+

DS et al., 2024 - Google Patents

A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants

DS et al., 2024

Document ID
17572163053340043774
Author
DS K
HR P
Publication year
Publication venue
2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)

External Links

Snippet

The rise of ransomware attacks presents a major cybersecurity threat, leading to considerable financial losses and disrupting crucial operations across diverse sectors. In- depth research on the field of ransomware assaults is presented in this study, with particular …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Dargahi et al. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
Perwej et al. A systematic literature review on the cyber security
Mansfield-Devine Ransomware: taking businesses hostage
Jang-Jaccard et al. A survey of emerging threats in cybersecurity
Etaher et al. From zeus to zitmo: Trends in banking malware
Mos et al. The growing influence of ransomware
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
Kumar et al. Anatomy of ransomware: attack stages, patterns and handling techniques
Ozkaya et al. Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
Barroso Botnets-the silent threat
Patsakis et al. The malware as a service ecosystem
DS et al. A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants
Singh et al. REvil Ransomware
Diwan An investigation and analysis of cyber security information systems: latest trends and future suggestion
Cekerevac et al. HACKING, PROTECTION AND THE CONSEQUENCES OF HACKING.
Prabith et al. Zero-click exploits and malware: An in-depth analysis and case studies
Fuentes et al. Modern ransomware’s double extortion tactics and how to protect enterprises against them
Bhunia et al. Analyzing the 2021 Kaseya ransomware attack: Combined spearphishing through SonicWall SSLVPN vulnerability
Särökaari Phishing attacks and mitigation tactics
Team The Ransomware Threat Landscape: What to Expect in 2022
Hassan Ransomware overview
Narain Ransomware-rising menace to an unsuspecting cyber audience
Lakshmi et al. Machine Learning based Cybersecurity Technique for Detection of Upcoming Cyber Attacks
Chopra et al. PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD
Vera et al. Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载