Journal articles on the topic 'Ataques de Ransomware; Phishing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ataques de Ransomware; Phishing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
RODRIGUES GUZELLA DIAS, JHONATAN, RENATA MIRELLA FARINA, and FABIANA FLORIAN. "SEGURANÇA CIBERNÉTICA - ESTUDO DAS TÉCNICAS DE ATAQUES CIBERNÉTICOS (PHISHING, RANSMWARE, DDOS) DE ENGENHARIA SOCIAL E MEDIDAS DE PREVENÇÃO." Revista Científica Semana Acadêmica 12, no. 248 (2024): 1–16. http://dx.doi.org/10.35265/2236-6717-248-13011.
Full textFernando, Lins Santos, and Luiz Teixeira Gonzaga José. "SEGURANÇA DIGITAL: ATAQUES DE PHISHING E OS MODELOS ATUAIS DE PRIVACIDADE DE DADOS." RevistaFT 28, no. 132 (2024): 30. https://doi.org/10.5281/zenodo.10897930.
Full textCusme Vélez, Lorena Fernanda. "Influencia de la ingeniería social en la educación y política digital." Alpha International Journal 1, no. 1 (2023): 44–56. https://doi.org/10.63380/aij.v1n1.2023.9.
Full textMarinho, Marlon Glauber, and Danilo Ribeiro de Sá Teles. "Os ataques cibernéticos e suas implicações penais." Revista JRG de Estudos Acadêmicos 7, no. 14 (2024): e14988. http://dx.doi.org/10.55892/jrg.v7i14.988.
Full textChávez García, Henry Alberto, Andy Paul Guacán Nepas, and Henry Marcelo Recalde Araujo. "Ciberseguridad en la era del IoT." Revista Ingeniería e Innovación del Futuro 4, no. 1 (2025): 101–15. https://doi.org/10.62465/riif.v4n1.2025.119.
Full textMorales Ramirez, Oscar. "Ciberfraude: Principales Métodos de Ataque y Estrategias para su Prevención." Ciencia Latina Revista Científica Multidisciplinar 9, no. 3 (2025): 4901–21. https://doi.org/10.37811/cl_rcm.v9i3.18122.
Full textGómez Díaz, María Paula, Lady Juliana Aguilar Ramírez, Kelly Johana Ramírez Peña, and Leslie Carolina Villamil Escobar. "Difusión de la Ciberseguridad en un Mundo Financiero para los Adolescentes." Ciencia Latina Revista Científica Multidisciplinar 7, no. 6 (2023): 1891–902. http://dx.doi.org/10.37811/cl_rcm.v7i6.8821.
Full textDe Moraes, Silvana Porciuncula, and Luciana Picanço De Oliveira. "A nova tecnologia Blockchain:." Direito & TI 1, no. 16 (2023): 130–57. https://doi.org/10.63451/ti.v1i16.157.
Full textDerenzin-Martinez, Feddor. "¿Están los institutos universitarios en Ecuador preparados para los ciberataques?" 593 Digital Publisher CEIT 9, no. 6 (2024): 1220–32. http://dx.doi.org/10.33386/593dp.2024.6.2864.
Full textCordova-Alvarado, Robin Lenin, Miguel Santiago Andrade-López, and Manuel Salvador Álvarez-Vera. "Inteligencia artificial generativa en el ámbito de la ciberseguridad: una revisión sistemática de literatura." MQRInvestigar 8, no. 3 (2024): 556–78. http://dx.doi.org/10.56048/mqr20225.8.3.2024.556-578.
Full textBoné-Andrade, Miguel Fabricio. "Evaluación de la evolución de la ciberseguridad en sistemas empresariales modernos." Multidisciplinary Collaborative Journal 1, no. 2 (2023): 25–38. https://doi.org/10.70881/mcj/v1/n2/14.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/nucleus.61.02.1402.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/thenucleus.2024.1402.
Full textZamora Baidal, Dustyn, Anthony Triviño, Amilkar Yudier Puris Cáceres, Rodrigo Emilio Zhuma Mera, and Byron Oviedo Bayas. "Análisis y técnicas de prevención ante ataques ransomware." Revista Tecnológica Ciencia y Educación Edwards Deming 5, no. 1 (2021): 98–108. http://dx.doi.org/10.37957/ed.v5i1.72.
Full textChilán González, Ingrid, Francisco Bolaños Burgos, Navira Angulo Murillo, and Gabriel Rodolfo García Murillo. "ANÁLISIS DE ATAQUES RANSOMWARE EN SERVIDORES WEB, LINUX Y WINDOWS." UNESUM-Ciencias. Revista Científica Multidisciplinaria. ISSN 2602-8166 2, no. 3 (2019): 89–100. http://dx.doi.org/10.47230/unesum-ciencias.v2.n3.2018.106.
Full textCandido, Jeferson William, Fabiana Florian, and João Henrique Gião Borges. "SEGURANÇA DA INFORMAÇÃO COM FOCO NA PROPAGAÇÃO IMINENTE DE RANSOMWARE NAS CORPORAÇÕES." REVISTA FOCO 16, no. 5 (2023): e1766. http://dx.doi.org/10.54751/revistafoco.v16n5-024.
Full textMontagner, Antonio S., and Carla Merkle Westphall. "Uma breve análise sobre phishing." Revista ComInG - Communications and Innovations Gazette 6, no. 1 (2022): 46–56. http://dx.doi.org/10.5902/2448190471731.
Full textVivanco-Toala, Danny, Francisco Bolaños-Burgos, and Navira Angulo-Murillo. "ESTUDIO EXPLORATORIO DE LAS ESTRATEGIAS PARA LA PROTECCIÓN A LAS REDES EMPRESARIALES DE LAS INFECCIONES RANSOMWARE." REVISTA CIENTÍFICA MULTIDISCIPLINARIA ARBITRADA "YACHASUN" 4, no. 7 (2020): 71–87. http://dx.doi.org/10.46296/yc.v4i7.0035.
Full textNoreña Cardona, Paola Andrea, and Sergio Calderón Restrepo. "Técnica de protección para credenciales de autenticación en redes sociales y correo electrónico ante ataques phishing." Publicaciones e Investigación 12, no. 2 (2018): 23–34. http://dx.doi.org/10.22490/25394088.2960.
Full textOrtiz-Cruz, Levi Jacob, and Mónica García Munguía. "Ataques de Ransomware en México, la amenaza cibernética más temida de los últimos años." Boletín Científico INVESTIGIUM de la Escuela Superior de Tizayuca 10 (December 13, 2024): 35–42. https://doi.org/10.29057/est.v10iespecial.13561.
Full textPiovesan, Leonardo Gubert, Edilmárcio Reis Costa Silva, Jakson Ferreira de Sousa, and Sérgio Noleto Turibus. "ENGENHARIA SOCIAL: Uma abordagem sobre Phishing." REVISTA CIENTÍFICA UNIBALSAS 10, no. 1 (2019): 45–59. http://dx.doi.org/10.46761/unibalsas.v10i1.94.
Full textAvila Niño, Fredy Yesid. "Ransomware, una amenaza latente en Latinoamérica." InterSedes 24, no. 49 (2023): 92–119. http://dx.doi.org/10.15517/isucr.v24i49.50765.
Full textAttoh, Joseph Antwi. "Security Measures Against Malware, Botnets & Ransomware." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 345–52. http://dx.doi.org/10.22624/aims/crp-bk3-p55.
Full textThomas, Jason E. "Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks." International Journal of Business and Management 13, no. 6 (2018): 1. http://dx.doi.org/10.5539/ijbm.v13n6p1.
Full textRanjitha, V. "RRR Concept and unknown Facts of Ransomware." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 287–93. https://doi.org/10.35940/ijeat.C4765.029320.
Full textIsha Thakur, Nidhi Bhalla, and Surabhi Duggal. "Cybersecurity in Healthcare: Need of the Hour." International Healthcare Research Journal 8, no. 2 (2024): RV1—RV5. http://dx.doi.org/10.26440/ihrj/0802.05634.
Full textLoureiro, Artur dos Santos, Erika Carlos Medeiros, Patrícia Cristina Moser, et al. "Classificação de Uniform Resource Locator para detecção de Phishing através da exploração de modelos de aprendizagem de máquina." OBSERVATÓRIO DE LA ECONOMÍA LATINOAMERICANA 22, no. 7 (2024): e5629. http://dx.doi.org/10.55905/oelv22n7-050.
Full textBenavides, Eduardo, Walter Fuertes, and Sandra Sanchez. "Caracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literatura." Ciencia y Tecnología 13, no. 1 (2020): 97–104. http://dx.doi.org/10.18779/cyt.v13i1.357.
Full textYadav, Swapanil. "The Ripple Effect of Cybercrime: From Individual’s Mistake to Nation’s Security." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02189.
Full textFornasier, Mateus De Oliveira, Tiago Protti Spinato, and Fernanda Lencina Ribeiro. "Ransomware e cibersegurança: a informação ameaçada por ataques a dados." Revista Thesis Juris 9, no. 1 (2020): 208–36. http://dx.doi.org/10.5585/rtj.v9i1.16739.
Full textAbiodun Ayeni, Olaniyi, and Ibitola Adejumo. "Ransomware Detection Using Machine Learning Algorithm." Buana Information Technology and Computer Sciences (BIT and CS) 5, no. 2 (2024): 74–84. https://doi.org/10.36805/bit-cs.v5i2.6265.
Full textConforme Tomala, Jonathan Marcelo, Evelyn Dayana Bailon Pilozo, Luisa Elizabeth Pilozo Pilozo, and Mario Javier Marcillo Merino. "Medios de ataques a los sistemas de seguridad de la información." Journal TechInnovation 2, no. 1 (2023): 72–78. http://dx.doi.org/10.47230/journal.techinnovation.v2.n1.2023.72-78.
Full textReichl-Streich, Andrea-Julia. "Schulungen Gegen Cybercrime: Cybersicherheit ist kein Spiel." kma - Klinik Management aktuell 25, no. 10 (2020): 46–47. http://dx.doi.org/10.1055/s-0040-1718820.
Full textBoboqulov, Azizbek Zoxid o'g'li. ""THE ROLE OF INSURANCE COMPANIES IN COMPENSATING CYBERCRIME VICTIMS"." International Journal of Education, Social Science & Humanities. Finland Academic Research Science Publishers 11, no. 7 (2023): 642–48. https://doi.org/10.5281/zenodo.8223569.
Full textMazzeo, Angela, and Enrico Jardim Clemente Santos. "Integração da Cibersegurança na Medicina Veterinária: Protegendo Dados e Sistemas de Saúde Animal." Research, Society and Development 14, no. 5 (2025): e7414547190. https://doi.org/10.33448/rsd-v14i5.47190.
Full textDavid Masseno, Manuel, and Emerson Wendt. "Ransomware na Lei: Apontamentos Breves de Direito Português e Brasileiro." Direito & TI 1, no. 8 (2017): 13. https://doi.org/10.63451/ti.v1i8.80.
Full textOPRIȘ, Cristian. "Cybercrime Evolution and Current Threats." International Journal of Information Security and Cybercrime 11, no. 1 (2022): 41–48. http://dx.doi.org/10.19107/ijisc.2022.01.05.
Full textWibowo, Budi, Luqman Hafiz, and Taufik Hidayat. "Unveiling the Cybercrime Ecosystem: Impact of Ransomware-as-a-Service (RaaS) in Indonesia." International Journal of Science Education and Cultural Studies 4, no. 1 (2025): 11–21. https://doi.org/10.58291/ijsecs.v4i1.320.
Full textChilquina-Cabay, Brayan Alberto, and Enrique Xavier Garcés-Freire. "Propuesta de seguridad para protección contra amenazas de phishing en usuarios de dispositivos móviles android." MQRInvestigar 9, no. 1 (2025): e156. https://doi.org/10.56048/mqr20225.9.1.2025.e156.
Full textCedeño Zambrano, José Reinaldo, and César Armando Moreira Zambrano. "Sistemas inmutables de backup ante ataques de ransomware hacia una infraestructura TI." Código Científico Revista de Investigación 4, no. 1 (2023): 600–612. http://dx.doi.org/10.55813/gaea/ccri/v4/n1/133.
Full textVásquez Ruiz, María Carolina. "Inteligencia artificial para el desarrollo del sector aeronáutico-militar en entorno de seguridad cibernética." Revista Ciberespacio, Tecnología e Innovación 3, no. 6 (2024): 151–74. https://doi.org/10.25062/2955-0270.4941.
Full textD.Suvarna, Lakshmi Manikanteswari, N.Hiranmayee, Surekha M.N.V, and Rupa S.Shanthi. "Deep Learning Based Detecting Security System." Recent Innovations in Wireless Network Security 7, no. 2 (2025): 36–46. https://doi.org/10.5281/zenodo.15493655.
Full textCarvalho, Claudia da Costa Bonard de. "Desafios na tipificação penal do sequestro digital (ransomware)." Boletim IBCCRIM 32, no. 383 (2024): 7–10. https://doi.org/10.5281/zenodo.13630626.
Full textPrakriti, Prakriti. "Cyber Threat Detection Using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–15. http://dx.doi.org/10.55041/ijsrem36799.
Full textGonzález-Hugo, Milton Patricio, and Andrés Sebastián Quevedo-Sacoto. "Tendencias actuales en ataques de Ingeniería social. Revisión de literatura." MQRInvestigar 9, no. 1 (2025): e203. https://doi.org/10.56048/mqr20225.9.1.2025.e203.
Full textOyekunle, Seun Michael, Olufisayo Juliana Tiwo, Temilade Oluwatoyin Adesokan-Imran, Adekunbi Justina Ajayi, Ademola Oluwaseun Salako, and Oluwaseun Oladeji Olaniyi. "Enhancing Data Resilience in Cloud-based Electronics Health Records through Ransomware Mitigation Strategies Using NIST and MITRE ATT&CK Frameworks." Journal of Engineering Research and Reports 27, no. 3 (2025): 436–57. https://doi.org/10.9734/jerr/2025/v27i31444.
Full textChinta, Purna Chandra Rao, Chethan Sriharsha Moore, Laxmana Murthy Karaka, Manikanth Sakuru, Varun Bodepudi, and Srinivasa Rao Maka. "Building an Intelligent Phishing Email Detection System Using Machine Learning and Feature Engineering." European Journal of Applied Science, Engineering and Technology 3, no. 2 (2025): 41–54. https://doi.org/10.59324/ejaset.2025.3(2).04.
Full textCabezas-Molina, Esthela Maribel, and Hugo Christiam Fiallos-Aguilar. "Simulación de ataques phishing y Planes de Concienciación aplicables al ámbito empresarial – Un enfoque práctico para mejorar la resiliencia organizacional." INNOVA Research Journal 9, no. 4 (2024): 95–110. https://doi.org/10.33890/innova.v9.n4.2024.2678.
Full textMagalhães, Gabriela Alves Aires, Raphael Hernandes Parra Filho, and Pedro Lima Marcheri. "O enfrentamento jurídico dos ataques de Ransomware no Brasil e no mundo." Brazilian Journal of Development 8, no. 9 (2022): 61971–84. http://dx.doi.org/10.34117/bjdv8n9-102.
Full textOsorio-Sierra, Andrés Felipe, Milton Javier Mateus-Hernández, and Héctor Fernando Vargas-Montoya. "Proceso para la identificación, clasificación y control del comportamiento de familias Ransomware." Revista UIS Ingenierías 19, no. 3 (2020): 131–42. http://dx.doi.org/10.18273/revuin.v19n3-2020013.
Full text