Related references
Note: Only part of the references are listed.Ransomware detection using machine learning algorithms
Seong Il Bae et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)
Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes
Bin Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Deep learning and big data technologies for IoT security
Mohamed Ahzam Amanullah et al.
COMPUTER COMMUNICATIONS (2020)
Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches
Shaila Sharmeen et al.
IEEE ACCESS (2020)
Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments
Lorenzo Fernandez Maimo et al.
SENSORS (2019)
Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions
Rajat Chaudhary et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Ransomware protection using the moving target defense perspective
Suhyeon Lee et al.
COMPUTERS & ELECTRICAL ENGINEERING (2019)
On the effectiveness of system API-related information for Android ransomware detection
Michele Scalas et al.
COMPUTERS & SECURITY (2019)
Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things
Muna Al-Hawawreh et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
Lena Y. Connolly et al.
COMPUTERS & SECURITY (2019)
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
Sajad Homayoun et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Classification of ransomware families with machine learning based on N-gram of opcodes
Hanqi Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
Bander Ali Saleh Al-rimy et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Detecting Android Locker-Ransomware on Chinese Social Networks
Dan Su et al.
IEEE ACCESS (2019)
A Survey on Detection Techniques for Cryptographic Ransomware
Eduardo Berrueta et al.
IEEE ACCESS (2019)
Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment
Muna Al-Hawawreh et al.
2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS) (2019)
A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware
Ahmad O. Almashhadani et al.
IEEE ACCESS (2019)
R-Locker: Thwarting ransomware action through a honeyfile-based approach
J. A. Gomez-Hernandez et al.
COMPUTERS & SECURITY (2018)
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
Bander Ali Saleh Al-rimy et al.
COMPUTERS & SECURITY (2018)
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory
Aviad Cohen et al.
EXPERT SYSTEMS WITH APPLICATIONS (2018)
Deep Learning for IoT Big Data and Streaming Analytics: A Survey
Mehdi Mohammadi et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection
Jing Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
A Survey of Deep Learning: Platforms, Applications and Emerging Rlesearch Trends
William Grant Hatcher et al.
IEEE ACCESS (2018)
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
Mauro Conti et al.
COMPUTERS & SECURITY (2018)
Ransomware Automatic Data Acquisition Tool
Luis Javier Garcia Villalba et al.
IEEE ACCESS (2018)
An in-Depth Study of the Jisut Family of Android Ransomware
Alejandro Martin et al.
IEEE ACCESS (2018)
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning
Hajredin Daku et al.
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)
Machine Learning-Based Detection of Ransomware Using SDN
Greg Cusack et al.
PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18) (2018)
A Short Review for Ransomware: Pros and Cons
Hasan Awni Shakir et al.
ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC-2017) (2018)
Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines
Danial Javaheri et al.
IEEE ACCESS (2018)
Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense
Donghyun Min et al.
IEEE COMPUTER ARCHITECTURE LETTERS (2018)
Evolution of ransomware
Philip O'Kane et al.
IET NETWORKS (2018)
Application of deep convolutional neural network for automated detection of myocardial infarction using ECG signals
U. Rajendra Acharya et al.
INFORMATION SCIENCES (2017)
SeCBD: The Application Idea from Study Evaluation of Ransomware Attack Method in Big Data Architecture
Henry Chong
DISCOVERY AND INNOVATION OF COMPUTER SCIENCE TECHNOLOGY IN ARTIFICIAL INTELLIGENCE ERA (2017)
The rise of ransomware and emerging security challenges in the Internet of Things
Ibrar Yaqoob et al.
COMPUTER NETWORKS (2017)
Deep Learning for Malicious Flow Detection
Yun-Chun Chen et al.
2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC) (2017)
A review on feature selection in mobile malware detection
Ali Feizollah et al.
DIGITAL INVESTIGATION (2015)