Chong, 2017 - Google Patents
SeCBD: the application idea from study evaluation of ransomware attack method in big data architectureChong, 2017
View PDF- Document ID
- 10207300837212758208
- Author
- Chong H
- Publication year
- Publication venue
- Procedia computer science
External Links
Snippet
Numerous ransomware attack was launched at May 2017 since it become emerge as trending for new cybercrime business source income model. The attack to several Big Data Architecture causing problem to over 150 countries. Meanwhile, the research on prevention …
- 238000011156 evaluation 0 title description 6
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Oz et al. | A survey on ransomware: Evolution, taxonomy, and defense solutions | |
| McIntosh et al. | Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions | |
| Kumar | An emerging threat fileless malware: a survey and research challenges | |
| Thamer et al. | A survey of ransomware attacks for healthcare systems: Risks, challenges, solutions and opportunity of research | |
| Banin et al. | Multinomial malware classification via low-level features | |
| Melvin et al. | Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud | |
| Chayal et al. | A review on spreading and forensics analysis of windows-based ransomware | |
| Keong Ng et al. | VoterChoice: A ransomware detection honeypot with multiple voting framework | |
| Kara | Cyber-espionage malware attacks detection and analysis: A case study | |
| Awang et al. | Identification of information security threats using data mining approach in campus network | |
| Raymond et al. | Investigation of Android Malware Using Deep Learning Approach. | |
| Chowdhury et al. | Malware detection for healthcare data security | |
| Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
| Chong | SeCBD: the application idea from study evaluation of ransomware attack method in big data architecture | |
| Irfan et al. | A malware detection framework based on forensic and unsupervised machine learning methodologies | |
| Uma et al. | Survey on Android malware detection and protection using data mining algorithms | |
| Yadav et al. | A complete study on malware types and detecting ransomware using API calls | |
| Malkawe et al. | Toward an early assessment for Ransomware attack vulnerabilities | |
| Ross et al. | Pevuln: A benchmark dataset for using machine learning to detect vulnerabilities in pe malware | |
| Shaaban et al. | Comparison study of digital forensics analysis techniques; findings versus resources | |
| Karrar | Adopting Graph-Based Machine Learning Algorithms to Classify Android Malware | |
| Jethva | A new ransomware detection scheme based on tracking file signature and file entropy | |
| Nissim et al. | Scholarly Digital Libraries as a Platform for Malware Distribution. | |
| Rajkumar et al. | Ransomware Attacks in Cyber Space and Mitigation Strategies | |
| Waqas et al. | Security Awareness on Ransomware Threats Detection and their Protection Techniques |