Academic literature on the topic 'Ransomware attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ransomware attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ransomware attack"

1

Urooj, Umara, Bander Ali Saleh Al-rimy, Mazen Gazzan, et al. "A Wide and Weighted Deep Ensemble Model for Behavioral Drifting Ransomware Attacks." Mathematics 13, no. 7 (2025): 1037. https://doi.org/10.3390/math13071037.

Full text
Abstract:
Ransomware is a type of malware that leverages encryption to execute its attacks. Its continuous evolution underscores its dynamic and ever-changing nature. The evolving variants use varying timelines to launch attacks and associate them with varying attack patterns. Detecting early evolving variants also leads to incomplete attack patterns. To develop an early detection model for behavioral drifting ransomware attacks, a detection model should be able to detect evolving ransomware variants. To consider the behavioral drifting problem of ransomware attacks, a model should be able to generalize
APA, Harvard, Vancouver, ISO, and other styles
2

Zafri, Fizza. "Ransomware Attacks in History of Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 39–43. http://dx.doi.org/10.22214/ijraset.2022.39758.

Full text
Abstract:
Abstract: Technology advancement since last few decades creates cyber attack a critical issue. Cyber security has become an important part today. It has also become an important and crucial subject in the field of forensic science. Increased in the growth of internet technology and internet devices have increased the risk of cyber attack. Almost every organization today are depends on the internet and devices. There are many types of cyber attack. This paper is the detailed review about Ransomware attack. This paper is consisted about vast of the information about What is Ransomware Attack, ho
APA, Harvard, Vancouver, ISO, and other styles
3

Sen, Saurabh Kumar, and Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.

Full text
Abstract:
Abstract: Ransomware cyberattacks have grown in severity, effectiveness to cause damage, and ease of execution during the last decade. Advanced ransomware detection technologies must be included with traditional anti-malware procedures. The results of a study and analysis of ransomware attack risk are presented in this work, with the goal of identifying the characteristics that separate ransomware from other malware and benign executable files with the help of detected logs. The ransomware's normal behaviour and structure are determined by statically and dynamically analysing the executable bi
APA, Harvard, Vancouver, ISO, and other styles
4

Wani, Azka, and S. Revathi. "Ransomware protection in IoT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3166. http://dx.doi.org/10.11591/ijece.v10i3.pp3166-3175.

Full text
Abstract:
Internet of things (IoT) is the network of physical objects connected to provide various services. IoT is expanding rapidly, and is positively influencing many areas. The impact of IoT is evident in medical field, manufacturing units and livestock. The IoT is also vulnerable to many cyber threats, owing to its limited resources and battery operation. In contemporary times the security threats like DDoS, botnet malware, man in the middle, flood attacks and ransomware are affecting the smooth functioning of IoT. Ransomware has emerged as one of the biggest threat in cyber world. Ransomware is a
APA, Harvard, Vancouver, ISO, and other styles
5

Azka, Wani, and Revathi S. "Ransomware protection in loT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3166–75. https://doi.org/10.11591/ijece.v10i3.pp3166-3175.

Full text
Abstract:
Internet of things (IoT) is the network of physical objects connected to provide various services. IoT is expanding rapidly, and is positively influencing many areas. The impact of IoT is evident in medical field, manufacturing units and livestock. The IoT is also vulnerable to many cyber threats, owing to its limited resources and battery operation. In contemporary times the security threats like DDoS, botnet malware, man in the middle, flood attacks and ransomware are affecting the smooth functioning of IoT. Ransomware has emerged as one of the biggest threat in cyber world. Ransomware is a
APA, Harvard, Vancouver, ISO, and other styles
6

Vyom, Vyom, Deepak Motwani, and Pankaj Sharma. "Multiple Feature-Based Recurrent Neural Network for Highly Accurate Ransomware Detection in Android Devices." Fusion: Practice and Applications 19, no. 1 (2025): 75–83. https://doi.org/10.54216/fpa.190107.

Full text
Abstract:
Ransomware or crypto-ransomware is a big headache to digital media and transactions nowadays. Generally, Ransomware affects the operating system and transfers the valuable information and data stored in the system. Some ransomware attacks the system and corrupts the system file, making it useless to the user. Data encryption with a private key is also one of the attaching fashions of some types of ransomwares. Most ransomware attacks are reported in android operating system-based devices. The solution to ransomware is only the earlier identification of an attacked pattern in the operating syst
APA, Harvard, Vancouver, ISO, and other styles
7

Jaya, M. Izham, and Mohd Faizal Ab Razak. "Dynamic Ransomware Detection for Windows Platform Using Machine Learning Classifiers." JOIV : International Journal on Informatics Visualization 6, no. 2-2 (2022): 469. http://dx.doi.org/10.30630/joiv.6.2-2.1093.

Full text
Abstract:
In this world of growing technological advancements, ransomware attacks are also on the rise. This threat often affects the finance of individuals, organizations, and financial sectors. In order to effectively detect and block these ransomware threats, the dynamic analysis strategy was proposed and carried out as the approach of this research. This paper aims to detect ransomware attacks with dynamic analysis and classify the attacks using various machine learning classifiers namely: Random Forest, Naïve Bayes, J48, Decision Table and Hoeffding Tree. The TON IoT Datasets from the University of
APA, Harvard, Vancouver, ISO, and other styles
8

Ifthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/nucleus.61.02.1402.

Full text
Abstract:
Ransomware-as-a-Service (RAAS), a new cybercriminal actor, is making ransomware attacks more potent and widespread. This research comprehensively assesses Ransomware-as-a-Service (RAAS) ecosystem phishing detection and prevention solutions. Seven studies compare RAAS-enabled phishing detection and prevention effectiveness, challenges, and trends. The findings recommend a multi-layered, context-aware approach for organizational resilience to shifting cyber threats. This thorough phishing attack detection and security study examines ransomware-as-a-service. Phishing attacks leverage human weakne
APA, Harvard, Vancouver, ISO, and other styles
9

Ifthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/thenucleus.2024.1402.

Full text
Abstract:
Ransomware-as-a-Service (RAAS), a new cybercriminal actor, is making ransomware attacks more potent and widespread. This research comprehensively assesses Ransomware-as-a-Service (RAAS) ecosystem phishing detection and prevention solutions. Seven studies compare RAAS-enabled phishing detection and prevention effectiveness, challenges, and trends. The findings recommend a multi-layered, context-aware approach for organizational resilience to shifting cyber threats. This thorough phishing attack detection and security study examines ransomware-as-a-service. Phishing attacks leverage human weakne
APA, Harvard, Vancouver, ISO, and other styles
10

Arivunambi, Amirthasaravanan, and Arjun Paramarthalingam. "A Study on Two-Phase Monitoring Server for Ransomware Evaluation and Detection in IoT Environment." Journal of Trends in Computer Science and Smart Technology 4, no. 2 (2022): 72–82. http://dx.doi.org/10.36548/jtcsst.2022.2.003.

Full text
Abstract:
Current trending- Internet of things (IoT) is internetworking of an assortment of hardware devices to offer a collection of applications and services. In the present-day world, ransomware cyber-attack has become one of the major attacks in IoT systems. Ransomware is a hazardous malware that targets the user’s computer inaccessible or inoperative, and then requesting the computer victim user to transfer a huge ransom to relapse the damage. At instance, the evolution rate outcomes illustrate that the level of attacks such as Locky and Cryptowall ransomware are conspicuously growing then other ra
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Ransomware attack"

1

Nilsson, Anton. "Att hindra en Notpetya- och WannaCry-attack : Redogörelse med förebyggande metoder och tekniker." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16288.

Full text
Abstract:
WannaCry och NotPetya är två ransomware-program som använder sig av National Security Agency (NSA) läckta penetreringsverktyg EternalBlue för att få operativsystemsbehörighet över ett Windowssystem som tillåter kommunikation med dess Service Message Block (SMB) server. WannaCry och NotPetya utnyttjar detta genom att söka igenom systemets alla lagringsmedier efter användarfiler och krypterar sedan dessa med både symmetriska och asymmetriska krypteringsalgoritmer. För att få tillgång till den nyckel som används för att dekryptera filerna krävs det att offret betalar förövaren en specifik summa,
APA, Harvard, Vancouver, ISO, and other styles
2

Gustafsson, Daniel, and Mohammadi Hamid. "Brister i IT-säkerhet inom svensk sjöfart? : En kvalitativ undersökning om IT-säkerhet på svenska fartyg." Thesis, Linnéuniversitetet, Sjöfartshögskolan (SJÖ), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-64441.

Full text
Abstract:
Vissa typer av cyberattacker har ökat kraftig mellan åren 2015 och 2016, detta uppmärksammas både i land och till sjöss. Med tanke på sjöfartens unika situation är det av intresse att undersöka hur rederier har valt att skydda sig mot cyberattacker. Fyra rederier har intervjuats angående IT-säkerheten på deras fartyg. Resultatet av intervjuerna har sedan ställts mot IMOs riktlinjer släppta år 2016 för att undersöka ifall det finns brister i IT-säkerheten på svenska fartyg. Resultatet visar att det finns brister på flera av rederierna som intervjuats framförallt i form av utbildning av personal
APA, Harvard, Vancouver, ISO, and other styles
3

Nordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.

Full text
Abstract:
Context. Phishing emails is a type of computer attack targeting users and tries to trick them into giving out personal information, follow shady links or download malicious attachments. Phishing is often closely linked to ransomware, which is a type of attack that locks a users computer and asks for a ransom in order to give access back. Ransomware viruses often contaminate a computer through a phishing email. Hospitals are a growing target for these types of attacks because of their need of being able to access their system at all times. Objectives. This study intends to research the phishing
APA, Harvard, Vancouver, ISO, and other styles
4

Güven, Volkan. "Patterns of malware and digital attacks : A guideline for the security enthusiast." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16313.

Full text
Abstract:
Context: In today’s era, many things are dependent on the internet thus the devices and applications that are using it proliferates. Every day, many devices are getting targeted by malevolent virus authors. To protect the data from malicious factors becomes a preposterous dispute. A ransomware named CryptoLocker has caused many individuals, hospitals, and institutions thousands if not millions of dollars in damage due to encrypting the computer files thus demanding a ransom in return. Once the ransomware strikes a system, the recoverability is almost non-existent if no backup or system restore
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Ransomware attack"

1

Wollerton, Megan. Ransomware Attacks. CQ Press, 2023. http://dx.doi.org/10.4135/cqresrre20230818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ransomware Attack: Ransomware Attack Spreads Worldwide. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

KryptoKid. Girl's Truth: A Ransomware Attack. Mt Diablo Media LLC, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

KryptoKid. Girl's Truth: A Ransomware Attack. Mt Diablo Media LLC, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Booker, Brett. Girl's Truth: A Ransomware Attack. Mt Diablo Media LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kalita, Emi. WannaCry Ransomware Attack : Protect Yourself from WannaCry Ransomware: Cyber Risk and Cyber War. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohanta, Abhijit, Mounir Hahad, and Kumaraguru Velmurugan. Preventing Ransomware: Understand, prevent, and remediate ransomware attacks. Packt Publishing - ebooks Account, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wiener, Gary. Cyberterrorism and Ransomware Attacks. Greenhaven Publishing LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cyberterrorism and Ransomware Attacks. Greenhaven Publishing LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wiener, Gary. Cyberterrorism and Ransomware Attacks. Greenhaven Publishing LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Ransomware attack"

1

Haber, Morey J., and Brad Hibbert. "Ransomware." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Das, Ravindra. "How to Recover from a Ransomware Attack." In Ransomware. CRC Press, 2023. http://dx.doi.org/10.1201/9781003431633-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haber, Morey J. "Ransomware and Privileges." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kiru, Muhammad Ubale, and Aman Jantan. "Ransomware Evolution: Solving Ransomware Attack Challenges." In The Evolution of Business in the Cyber Age. Apple Academic Press, 2020. http://dx.doi.org/10.1201/9780429276484-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jenkinson, Andrew. "CNA Ransomware Attack and Cyber Insurance." In Ransomware and Cybercrime. CRC Press, 2022. http://dx.doi.org/10.1201/9781003278214-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhagwat, Laxmi B., and Balaji M. Patil. "Detection of Ransomware Attack: A Review." In Proceeding of International Conference on Computational Science and Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0790-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Butt, Usman, Yusuf Dauda, and Baba Shaheer. "Ransomware Attack on the Educational Sector." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sabharwal, Simran, and Shilpi Sharma. "Ransomware Attack: India Issues Red Alert." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7403-6_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Anjali, Md Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin, and Satyanarayana Vollala. "Ransomware Attack Protection: A Cryptographic Approach." In Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24907-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Seth, Rakhi, Aakanksha Sharaff, Jyotir Moy Chatterjee, and NZ Jhanjhi. "Ransomware Attack: Threats & Different Detection Technique." In Information Security Handbook. CRC Press, 2022. http://dx.doi.org/10.1201/9780367808228-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ransomware attack"

1

Tahat, Majd Z., William B. Glisson, and Baker Al Smadi. "VR Headset Ransomware Attack Vulnerability." In 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2024. http://dx.doi.org/10.1109/ccece59415.2024.10667339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Vaibhav, Kuldeep Singh Jadon, and Nitin Gupta. "Mitigating IoT Security Risks: Enhanced Ransomware Attack Classification." In 2024 IEEE 5th India Council International Subsections Conference (INDISCON). IEEE, 2024. http://dx.doi.org/10.1109/indiscon62179.2024.10744284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Jun. "The Proactive Approach to Cyber-Attack Prevention: Countermeasures Against Ransomware." In 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP). IEEE, 2024. http://dx.doi.org/10.1109/icsp62122.2024.10743937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdulhamid, Shafii Muhammad, Fawaz Issa Mohammed Albalushi, Mohammed Hamed Al-Kuwari, Yousef Abdullah Al-Sulaiti, Nadim Rana, and Abdullah Hussein Al-Ghushami. "Image Classification-Based Ransomware Attack Detection Using Deep Learning Algorithm." In 2024 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET). IEEE, 2024. https://doi.org/10.1109/icramet62801.2024.10809101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Suk-On, Natapon, Noppachai Thiratitsakun, and Krishna Chimmanee. "Digital Forensic Analysis of Lockbit Ransomware Attack on Operational Technology." In 2024 8th International Conference on Information Technology (InCIT). IEEE, 2024. https://doi.org/10.1109/incit63192.2024.10810564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Cheng, Christopher Redino, Ryan Clark, et al. "Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zakaria, Wira Z. A., Mohd Faizal Abdollah, Othman Mohd, Muhammad Nasim Abdul Aziz, S. M. Warusia Mohamed S. M. M. Yassin, and Sharifah Roziah Mohd Kassim. "RENTAKA: Detecting Ransomware at Pre-Attack Stage Using Machine Learning Approach." In 2025 IEEE 15th Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2025. https://doi.org/10.1109/iscaie64985.2025.11081161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Holmström, Anton. "Managing a Ransomware Attack: The Resilience of a Swedish Municipality – A Case Study." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013110900003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thummapudi, Kumar, Rajendra V. Boppana, and Palden Lama. "Towards Live Detection of Ransomware Attacks." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tan, En Jie, Kowit Tan, Royce Yu Feng Chong, et al. "Simulation of Pre-Ransomware Attacks on Active Directory." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871611.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Ransomware attack"

1

Almorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, 2024. http://dx.doi.org/10.26735/orro4624.

Full text
Abstract:
Threat actors, including infamous cybercrime groups and financially driven ransomware gangs, have focused on Arab countries› businesses and organizations as they grow and move toward digital transformation. In particular, ransomware is a very serious type of cyber-attack worldwide, and many organizations are severely affected by it. INTERPOL indicates that the ransomware gangs are targeting different regions such as Africa, Americas, Caribbean, Asia-Pacific, Europe, Middle East, and North Africa 1. The Center of Excellence in Cybercrime and Digital Forensics (CoECDF) at NAUSS has conducted a d
APA, Harvard, Vancouver, ISO, and other styles
2

Chiranjeevi, Spoorthy. Ransomware and Its Upsurge: Victimology, Attack Profiling, Precautionary and Response Strategies. Iowa State University, 2022. http://dx.doi.org/10.31274/cc-20240624-1187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Belcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2113.

Full text
Abstract:
Public transit agencies in the United States depend on external vendors to help deliver and maintain many essential services and to provide critical technologies, from ticket purchases to scheduling to email management. While the integration of new, advanced technologies into the public transit industry brings important advancements to U.S. critical transportation infrastructure, the application of digital technologies also brings with it a new assortment of digital risks. Transit agencies of all sizes are finding themselves subject to cyber incidents—most notably ransomware attacks—like those
APA, Harvard, Vancouver, ISO, and other styles
4

Preparation for and Response to a Ransomware Attack in the Organization: Cybersecurity Best Practices. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013317.

Full text
Abstract:
This document presents a series of best practices for improving the organizations ability to prepare for and respond to a ransomware event. The text is intended to assist the Chief Information Security Officer (CISO) and decision-makers within the organization in preparing for and coping with a ransomware event in the organization. Other actors that may gain added value from this document are the Chief Information Officer (CIO), a Cybersecurity Methodologies Specialist, a Cybersecurity Implementer Specialist, a Cybersecurity Technology Specialist (Cybersecurity Architect), and data/teleprocess
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!