Journal articles on the topic 'Ransomware attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ransomware attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Urooj, Umara, Bander Ali Saleh Al-rimy, Mazen Gazzan, et al. "A Wide and Weighted Deep Ensemble Model for Behavioral Drifting Ransomware Attacks." Mathematics 13, no. 7 (2025): 1037. https://doi.org/10.3390/math13071037.
Full textZafri, Fizza. "Ransomware Attacks in History of Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 39–43. http://dx.doi.org/10.22214/ijraset.2022.39758.
Full textSen, Saurabh Kumar, and Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Full textWani, Azka, and S. Revathi. "Ransomware protection in IoT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3166. http://dx.doi.org/10.11591/ijece.v10i3.pp3166-3175.
Full textAzka, Wani, and Revathi S. "Ransomware protection in loT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3166–75. https://doi.org/10.11591/ijece.v10i3.pp3166-3175.
Full textVyom, Vyom, Deepak Motwani, and Pankaj Sharma. "Multiple Feature-Based Recurrent Neural Network for Highly Accurate Ransomware Detection in Android Devices." Fusion: Practice and Applications 19, no. 1 (2025): 75–83. https://doi.org/10.54216/fpa.190107.
Full textJaya, M. Izham, and Mohd Faizal Ab Razak. "Dynamic Ransomware Detection for Windows Platform Using Machine Learning Classifiers." JOIV : International Journal on Informatics Visualization 6, no. 2-2 (2022): 469. http://dx.doi.org/10.30630/joiv.6.2-2.1093.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/nucleus.61.02.1402.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/thenucleus.2024.1402.
Full textArivunambi, Amirthasaravanan, and Arjun Paramarthalingam. "A Study on Two-Phase Monitoring Server for Ransomware Evaluation and Detection in IoT Environment." Journal of Trends in Computer Science and Smart Technology 4, no. 2 (2022): 72–82. http://dx.doi.org/10.36548/jtcsst.2022.2.003.
Full textVictoire, Dr T. Amalraj. "Ransomware Prevention System using Python and IoT." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–7. https://doi.org/10.55041/isjem03973.
Full textMoussaileb, Routa, Nora Cuppens, Jean-Louis Lanet, and Hélène Le Bouder. "A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms." ACM Computing Surveys 54, no. 6 (2021): 1–36. http://dx.doi.org/10.1145/3453153.
Full textPrasad Purnaye, Et al. "Hypervisor-Level Ransomware Detection in Cloud Using Machine Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2024): 3186–90. http://dx.doi.org/10.17762/ijritcc.v11i9.9508.
Full textSyam Muhaimin, Haslindah, and Hasni. "Analisis Serangan Ransomware Pada Sistem Keamanan Siber Bank Syariah Indoneisa (BSI) Terhadap Customer Turst." Journal Transformation of Mandalika, e-ISSN: 2745-5882, p-ISSN: 2962-2956 6, no. 2 (2025): 67–72. https://doi.org/10.36312/jtm.v6i2.4467.
Full textNeprash, Hannah T., Claire C. McGlave, Dori A. Cross, et al. "Trends in Ransomware Attacks on US Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021." JAMA Health Forum 3, no. 12 (2022): e224873. http://dx.doi.org/10.1001/jamahealthforum.2022.4873.
Full textTemara, Sheetal. "The Ransomware Epidemic: Recent Cybersecurity Incidents Demystified." Asian Journal of Advanced Research and Reports 18, no. 3 (2024): 1–16. http://dx.doi.org/10.9734/ajarr/2024/v18i3610.
Full textAlqahtani, Abdullah, and Frederick T. Sheldon. "A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook." Sensors 22, no. 5 (2022): 1837. http://dx.doi.org/10.3390/s22051837.
Full textSeri Mughni Sulubara. "Perlindungan Data Pribadi dalam Kasus Ransomware: Apa Kata Hukum?" Eksekusi : Jurnal Ilmu Hukum dan Administrasi Negara 2, no. 4 (2024): 426–34. https://doi.org/10.55606/eksekusi.v2i4.1823.
Full textReddy, Desai Rohith, K. Yashwanth Kumar Reddy, and T Niranjan Babu. "Ethical Ransomware Simulation: A Safe Framework for Cybersecurity Training." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 201–9. https://doi.org/10.47001/irjiet/2025.inspire33.
Full textBlessing, Jenny, Jules Drean, and Sarah Radway. "Survey and analysis of U.S. policies to address ransomware." MIT Science Policy Review 3 (August 29, 2022): 38–46. http://dx.doi.org/10.38105/spr.iyuyqypkzm.
Full textTiu, Yan Lin, and Mohamad Fadli Zolkipli. "Study on Prevention and Solution of Ransomware Attack." Journal of IT in Asia 9, no. 1 (2021): 133–39. http://dx.doi.org/10.33736/jita.3402.2021.
Full textB. M. Bandgar. "Analysis of Ransomware Attack Detection Using Machine Learning Algorithms." Communications on Applied Nonlinear Analysis 32, no. 8s (2025): 869–81. https://doi.org/10.52783/cana.v32.3828.
Full textLestari, Julia Ananda, and Ghofar Taufik. "Penerapan NIST 800-61 REV 2 Untuk Analisa Ransomware Attack Pada PT. Sembilan Pilar Semesta Dengan Berbasis SIEM." Jurnal Infortech 6, no. 1 (2024): 15–29. http://dx.doi.org/10.31294/infortech.v6i1.21767.
Full textAdil Hussain Mohammed. "Invasive Weed Optimization Based Ransom-Ware Detection in Cloud Environment." September 2021 7, no. 09 (2021): 1–6. http://dx.doi.org/10.46501/ijmtst0709001.
Full textKOVACS, Attila Mate. "SOFT COMPUTING IN PREVENTING RANSOMWARE RELYING ON LARGER-SCALE DATA AND ANALYSIS." Strategic Impact 87, no. 2 (2023): 66–84. http://dx.doi.org/10.53477/1842-9904-23-12.
Full textJin Ho Park, Jin Ho Park, Sushil Kumar Singh Jin Ho Park, Mikail Mohammed Salim Sushil Kumar Singh, Abir EL Azzaoui Mikail Mohammed Salim, and Jong Hyuk Park Abir EL Azzaoui. "Ransomware-based Cyber Attacks: A Comprehensive Survey." 網際網路技術學刊 23, no. 7 (2022): 1557–64. http://dx.doi.org/10.53106/160792642022122307010.
Full textJegede, Abayomi, Ayotinde Fadele, Monday Onoja, Gilbert Aimufua, and Ismaila Jesse Mazadu. "Trends and Future Directions in Automated Ransomware Detection." Journal of Computing and Social Informatics 1, no. 2 (2022): 17–41. http://dx.doi.org/10.33736/jcsi.4932.2022.
Full textWatney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Full textRODRIGUES GUZELLA DIAS, JHONATAN, RENATA MIRELLA FARINA, and FABIANA FLORIAN. "SEGURANÇA CIBERNÉTICA - ESTUDO DAS TÉCNICAS DE ATAQUES CIBERNÉTICOS (PHISHING, RANSMWARE, DDOS) DE ENGENHARIA SOCIAL E MEDIDAS DE PREVENÇÃO." Revista Científica Semana Acadêmica 12, no. 248 (2024): 1–16. http://dx.doi.org/10.35265/2236-6717-248-13011.
Full textBan, Mohammed Khammas. "Comparative analysis of various machine learning algorithms for ransomware detection." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 1 (2022): 43–51. https://doi.org/10.12928/telkomnika.v20i1.18812.
Full textSathya, T., Keertika N, Shwetha S, Deepti Upodhyay, and Hasanov Muzafar. "Bitcoin Heist Ransomware Attack Prediction Using Data Science Process." E3S Web of Conferences 399 (2023): 04056. http://dx.doi.org/10.1051/e3sconf/202339904056.
Full textEliando, Eliando, and Ary Budi Warsito. "LockBit Black Ransomware On Reverse Shell: Analysis of Infection." CogITo Smart Journal 9, no. 2 (2023): 228–40. http://dx.doi.org/10.31154/cogito.v9i2.494.228-240.
Full textEt.al, MohammedIbrahim. "IoTContact: A Strategy for Predicting Contagious IoT Nodes in Mitigating Ransomware Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 1957–62. http://dx.doi.org/10.17762/turcomat.v12i3.1030.
Full textZhang, Yipeng, Min Li, Xiaoming Zhang, Yueying He, and Zhoujun Li. "Defeat Magic with Magic: A Novel Ransomware Attack Method to Dynamically Generate Malicious Payloads Based on PLC Control Logic." Applied Sciences 12, no. 17 (2022): 8408. http://dx.doi.org/10.3390/app12178408.
Full textKrishna, B. L. "Comparative Study of Fileless Ransomware." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 608–16. https://doi.org/10.5281/zenodo.3892449.
Full textNovita, Aliya Putri, Fahmi Fatmanegara, Faithly Jabez Jefune Runtuwene, Joeanna Talita Samuela, and Muhammad Fahri Syahbani. "CYBER SECURITY THREATS; ANALISIS DAN MITIGASI RESIKO RANSOMWARE DI INDONESIA." Jurnal Ilmiah Sistem Informasi 3, no. 1 (2023): 160–69. http://dx.doi.org/10.46306/sm.v3i1.91.
Full textOwolafe, Otasowie, and Aderonke F. Thompson. "Analysis of Crypto-Ransomware Using Network Traffic." Journal of Information Security and Cybercrimes Research 5, no. 1 (2022): 72–79. http://dx.doi.org/10.26735/jvuj3498.
Full textPoniatowska-Jaksch, Małgorzata. "Threat of ransomware attack in Europe." Journal of Modern Science 52, no. 3 (2023): 379–95. http://dx.doi.org/10.13166/jms/173091.
Full textWira Zanoramy A. Zakaria, Nur Mohammad Kamil Mohammad Alta, Mohd Faizal Abdollah, Othman Abdollah, and S.M. Warusia Mohamed S.M.M Yassin. "Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning." Journal of Advanced Research in Applied Sciences and Engineering Technology 39, no. 2 (2024): 110–31. http://dx.doi.org/10.37934/araset.39.2.110131.
Full textNajam, Hassan. "Ransomware Attack on Medstar: Ethical Position statement." SEISENSE Journal of Management 1, no. 4 (2018): 29–31. https://doi.org/10.5281/zenodo.1435408.
Full textWang, ZiHan, ChaoGe Liu, Jing Qiu, ZhiHong Tian, Xiang Cui, and Shen Su. "Automatically Traceback RDP-Based Targeted Ransomware Attacks." Wireless Communications and Mobile Computing 2018 (December 6, 2018): 1–13. http://dx.doi.org/10.1155/2018/7943586.
Full textFang, Xiang, Eric Song, Cheng Ning, Huseyn Huseynov, and Tarek Saadawi. "Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker." Mathematics 13, no. 12 (2025): 1933. https://doi.org/10.3390/math13121933.
Full textTurner, Adam B., Stephen McCombie, and Allon J. Uhlmann. "Discerning payment patterns in Bitcoin from ransomware attacks." Journal of Money Laundering Control 23, no. 3 (2020): 545–89. http://dx.doi.org/10.1108/jmlc-02-2020-0012.
Full textMohamed, Tasnem Magdi Hassin, Bander Ali Saleh Al-rimy, and Sultan Ahmed Almalki. "A Ransomware Early Detection Model based on an Enhanced Joint Mutual Information Feature Selection Method." Engineering, Technology & Applied Science Research 14, no. 4 (2024): 15400–15407. http://dx.doi.org/10.48084/etasr.7092.
Full textCollier, Roger. "NHS ransomware attack spreads worldwide." Canadian Medical Association Journal 189, no. 22 (2017): E786—E787. http://dx.doi.org/10.1503/cmaj.1095434.
Full textAndersen, Erik Sørup. "How to mitigate ransomware risk through data and risk quantification." Cyber Security: A Peer-Reviewed Journal 8, no. 2 (2025): 131. http://dx.doi.org/10.69554/ztgt3456.
Full textSalunke, Mangesh D., Subhash G. Rathod, Hemantkumar B. Jadhav, Meghna Yashwante, Vaibhav D. Rewaskar, and Pranjali V. Deshmukh. "Implementation of Decoy Deception based Detection System for Ransomware Attack." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 714–19. http://dx.doi.org/10.17762/ijritcc.v11i8s.7673.
Full textTurner, Adam B., Stephen McCombie, and Allon J. Uhlmann. "A target-centric intelligence approach to WannaCry 2.0." Journal of Money Laundering Control 22, no. 4 (2019): 646–65. http://dx.doi.org/10.1108/jmlc-01-2019-0005.
Full textKim, TaeGuen. "Deception-based Method for Ransomware Detection." Journal of Internet Services and Information Security 13, no. 3 (2023): 191–201. http://dx.doi.org/10.58346/jisis.2023.i3.012.
Full textMd. Tauhidur Rahman Rafi, Iffath Tanjim Moon, Md. Musfiqur Rahman Mridha, Md. Shahid Ahammed Shakil, Md. Jamil Chaudhary, and Md. Taufiq Khan. "Enhancing Cybersecurity: Comparative Insights in Machine Learning Models for Ransomware Detection." European Journal of Artificial Intelligence and Machine Learning 4, no. 3 (2025): 1–7. https://doi.org/10.24018/ejai.2025.4.3.60.
Full text