咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 7 篇 计算机科学与技术...
    • 3 篇 网络空间安全
    • 1 篇 环境科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 11 篇 ransomware
  • 2 篇 machine learning
  • 1 篇 data breach
  • 1 篇 healthcare cyber...
  • 1 篇 user-friendly mo...
  • 1 篇 勒索软件
  • 1 篇 sandbox
  • 1 篇 honeypot
  • 1 篇 zero-day attacks
  • 1 篇 恶意程序
  • 1 篇 system calls
  • 1 篇 virtual machine ...
  • 1 篇 虚拟机自省
  • 1 篇 department of he...
  • 1 篇 secure connected...
  • 1 篇 hippa
  • 1 篇 phishing
  • 1 篇 malware classifi...
  • 1 篇 mitre att&ck mat...
  • 1 篇 survey

机构

  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 information&comp...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 computer departm...
  • 1 篇 department of co...
  • 1 篇 department of ma...
  • 1 篇 software college...
  • 1 篇 department of co...
  • 1 篇 西安电子科技大学
  • 1 篇 department of ne...
  • 1 篇 institute of com...
  • 1 篇 school of comput...
  • 1 篇 洛阳广播电视大学

作者

  • 1 篇 morched derbali
  • 1 篇 苏继鹏
  • 1 篇 mohamed k.nour
  • 1 篇 ibrahim abdulrab...
  • 1 篇 farag azzedin
  • 1 篇 nitin naik
  • 1 篇 houssem jerbi
  • 1 篇 k.a.varun kumar
  • 1 篇 jingping song
  • 1 篇 r.t.pavendan
  • 1 篇 chenke luo
  • 1 篇 sadeeq jan
  • 1 篇 joon-young paik
  • 1 篇 fatma s.alrayes
  • 1 篇 jun-seob kim
  • 1 篇 heba mohsen
  • 1 篇 k.sankar
  • 1 篇 qingyu meng
  • 1 篇 olatunde abiona
  • 1 篇 eun-sun cho

语言

  • 9 篇 英文
  • 2 篇 中文
检索条件"主题词=ransomware"
11 条 记 录,以下是1-10 订阅
排序:
ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3401-3424页
作者: Jun-Seob Kim Ki-Woong Park Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
A ransomware attack that interrupted the operation of Colonial Pipeline(a large *** pipeline company),showed that security threats by malware have become serious enough to affect industries and social infrastructure r... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Byte Frequency Based Indicators for Crypto-ransomware Detection from Empirical Analysis
收藏 引用
Journal of Computer Science & Technology 2022年 第2期37卷 423-442页
作者: Geun Yong Kim Joon-Young Paik Yeongcheol Kim Eun-Sun Cho Department of Computer Science and Engineering Chungnam National UniversityDaejeon 34134South Korea School of Computer Science and Technology Tiangong UniversityTianjin 300387China
File entropy is one of the major indicators of crypto-ransomware because the encryption by ransomware increases the randomness of file ***,entropy-based ransomware detection has certain limitations;for example,when di... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Asset-Based Approach to Mitigate Zero-Day ransomware Attacks
收藏 引用
Computers, Materials & Continua 2022年 第11期73卷 3003-3020页
作者: Farag Azzedin Husam Suwad Md Mahfuzur Rahman Information&Computer Science Department KFUPMDhahranKSA
This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’*** security solutions rely on information ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Immunization Scheme for ransomware
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1051-1061页
作者: Jingping Song Qingyu Meng Chenke Luo Nitin Naik Jian Xu Software College Northeastern UniversityShenyang110169China School of Cyber Science and Engineering Wuhan UniversityWuhan430072China School of Computing University of PortsmouthPortsmouthPO12DTUK
In recent years,as the popularity of anonymous currencies such as Bitcoin has made the tracking of ransomware attackers more difficult,the amount of ransomware attacks against personal computers and enterprise product... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A User-friendly Model for ransomware Analysis Using Sandboxing
收藏 引用
Computers, Materials & Continua 2021年 第6期67卷 3833-3846页
作者: Akhtar Kamal Morched Derbali Sadeeq Jan Javed Iqbal Bangash Fazal Qudus Khan Houssem Jerbi Rabeh Abbassi Gulzar Ahmad Department of Computer Science&Information Technology National Center for Cyber SecurityUniversity of Engineering&TechnologyPeshawar25120Pakistan Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Institute of Computer Sciences and Information Technology(ICS/IT) University of AgriculturePeshawar25130Pakistan Department of Industrial/Electrical Engineering College of EngineeringUniversity of Ha’ilHail1234Saudi Arabia Department of Electrical Engineering University of Engineering&TechnologyPeshawar25120Pakistan
ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the *** have been several reported high-profile ransomware attacks including WannaCry,P... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
ransomware恶意软件的检测与阻止技术研究
Ransomware恶意软件的检测与阻止技术研究
收藏 引用
作者: 苏继鹏 西安电子科技大学
学位级别:硕士
近几年来,ransomware开始在全球肆虐,给用户带来巨大的安全威胁。ransomware主要通过加密用户文件或者将用户机器锁屏的方式使受害者无法使用自己的机器,并以此为条件,向用户勒索钱财。ransomware已经给许多企业、政府、组织和个人带来... 详细信息
来源: 同方学位论文库 同方学位论文库 评论
ERAD: Enhanced ransomware Attack Defense System for Healthcare Organizations
收藏 引用
Journal of Software Engineering and Applications 2024年 第5期17卷 270-296页
作者: Xinyue Li Vijay K. Madisetti School of Cybersecurity and Privacy Georgia Institute of Technology Atlanta Georgia USA
Digital integration within healthcare systems exacerbates their vulnerability to sophisticated ransomware threats, leading to severe operational disruptions and data breaches. Current defenses are typically categorize... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3331-3348页
作者: R.T.Pavendan K.Sankar K.A.Varun Kumar Department of Mathematics College of EngineeringAnna UniversityChennai600025India Department of Networking and Communications School of ComputingSRM Institute of Science and TechnologyKattankulathur602203India
Attacks on the cyber space is getting exponential in recent *** penetrations and breaches are real threats to the individuals and *** security systems are good enough to detect the known threats but when it comes to A... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Learning-Based Artificial Algae Algorithm with Optimal Machine Learning Enabled Malware Detection
收藏 引用
Computer Systems Science & Engineering 2023年 第9期46卷 3103-3119页
作者: Khaled M.Alalayah Fatma S.Alrayes Mohamed K.Nour Khadija M.Alaidarous Ibrahim M.Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim Department of Computer Science College of Science and ArtsNajran UniversitySharurahSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
Malware is a‘malicious software program that performs multiple cyberattacks on the Internet,involving fraud,scams,nation-state cyberwar,and *** malicious software programs come under different classifications,namely ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
收藏 引用
International Journal of Communications, Network and System Sciences 2022年 第2期15卷 15-30页
作者: Chevroen Washington Phillip Yarbrough Shavon Parker Rafia Islam Vishnu Vardhan Patamsetti Olatunde Abiona Department of Computer Information Systems Indiana University Northwest Gary USA
This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论