Found: 518
Select item for more details and to access through your institution.
Secret Sharing as a Defense Mechanism for Ransomware in Cloud Storage Systems.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 1008
- By:
- Publication type:
- Article
Don't let the bad guys win Everyone has a stake in ensuring the cyber resiliency of our mines.
- Published in:
- Mining Engineering, 2023, v. 75, n. 3, p. 25
- By:
- Publication type:
- Article
Cybersecurity In the Time of COVID: Cybercriminals are taking advantage of lax security as more people work from home.
- Published in:
- Quality Progress, 2020, v. 53, n. 8, p. 7
- Publication type:
- Article
The Spectrum of Cyber Attack.
- Published in:
- Air & Space Power Journal, 2020, v. 34, n. 4, p. 91
- By:
- Publication type:
- Article
Not All Wars Are Violent: Identifying Faulty Assumptions for the Information War.
- Published in:
- Air & Space Power Journal, 2020, v. 34, n. 4, p. 75
- By:
- Publication type:
- Article
Optimal Decisions and Pricing in Mail Service Systems Subject to Virus Attacks.
- Published in:
- Complexity, 2020, p. 1, doi. 10.1155/2020/5930582
- By:
- Publication type:
- Article
The real reliability of modern ICT systems ...
- Published in:
- Quality & Reliability Engineering International, 2020, v. 36, n. 2, p. 435, doi. 10.1002/qre.2635
- Publication type:
- Article
A Supervised Machine Learning Ransomware Host-Based Detection Framework.
- Published in:
- Zambia ICT Journal, 2023, v. 7, n. 1, p. 52, doi. 10.33260/zictjournal.v7i1.132
- By:
- Publication type:
- Article
The Transnational Cybercrime Extortion Landscape and the Pandemic: Changes in ransomware offender tactics, attack scalability and the organisation of offending.
- Published in:
- European Law Enforcement Research Bulletin, 2021, p. 1
- By:
- Publication type:
- Article
Ransomware Detection System Based on Machine Learning.
- Published in:
- Journal of Education & Science, 2021, v. 30, n. 5, p. 86, doi. 10.33899/edusj.2021.130760.1173
- By:
- Publication type:
- Article
STATE-SPONSORED RANSOMWARE THROUGH THE LENS OF MARITIME PIRACY.
- Published in:
- Georgia Journal of International & Comparative Law, 2019, v. 47, n. 3, p. 669
- By:
- Publication type:
- Article
Construction of a preliminary educational system for file backup system using secret sharing technique.
- Published in:
- Electrotechnica & Electronica (E+E), 2018, v. 53, n. 11/12, p. 321
- By:
- Publication type:
- Article
Building a Robust Third-Party Risk Management Program in a Connected Ecosystem.
- Published in:
- ISACA Journal, 2024, n. 5, p. 51
- By:
- Publication type:
- Article
AI and Automation in Cybersecurity: Future Skilling for Efficient Defense.
- Published in:
- ISACA Journal, 2024, n. 3, p. 32
- By:
- Publication type:
- Article
Overcoming Cyberresilience Design Challenges.
- Published in:
- ISACA Journal, 2024, n. 3, p. 14
- By:
- Publication type:
- Article
To Build Digital Trust, Start With Resiliency.
- Published in:
- ISACA Journal, 2024, n. 3, p. 6
- By:
- Publication type:
- Article
Data Interoperability: Addressing the Challenges Placing Quality Healthcare at Risk.
- Published in:
- ISACA Journal, 2024, n. 2, p. 15
- By:
- Publication type:
- Article
Securing the Future: Mitigating Data Security Concerns in AI Models.
- Published in:
- ISACA Journal, 2024, n. 1, p. 23
- By:
- Publication type:
- Article
A Risk-First Approach to Setting an Information Security Budget.
- Published in:
- ISACA Journal, 2023, n. 5, p. 24
- By:
- Publication type:
- Article
Organizing for Cyberresilience.
- Published in:
- ISACA Journal, 2023, n. 5, p. 4
- By:
- Publication type:
- Article
Bank's CyberOps Team Wins EDR Buy-In.
- Published in:
- ISACA Journal, 2023, n. 4, p. 43
- By:
- Publication type:
- Article
Who Leads Cyberresilience?
- Published in:
- ISACA Journal, 2023, n. 2, p. 3
- By:
- Publication type:
- Article
Extending Zero Trust to the End-User Ecosystem.
- Published in:
- ISACA Journal, 2023, n. 1, p. 35
- By:
- Publication type:
- Article
Building Resilient Security in the Age of the Great Reshuffle.
- Published in:
- ISACA Journal, 2022, n. 5, p. 51
- By:
- Publication type:
- Article
It's About (Down) Time.
- Published in:
- ISACA Journal, 2022, n. 5, p. 4
- By:
- Publication type:
- Article
The Crucial Principle of Need to Have Available.
- Published in:
- ISACA Journal, 2022, n. 2, p. 33
- By:
- Publication type:
- Article
Managing Security Across Disparate Database Technologies.
- Published in:
- ISACA Journal, 2022, n. 4, p. 32
- By:
- Publication type:
- Article
Cyber Decisions Only Executives Can Make.
- Published in:
- ISACA Journal, 2022, n. 4, p. 4
- By:
- Publication type:
- Article
Incident Response During the Global COVID-19 Crisis.
- Published in:
- ISACA Journal, 2022, n. 3, p. 42
- By:
- Publication type:
- Article
Cyber (Business) Recovery.
- Published in:
- ISACA Journal, 2022, n. 3, p. 4
- By:
- Publication type:
- Article
Innovating Resilience.
- Published in:
- ISACA Journal, 2021, n. 3, p. 14
- By:
- Publication type:
- Article
Analyzing Reporting on Ransomware Incidents: A Case Study.
- Published in:
- Social Sciences (2076-0760), 2023, v. 12, n. 5, p. 265, doi. 10.3390/socsci12050265
- By:
- Publication type:
- Article
Was tun... ... wenn es passiert? Schritt für Schritt beim Hackereintritt.
- Published in:
- IM + io, 2023, n. 3, p. 90
- By:
- Publication type:
- Article
Auf Spurensuche im Netz: Das Milliardengeschäft Cybercrime.
- Published in:
- IM + io, 2023, n. 3, p. 86
- By:
- Publication type:
- Article
Trends in Mobile Ransomware and Incident Response from a Digital Forensics Perspective.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2022, v. 20, n. 4, p. 280, doi. 10.56977/jicce.2022.20.4.280
- By:
- Publication type:
- Article
Computational intelligence anti-malware framework for android OS.
- Published in:
- Vietnam Journal of Computer Science (Springer Nature), 2017, v. 4, n. 4, p. 245, doi. 10.1007/s40595-017-0095-3
- By:
- Publication type:
- Article
МОНІТОРИНГ ВІРУСІВ-ВИМАГАЧІВ ЗА ДОПОМОГОЮ РОЗШИРЕНОГО БЕРКЛІЙСЬКОГО ПАКЕТНОГО ФІЛЬТРА (EBPF) ТА МАШИННОГО НАВЧАННЯ.
- Published in:
- Science-Based Technologies, 2023, v. 60, n. 4, p. 352, doi. 10.18372/2310-5461.60.18029
- By:
- Publication type:
- Article
RANSOMWARE E CIBERSEGURANÇA: A INFORMAÇÃO AMEAÇADA POR ATAQUES A DADOS.
- Published in:
- Revista Thesis Juris, 2020, v. 9, n. 1, p. 208, doi. 10.5585/rtj.v9i1.16739
- By:
- Publication type:
- Article
Classification of ransomware using different types of neural networks.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-08504-6
- By:
- Publication type:
- Article
Ransomware attacks - how to deal with them.
- Published in:
- Education Journal, 2022, n. 501, p. 27
- By:
- Publication type:
- Article
Protect your school from Ransomware attacks.
- Published in:
- Education Journal, 2022, n. 500, p. 32
- By:
- Publication type:
- Article
How can the education sector boost its cyber resilience?
- Published in:
- Education Journal, 2022, n. 490, p. 20
- By:
- Publication type:
- Article
Another cyber attack on FE college .
- Published in:
- Education Journal, 2021, n. 447, p. 8
- Publication type:
- Article
Education institutions must act to avoid falling foul to ransomware.
- Published in:
- Education Journal, 2020, n. 424, p. 19
- By:
- Publication type:
- Article
Department for Digital, Culture, Media and Sport.
- Published in:
- Education Journal, 2019, n. 384, p. 47
- Publication type:
- Article
Comparative analysis of various machine learning algorithms for ransomware detection.
- Published in:
- Telkomnika, 2022, v. 20, n. 1, p. 43, doi. 10.12928/TELKOMNIKA.v20i1.18812
- By:
- Publication type:
- Article
Identification and Analysis of Ransomware Transactions in the Bitcoin Network.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2024, v. 16, n. 2, p. 48, doi. 10.15849/IJASCA.240730.04
- By:
- Publication type:
- Article
A Comprehensive Review on the Cyber Security Methods in Indian Organisation.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2022, v. 14, n. 1, p. 102, doi. 10.15849/IJASCA.220328.08
- By:
- Publication type:
- Article
Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 3, p. 677, doi. 10.3390/sym15030677
- By:
- Publication type:
- Article
KRRecover: An Auto-Recovery Tool for Hijacked Devices and Encrypted Files by Ransomwares on Android.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 5, p. 861, doi. 10.3390/sym13050861
- By:
- Publication type:
- Article