DS et al., 2024 - Google Patents
A Systematic Study on Ransomware Attack: Types, Phases and Recent VariantsDS et al., 2024
- Document ID
- 17572163053340043774
- Author
- DS K
- HR P
- Publication year
- Publication venue
- 2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)
External Links
Snippet
The rise of ransomware attacks presents a major cybersecurity threat, leading to considerable financial losses and disrupting crucial operations across diverse sectors. In- depth research on the field of ransomware assaults is presented in this study, with particular …
- 230000009897 systematic effect 0 title description 2
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dargahi et al. | A Cyber-Kill-Chain based taxonomy of crypto-ransomware features | |
| Perwej et al. | A systematic literature review on the cyber security | |
| Mansfield-Devine | Ransomware: taking businesses hostage | |
| Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
| Etaher et al. | From zeus to zitmo: Trends in banking malware | |
| Mos et al. | The growing influence of ransomware | |
| Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
| Kumar et al. | Anatomy of ransomware: attack stages, patterns and handling techniques | |
| Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
| Barroso | Botnets-the silent threat | |
| Patsakis et al. | The malware as a service ecosystem | |
| DS et al. | A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants | |
| Singh et al. | REvil Ransomware | |
| Diwan | An investigation and analysis of cyber security information systems: latest trends and future suggestion | |
| Cekerevac et al. | HACKING, PROTECTION AND THE CONSEQUENCES OF HACKING. | |
| Prabith et al. | Zero-click exploits and malware: An in-depth analysis and case studies | |
| Fuentes et al. | Modern ransomware’s double extortion tactics and how to protect enterprises against them | |
| Bhunia et al. | Analyzing the 2021 Kaseya ransomware attack: Combined spearphishing through SonicWall SSLVPN vulnerability | |
| Särökaari | Phishing attacks and mitigation tactics | |
| Team | The Ransomware Threat Landscape: What to Expect in 2022 | |
| Hassan | Ransomware overview | |
| Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
| Lakshmi et al. | Machine Learning based Cybersecurity Technique for Detection of Upcoming Cyber Attacks | |
| Chopra et al. | PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD | |
| Vera et al. | Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies |