Works matching DE "RANSOMWARE"
Results: 551
National Cyber Governance Awareness Policy and Framework.
- Published in:
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- By:
- Publication type:
- Article
Policy Development and Frameworks for Cyber Security in Corporates and Law Firms.
- Published in:
- International Journal of Legal Information, 2018, v. 46, n. 3, p. 137, doi. 10.1017/jli.2018.41
- By:
- Publication type:
- Article
Multi-step Operations Strategic Framework for Ransomware Protection.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2020, v. 85, n. 4, p. 16
- By:
- Publication type:
- Article
Integrated Network Monitoring using Zabbix with Push Notification via Telegram.
- Published in:
- Journal of Computing Research & Innovation, 2022, v. 7, n. 1, p. 155, doi. 10.24191/jcrinn.v7i1.282
- By:
- Publication type:
- Article
SEGURANÇA DA INFORMAÇÃO COM FOCO NA PROPAGAÇÃO IMINENTE DE RANSOMWARE NAS CORPORAÇÕES.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 5, p. 1, doi. 10.54751/revistafoco.v16n5-024
- By:
- Publication type:
- Article
Navigating Cyber Insurance Coverage for Water Utilities.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 10, p. 58, doi. 10.1002/awwa.2373
- By:
- Publication type:
- Article
Think Twice Before Clicking.
- Published in:
- Journal: American Water Works Association, 2022, v. 114, n. 3, p. 80, doi. 10.1002/awwa.1890
- Publication type:
- Article
An Empirical Assessment of Botnets and Detection Methods.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2828
- By:
- Publication type:
- Article
Understanding the Influence of Ransomware: An Investigation on its Development, Mitigation and Avoidance Techniques.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 3, p. 123
- By:
- Publication type:
- Article
Ransomware Detection Based on Opcode Behaviour Using K-Nearest Neighbours Algorithm.
- Published in:
- Information Technology & Control, 2021, v. 50, n. 3, p. 495, doi. 10.5755/j01.itc.50.3.25816
- By:
- Publication type:
- Article
Proactive Ransomware Detection Using Extremely Fast Decision Tree (EFDT) Algorithm: A Case Study.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 6, p. 121, doi. 10.3390/computers12060121
- By:
- Publication type:
- Article
In-Depth Analysis of Ransom Note Files.
- Published in:
- Computers (2073-431X), 2021, v. 10, n. 11, p. 145, doi. 10.3390/computers10110145
- By:
- Publication type:
- Article
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm.
- Published in:
- Computers (2073-431X), 2019, v. 8, n. 4, p. 79, doi. 10.3390/computers8040079
- By:
- Publication type:
- Article
Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures.
- Published in:
- Computers (2073-431X), 2019, v. 8, n. 2, p. 35, doi. 10.3390/computers8020035
- By:
- Publication type:
- Article
Was tun... ... wenn es passiert? Schritt für Schritt beim Hackereintritt.
- Published in:
- IM + io, 2023, n. 3, p. 90
- By:
- Publication type:
- Article
Auf Spurensuche im Netz: Das Milliardengeschäft Cybercrime.
- Published in:
- IM + io, 2023, n. 3, p. 86
- By:
- Publication type:
- Article
Machine-Learning Classifiers for Malware Detection Using Data Features.
- Published in:
- Journal of ICT Research & Applications, 2021, v. 15, n. 3, p. 265, doi. 10.5614/itbj.ict.res.appl.2021.15.3.5
- By:
- Publication type:
- Article
Protecting your veterinary practice from cyber threats.
- Published in:
- Veterinary Ireland Journal, 2022, v. 12, n. 9, p. 504
- Publication type:
- Article
The CISA on DarkSide Ransomware and Best Practices for Preventing Business Disruption from Ransomware Attacks.
- Published in:
- Seybold Report: Analyzing Publishing Technologies, 2021, v. 21, n. 13, p. 4
- Publication type:
- Article
Best Practices for Preventing Business Disruption from Ransomware Attacks.
- Published in:
- Seybold Report: Analyzing Publishing Technologies, 2021, v. 21, n. 13, p. 2
- Publication type:
- Article
A Ransomware Early Detection Model based on an Enhanced Joint Mutual Information Feature Selection Method.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 4, p. 15400, doi. 10.48084/etasr.7092
- By:
- Publication type:
- Article
Ransomware Early Detection Techniques.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 3, p. 14497, doi. 10.48084/etasr.6915
- By:
- Publication type:
- Article
Comprehensive Analysis of IoT Malware Evasion Techniques.
- Published in:
- Engineering, Technology & Applied Science Research, 2021, v. 11, n. 4, p. 7495, doi. 10.48084/etasr.4296
- By:
- Publication type:
- Article
SOFT COMPUTING IN PREVENTING RANSOMWARE RELYING ON LARGER-SCALE DATA AND ANALYSIS.
- Published in:
- Strategic Impact, 2023, v. 87, n. 2, p. 66, doi. 10.53477/1842-9904-23-12
- By:
- Publication type:
- Article
On the social science of ransomware: Technology, security, and society.
- Published in:
- Comparative Strategy, 2019, v. 38, n. 4, p. 347, doi. 10.1080/01495933.2019.1633187
- By:
- Publication type:
- Article
Machine Learning as a Tool to Combat Ransomware in Resource-Constrained Business Environment.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 12, p. 509, doi. 10.14569/ijacsa.2024.0151253
- By:
- Publication type:
- Article
Secret Sharing as a Defense Mechanism for Ransomware in Cloud Storage Systems.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 1008, doi. 10.14569/ijacsa.2024.01510102
- By:
- Publication type:
- Article
Pre-Encryption Ransomware Detection (PERD) Taxonomy, and Research Directions: Systematic Literature Review.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 9, p. 165, doi. 10.14569/ijacsa.2024.0150917
- By:
- Publication type:
- Article
Analysis of Ransomware Impact on Android Systems using Machine Learning Techniques.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2023, v. 14, n. 11, p. 775, doi. 10.14569/ijacsa.2023.0141178
- By:
- Publication type:
- Article
Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware.
- Published in:
- Games (20734336), 2023, v. 14, n. 2, p. 20, doi. 10.3390/g14020020
- By:
- Publication type:
- Article
Ransomware and Reputation.
- Published in:
- Games (20734336), 2019, v. 10, n. 2, p. 26, doi. 10.3390/g10020026
- By:
- Publication type:
- Article
Early Ransomware Detection with Deep Learning Models.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 291, doi. 10.3390/fi16080291
- By:
- Publication type:
- Article
Investigating IPTV Malware in the Wild.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 325, doi. 10.3390/fi15100325
- By:
- Publication type:
- Article
An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 318, doi. 10.3390/fi15100318
- By:
- Publication type:
- Article
Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems.
- Published in:
- Future Internet, 2023, v. 15, n. 4, p. 144, doi. 10.3390/fi15040144
- By:
- Publication type:
- Article
Ransomware-Resilient Self-Healing XML Documents.
- Published in:
- Future Internet, 2022, v. 14, n. 4, p. 115, doi. 10.3390/fi14040115
- By:
- Publication type:
- Article
CYBERSECURITY CHALLENGES IN AN AI ENABLED WORLD.
- Published in:
- Journal of Information System Security, 2023, v. 19, n. 3, p. 165
- By:
- Publication type:
- Article
AN INSIDE VIEW OF A RANSOMWARE ATTACK RESPONSE AND RECOVERY.
- Published in:
- Journal of Information System Security, 2023, v. 19, n. 2, p. 97
- By:
- Publication type:
- Article
HOW U.S. AND CANADIAN UNIVERSITIES AND COLLEGES DEALT WITH MALWARE AND RANSOMWARE ATTACKS IN 2016-2017.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 2, p. 117
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 2, p. 75
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 1, p. 1
- By:
- Publication type:
- Article
HOW U.S. AND CANADIAN UNIVERSITIES AND COLLEGES DEALT WITH MALWARE AND RANSOMWARE ATTACKS IN 2016-2017.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 2, p. 117
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 2, p. 75
- Publication type:
- Article
RANSOMWARE AND ITS IMPLICATIONS: A REPORT.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 1, p. 61
- By:
- Publication type:
- Article
Special Issue on Bright Information and Communication Technologies in the 21st Century.
- Published in:
- Information Systems Frontiers, 2023, v. 25, n. 5, p. 1661, doi. 10.1007/s10796-023-10407-4
- By:
- Publication type:
- Article
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification.
- Published in:
- Information Systems Frontiers, 2021, v. 23, n. 2, p. 299, doi. 10.1007/s10796-020-10017-4
- By:
- Publication type:
- Article
ENTERPRISE TOOLS FOR DATA FORENSICS.
- Published in:
- Annals of DAAAM & Proceedings, 2021, v. 32, p. 98, doi. 10.2507/32nd.daaam.proceedings.014
- By:
- Publication type:
- Article
Crow Search with Adaptive Awareness Probability-Based Deep Belief Network for Detecting Ransomware.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2022, v. 36, n. 11, p. 1, doi. 10.1142/S0218001422510107
- By:
- Publication type:
- Article
Building trust in digital trade will require a rethink of trade policy-making.
- Published in:
- Oxford Review of Economic Policy, 2023, v. 39, n. 1, p. 98, doi. 10.1093/oxrep/grac046
- By:
- Publication type:
- Article
An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset.
- Published in:
- Enterprise Information Systems, 2024, v. 18, n. 9, p. 1, doi. 10.1080/17517575.2024.2369952
- By:
- Publication type:
- Article