Found: 495
Select item for more details and to access through your institution.
Assessment Of Students Cybersecurity Awareness And Strategies To Safeguard Against Cyber Threats.
- Published in:
- Journal of Advanced Zoology, 2024, v. 45, p. 82
- By:
- Publication type:
- Article
Knowledge Held Hostage: What the British Library Ransomware Attack Can Teach Us.
- Published in:
- College & Research Libraries, 2024, v. 85, n. 5, p. 628, doi. 10.5860/crl.85.5.628
- By:
- Publication type:
- Article
Ransomware Attacks, ED Visits and Inpatient Admissions in Targeted and Nearby Hospitals.
- Published in:
- JAMA: Journal of the American Medical Association, 2024, v. 331, n. 24, p. 2129, doi. 10.1001/jama.2024.7752
- By:
- Publication type:
- Article
Ransomware Detection Model Based on Adaptive Graph Neural Network Learning †.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4579, doi. 10.3390/app14114579
- By:
- Publication type:
- Article
How to Circumvent and Beat the Ransomware in Android Operating System—A Case Study of Locker.CB!tr.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 11, p. 2212, doi. 10.3390/electronics13112212
- By:
- Publication type:
- Article
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 1679, doi. 10.1007/s10207-023-00809-5
- By:
- Publication type:
- Article
Real-time system call-based ransomware detection.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 1839, doi. 10.1007/s10207-024-00819-x
- By:
- Publication type:
- Article
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 2377, doi. 10.1007/s10207-024-00841-z
- By:
- Publication type:
- Article
2023 A record-breaking year for cybercrime.
- Published in:
- Bench & Bar of Minnesota, 2024, v. 81, n. 4, p. 14
- By:
- Publication type:
- Article
Top 25 2024 Doers, Dreamers & Drivers.
- Published in:
- Government Technology, 2024, v. 37, n. 4, p. 16
- By:
- Publication type:
- Article
Playing to Government’s Strengths in Cybersecurity.
- Published in:
- Government Technology, 2024, v. 37, n. 4, p. 46
- Publication type:
- Article
Novel Ransomware Detection Exploiting Uncertainty and Calibration Quality Measures Using Deep Learning.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 5, p. 262, doi. 10.3390/info15050262
- By:
- Publication type:
- Article
Insights into Cybercrime Detection and Response: A Review of Time Factor.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 5, p. 273, doi. 10.3390/info15050273
- By:
- Publication type:
- Article
To Build Digital Trust, Start With Resiliency.
- Published in:
- ISACA Journal, 2024, n. 3, p. 6
- By:
- Publication type:
- Article
Overcoming Cyberresilience Design Challenges.
- Published in:
- ISACA Journal, 2024, n. 3, p. 14
- By:
- Publication type:
- Article
AI and Automation in Cybersecurity: Future Skilling for Efficient Defense.
- Published in:
- ISACA Journal, 2024, n. 3, p. 32
- By:
- Publication type:
- Article
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 9, p. 2679, doi. 10.3390/s24092679
- By:
- Publication type:
- Article
Can Windows 11 Stop Well-Known Ransomware Variants? An Examination of Its Built-in Security Features.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 8, p. 3520, doi. 10.3390/app14083520
- By:
- Publication type:
- Article
Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 1, p. 857, doi. 10.32604/cmc.2024.048036
- By:
- Publication type:
- Article
An Incremental Mutual Information-Selection Technique for Early Ransomware Detection.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 4, p. 194, doi. 10.3390/info15040194
- By:
- Publication type:
- Article
Cashing out crypto: state of practice in ransom payments.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 699, doi. 10.1007/s10207-023-00766-z
- By:
- Publication type:
- Article
ARdetector: android ransomware detection framework.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 6, p. 7557, doi. 10.1007/s11227-023-05741-y
- By:
- Publication type:
- Article
DFRMIdroid: A Comprehensive Fusion Approach Utilizing Permissions and Intents Analysis with the DFR-MI Algorithm for Enhanced Malware Detection on Android Devices.
- Published in:
- Revue d'Intelligence Artificielle, 2024, v. 38, n. 2, p. 491, doi. 10.18280/ria.380212
- By:
- Publication type:
- Article
A Study on Countermeasures against Neutralizing Technology: Encoding Algorithm-Based Ransomware Detection Methods Using Machine Learning †.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 6, p. 1030, doi. 10.3390/electronics13061030
- By:
- Publication type:
- Article
e MIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 6, p. 1728, doi. 10.3390/s24061728
- By:
- Publication type:
- Article
Cybersecurity carrots and sticks.
- Published in:
- American Business Law Journal, 2024, v. 61, n. 1, p. 5, doi. 10.1111/ablj.12238
- By:
- Publication type:
- Article
Minnesota data breaches and the ongoing threat of ransomware.
- Published in:
- Bench & Bar of Minnesota, 2024, v. 81, n. 2, p. 10
- By:
- Publication type:
- Article
Analysis of Weight-Based Voting Classifier for Intrusion Detection System.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 2, p. 190, doi. 10.22266/ijies2024.0430.17
- By:
- Publication type:
- Article
Data Interoperability: Addressing the Challenges Placing Quality Healthcare at Risk.
- Published in:
- ISACA Journal, 2024, n. 2, p. 15
- By:
- Publication type:
- Article
CYBER-PHYSICAL SECURITY THROUGH FACIAL RECOGNITION AND SENSOR DATA ANALYSIS.
- Published in:
- Journal of Chemical Technology & Metallurgy, 2024, v. 59, n. 2, p. 465, doi. 10.59957/jctm.v59.i2.2024.27
- By:
- Publication type:
- Article
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 5, p. 1446, doi. 10.3390/s24051446
- By:
- Publication type:
- Article
Dynamic Malware Classification and API Categorisation of Windows Portable Executable Files Using Machine Learning.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 3, p. 1015, doi. 10.3390/app14031015
- By:
- Publication type:
- Article
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 1, p. 533, doi. 10.1007/s10207-023-00758-z
- By:
- Publication type:
- Article
An Empirical Assessment of Botnets and Detection Methods.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, p. 2828
- By:
- Publication type:
- Article
Cybersecurity Threats Prompt Proactive Approach.
- Published in:
- Chemical Engineering, 2024, v. 131, n. 1, p. 12
- By:
- Publication type:
- Article
Android ransomware detection using binary Jaya optimization algorithm.
- Published in:
- Expert Systems, 2024, v. 41, n. 1, p. 1, doi. 10.1111/exsy.13479
- By:
- Publication type:
- Article
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 1, p. 46, doi. 10.3390/info15010046
- By:
- Publication type:
- Article
Securing the Future: Mitigating Data Security Concerns in AI Models.
- Published in:
- ISACA Journal, 2024, n. 1, p. 23
- By:
- Publication type:
- Article
A Case Study for Conceptually Modeling Alternative Exploratory Geopolitical Analysis: What if the REvil Ransomware FSB Arrest Video Was Authentic?
- Published in:
- Journal of Information Warfare, 2024, v. 23, n. 1, p. 50
- By:
- Publication type:
- Article
Enhancing Civil Nuclear Cyber Security.
- Published in:
- Nuclear Future, 2024, v. 20, n. 1, p. 42
- By:
- Publication type:
- Article
Cyberbreaches in Critical Infrastructure: Focus on India — The Club of Countries with Cyberbreach Legislation expands to include a New Member.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 6, p. 175, doi. 10.9785/cri-2023-240604
- By:
- Publication type:
- Article
Cybersecurity.
- Published in:
- Government Technology, 2023, v. 36, n. 8, p. 20
- By:
- Publication type:
- Article
Ransomware and the Robin Hood effect?: Experimental evidence on Americans' willingness to support cyber-extortion.
- Published in:
- Journal of Experimental Criminology, 2023, v. 19, n. 4, p. 943, doi. 10.1007/s11292-022-09515-z
- By:
- Publication type:
- Article
Ransomware Detection Service: Execution and Analysis Using Machine Learning Techniques.
- Published in:
- Wireless Personal Communications, 2023, v. 133, n. 2, p. 995, doi. 10.1007/s11277-023-10801-w
- By:
- Publication type:
- Article
Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 21, p. 4494, doi. 10.3390/electronics12214494
- By:
- Publication type:
- Article
Analysis of Ransomware Impact on Android Systems using Machine Learning Techniques.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2023, v. 14, n. 11, p. 775, doi. 10.14569/ijacsa.2023.0141178
- By:
- Publication type:
- Article
A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 21, p. 8724, doi. 10.3390/s23218724
- By:
- Publication type:
- Article
Cyber breaches in Critical Infrastructure: It's not just about Personal Data Breaches Anymore (Part 2): A comparison of the new security regime for critical infrastructures in Canada, USA and EU.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 5, p. 148, doi. 10.9785/cri-2023-240504
- By:
- Publication type:
- Article
An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 318, doi. 10.3390/fi15100318
- By:
- Publication type:
- Article
Investigating IPTV Malware in the Wild.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 325, doi. 10.3390/fi15100325
- By:
- Publication type:
- Article