfile-based approach

J. A. Gomez-Hernandez et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

Bander Ali Saleh Al-rimy et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Artificial Intelligence

Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory

Aviad Cohen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Information Systems

Deep Learning for IoT Big Data and Streaming Analytics: A Survey

Mehdi Mohammadi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Theory & Methods

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection

Jing Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

A Survey of Deep Learning: Platforms, Applications and Emerging Rlesearch Trends

William Grant Hatcher et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

On the economic significance of ransomware campaigns: A Bitcoin transactions perspective

Mauro Conti et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Ransomware Automatic Data Acquisition Tool

Luis Javier Garcia Villalba et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

An in-Depth Study of the Jisut Family of Android Ransomware

Alejandro Martin et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Information Systems

Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning

Hajredin Daku et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Proceedings Paper Computer Science, Software Engineering

Machine Learning-Based Detection of Ransomware Using SDN

Greg Cusack et al.

PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18) (2018)

Proceedings Paper Computer Science, Information Systems

A Short Review for Ransomware: Pros and Cons

Hasan Awni Shakir et al.

ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC-2017) (2018)

Article Computer Science, Information Systems

Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines

Danial Javaheri et al.

IEEE ACCESS (2018)

Article Computer Science, Hardware & Architecture

Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense

Donghyun Min et al.

IEEE COMPUTER ARCHITECTURE LETTERS (2018)

Review Computer Science, Information Systems

Evolution of ransomware

Philip O'Kane et al.

IET NETWORKS (2018)

Article Computer Science, Information Systems

Application of deep convolutional neural network for automated detection of myocardial infarction using ECG signals

U. Rajendra Acharya et al.

INFORMATION SCIENCES (2017)

Proceedings Paper Computer Science, Artificial Intelligence

SeCBD: The Application Idea from Study Evaluation of Ransomware Attack Method in Big Data Architecture

Henry Chong

DISCOVERY AND INNOVATION OF COMPUTER SCIENCE TECHNOLOGY IN ARTIFICIAL INTELLIGENCE ERA (2017)

Article Computer Science, Hardware & Architecture

The rise of ransomware and emerging security challenges in the Internet of Things

Ibrar Yaqoob et al.

COMPUTER NETWORKS (2017)

Proceedings Paper Engineering, Electrical & Electronic

Deep Learning for Malicious Flow Detection

Yun-Chun Chen et al.

2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC) (2017)

Review Computer Science, Information Systems

A review on feature selection in mobile malware detection

Ali Feizollah et al.

DIGITAL INVESTIGATION (2015)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)