Academic literature on the topic 'Ransomware attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ransomware attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Ransomware attack"
Urooj, Umara, Bander Ali Saleh Al-rimy, Mazen Gazzan, et al. "A Wide and Weighted Deep Ensemble Model for Behavioral Drifting Ransomware Attacks." Mathematics 13, no. 7 (2025): 1037. https://doi.org/10.3390/math13071037.
Full textZafri, Fizza. "Ransomware Attacks in History of Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 39–43. http://dx.doi.org/10.22214/ijraset.2022.39758.
Full textSen, Saurabh Kumar, and Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Full textWani, Azka, and S. Revathi. "Ransomware protection in IoT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3166. http://dx.doi.org/10.11591/ijece.v10i3.pp3166-3175.
Full textAzka, Wani, and Revathi S. "Ransomware protection in loT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3166–75. https://doi.org/10.11591/ijece.v10i3.pp3166-3175.
Full textVyom, Vyom, Deepak Motwani, and Pankaj Sharma. "Multiple Feature-Based Recurrent Neural Network for Highly Accurate Ransomware Detection in Android Devices." Fusion: Practice and Applications 19, no. 1 (2025): 75–83. https://doi.org/10.54216/fpa.190107.
Full textJaya, M. Izham, and Mohd Faizal Ab Razak. "Dynamic Ransomware Detection for Windows Platform Using Machine Learning Classifiers." JOIV : International Journal on Informatics Visualization 6, no. 2-2 (2022): 469. http://dx.doi.org/10.30630/joiv.6.2-2.1093.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/nucleus.61.02.1402.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/thenucleus.2024.1402.
Full textArivunambi, Amirthasaravanan, and Arjun Paramarthalingam. "A Study on Two-Phase Monitoring Server for Ransomware Evaluation and Detection in IoT Environment." Journal of Trends in Computer Science and Smart Technology 4, no. 2 (2022): 72–82. http://dx.doi.org/10.36548/jtcsst.2022.2.003.
Full textDissertations / Theses on the topic "Ransomware attack"
Nilsson, Anton. "Att hindra en Notpetya- och WannaCry-attack : Redogörelse med förebyggande metoder och tekniker." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16288.
Full textGustafsson, Daniel, and Mohammadi Hamid. "Brister i IT-säkerhet inom svensk sjöfart? : En kvalitativ undersökning om IT-säkerhet på svenska fartyg." Thesis, Linnéuniversitetet, Sjöfartshögskolan (SJÖ), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-64441.
Full textNordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.
Full textGüven, Volkan. "Patterns of malware and digital attacks : A guideline for the security enthusiast." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16313.
Full textBooks on the topic "Ransomware attack"
Wollerton, Megan. Ransomware Attacks. CQ Press, 2023. http://dx.doi.org/10.4135/cqresrre20230818.
Full textRansomware Attack: Ransomware Attack Spreads Worldwide. Independently Published, 2019.
Find full textKalita, Emi. WannaCry Ransomware Attack : Protect Yourself from WannaCry Ransomware: Cyber Risk and Cyber War. Independently Published, 2017.
Find full textMohanta, Abhijit, Mounir Hahad, and Kumaraguru Velmurugan. Preventing Ransomware: Understand, prevent, and remediate ransomware attacks. Packt Publishing - ebooks Account, 2018.
Find full textWiener, Gary. Cyberterrorism and Ransomware Attacks. Greenhaven Publishing LLC, 2018.
Find full textWiener, Gary. Cyberterrorism and Ransomware Attacks. Greenhaven Publishing LLC, 2018.
Find full textBook chapters on the topic "Ransomware attack"
Haber, Morey J., and Brad Hibbert. "Ransomware." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_17.
Full textDas, Ravindra. "How to Recover from a Ransomware Attack." In Ransomware. CRC Press, 2023. http://dx.doi.org/10.1201/9781003431633-5.
Full textHaber, Morey J. "Ransomware and Privileges." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_17.
Full textKiru, Muhammad Ubale, and Aman Jantan. "Ransomware Evolution: Solving Ransomware Attack Challenges." In The Evolution of Business in the Cyber Age. Apple Academic Press, 2020. http://dx.doi.org/10.1201/9780429276484-9.
Full textJenkinson, Andrew. "CNA Ransomware Attack and Cyber Insurance." In Ransomware and Cybercrime. CRC Press, 2022. http://dx.doi.org/10.1201/9781003278214-5.
Full textBhagwat, Laxmi B., and Balaji M. Patil. "Detection of Ransomware Attack: A Review." In Proceeding of International Conference on Computational Science and Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0790-8_2.
Full textButt, Usman, Yusuf Dauda, and Baba Shaheer. "Ransomware Attack on the Educational Sector." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_11.
Full textSabharwal, Simran, and Shilpi Sharma. "Ransomware Attack: India Issues Red Alert." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7403-6_42.
Full textKumari, Anjali, Md Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin, and Satyanarayana Vollala. "Ransomware Attack Protection: A Cryptographic Approach." In Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24907-6_2.
Full textSeth, Rakhi, Aakanksha Sharaff, Jyotir Moy Chatterjee, and NZ Jhanjhi. "Ransomware Attack: Threats & Different Detection Technique." In Information Security Handbook. CRC Press, 2022. http://dx.doi.org/10.1201/9780367808228-9.
Full textConference papers on the topic "Ransomware attack"
Tahat, Majd Z., William B. Glisson, and Baker Al Smadi. "VR Headset Ransomware Attack Vulnerability." In 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2024. http://dx.doi.org/10.1109/ccece59415.2024.10667339.
Full textKumar, Vaibhav, Kuldeep Singh Jadon, and Nitin Gupta. "Mitigating IoT Security Risks: Enhanced Ransomware Attack Classification." In 2024 IEEE 5th India Council International Subsections Conference (INDISCON). IEEE, 2024. http://dx.doi.org/10.1109/indiscon62179.2024.10744284.
Full textTang, Jun. "The Proactive Approach to Cyber-Attack Prevention: Countermeasures Against Ransomware." In 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP). IEEE, 2024. http://dx.doi.org/10.1109/icsp62122.2024.10743937.
Full textAbdulhamid, Shafii Muhammad, Fawaz Issa Mohammed Albalushi, Mohammed Hamed Al-Kuwari, Yousef Abdullah Al-Sulaiti, Nadim Rana, and Abdullah Hussein Al-Ghushami. "Image Classification-Based Ransomware Attack Detection Using Deep Learning Algorithm." In 2024 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET). IEEE, 2024. https://doi.org/10.1109/icramet62801.2024.10809101.
Full textSuk-On, Natapon, Noppachai Thiratitsakun, and Krishna Chimmanee. "Digital Forensic Analysis of Lockbit Ransomware Attack on Operational Technology." In 2024 8th International Conference on Information Technology (InCIT). IEEE, 2024. https://doi.org/10.1109/incit63192.2024.10810564.
Full textWang, Cheng, Christopher Redino, Ryan Clark, et al. "Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679510.
Full textZakaria, Wira Z. A., Mohd Faizal Abdollah, Othman Mohd, Muhammad Nasim Abdul Aziz, S. M. Warusia Mohamed S. M. M. Yassin, and Sharifah Roziah Mohd Kassim. "RENTAKA: Detecting Ransomware at Pre-Attack Stage Using Machine Learning Approach." In 2025 IEEE 15th Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2025. https://doi.org/10.1109/iscaie64985.2025.11081161.
Full textHolmström, Anton. "Managing a Ransomware Attack: The Resilience of a Swedish Municipality – A Case Study." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013110900003899.
Full textThummapudi, Kumar, Rajendra V. Boppana, and Palden Lama. "Towards Live Detection of Ransomware Attacks." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679391.
Full textTan, En Jie, Kowit Tan, Royce Yu Feng Chong, et al. "Simulation of Pre-Ransomware Attacks on Active Directory." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871611.
Full textReports on the topic "Ransomware attack"
Almorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, 2024. http://dx.doi.org/10.26735/orro4624.
Full textChiranjeevi, Spoorthy. Ransomware and Its Upsurge: Victimology, Attack Profiling, Precautionary and Response Strategies. Iowa State University, 2022. http://dx.doi.org/10.31274/cc-20240624-1187.
Full textBelcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2113.
Full textPreparation for and Response to a Ransomware Attack in the Organization: Cybersecurity Best Practices. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013317.
Full text