Sgandurra et al., 2016
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Sgandurra et al. | Automated dynamic analysis of ransomware: Benefits, limitations and use for detection | |
| Reshmi | Information security breaches due to ransomware attacks-a systematic literature review | |
| Moussaileb et al. | A survey on windows-based ransomware taxonomy and detection mechanisms | |
| Chumachenko | Machine learning methods for malware detection and classification | |
| Aldauiji et al. | Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art | |
| Jethva et al. | Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring | |
| Demme et al. | On the feasibility of online malware detection with performance counters | |
| Adamu et al. | Ransomware prediction using supervised learning algorithms | |
| Poudyal et al. | Analysis of crypto-ransomware using ML-based multi-level profiling | |
| Upadhyaya et al. | Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet | |
| Rani et al. | A survey on machine learning-based ransomware detection | |
| Nissim et al. | Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework | |
| Zakaria et al. | Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection | |
| Pandiaraja et al. | A graph-based model for discovering host-based hook attacks | |
| Goyal et al. | Crypto-ransomware detection using behavioural analysis | |
| Milosevic et al. | Malware threats and solutions for trustworthy mobile systems design | |
| Sabharwal et al. | Ransomware attack: India issues red alert | |
| Zakaria et al. | Early detection of windows cryptographic ransomware based on pre-attack api calls features and machine learning | |
| Malik et al. | Critical feature selection for machine learning approaches to detect ransomware | |
| Alzahrani et al. | A Survey of Ransomware Detection Methods | |
| Canzanese Jr | Detection and classification of malicious processes using system call analysis | |
| Tari et al. | Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data security | |
| AlMasri et al. | Detecting Spyware in Android Devices Using Random Forest | |
| Ferdous et al. | Malware resistant data protection in hyper-connected networks: A survey | |
| Oz et al. | Ransomware over modern Web browsers: a novel strain and a new defense mechanism |