Shah et al., 2017 - Google Patents
Ransomware-Threats, vulnerabilities and recommendationsShah et al., 2017
View PDF- Document ID
- 6517573710190385520
- Author
- Shah N
- Farik M
- Publication year
- Publication venue
- International Journal of Scientific & Technology Research
External Links
Snippet
Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly …
- 238000005516 engineering process 0 abstract description 12
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shah et al. | Ransomware-Threats, vulnerabilities and recommendations | |
Mansfield-Devine | Ransomware: taking businesses hostage | |
Tandon et al. | A comprehensive survey on ransomware attack: A growing havoc cyberthreat | |
Tailor et al. | A comprehensive survey: ransomware attacks prevention, monitoring and damage control | |
Kharraz et al. | Cutting the gordian knot: A look under the hood of ransomware attacks | |
Chowdhury | Recent cyber security attacks and their mitigation approaches–an overview | |
Upadhyaya et al. | Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet | |
Teichmann | Ransomware attacks in the context of generative artificial intelligence—an experimental study | |
US20130263226A1 (en) | False Banking, Credit Card, and Ecommerce System | |
Azam et al. | Cybercrime Unmasked: Investigating cases and digital evidence | |
Lazarov et al. | Honey sheets: What happens to leaked google spreadsheets? | |
Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
Adams | Learning the lessons of WannaCry | |
Cherepanov et al. | Blackenergy–what we really know about the notorious cyber attacks | |
Hassan | Ransomware Families: The Most Prominent Ransomware Strains | |
Patel et al. | A malicious activity monitoring mechanism to detect and prevent ransomware | |
Dhawan et al. | Unfolding the mystery of ransomware | |
DS et al. | A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants | |
Sriram et al. | A hybrid protocol to secure the cloud from insider threats | |
Jimada et al. | Analysis of ransomware, methodologies used by attackers and mitigation techniques | |
Snoke et al. | An updated framework of defenses against ransomware | |
Hassan | Ransomware overview | |
Team | The Ransomware Threat Landscape: What to Expect in 2022 | |
Al Faisal et al. | Growing digital vulnerability: A case study of threats to Pakistans national assets | |
Yakubdjanovna et al. | Analysis of Information Security Problems in Electronic Management with Possible Solutions |