[go: up one dir, main page]

Chong, 2017 - Google Patents

SeCBD: the application idea from study evaluation of ransomware attack method in big data architecture

Chong, 2017

View PDF
Document ID
10207300837212758208
Author
Chong H
Publication year
Publication venue
Procedia computer science

External Links

Snippet

Numerous ransomware attack was launched at May 2017 since it become emerge as trending for new cybercrime business source income model. The attack to several Big Data Architecture causing problem to over 150 countries. Meanwhile, the research on prevention …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Oz et al. A survey on ransomware: Evolution, taxonomy, and defense solutions
McIntosh et al. Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
Kumar An emerging threat fileless malware: a survey and research challenges
Thamer et al. A survey of ransomware attacks for healthcare systems: Risks, challenges, solutions and opportunity of research
Banin et al. Multinomial malware classification via low-level features
Melvin et al. Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud
Chayal et al. A review on spreading and forensics analysis of windows-based ransomware
Keong Ng et al. VoterChoice: A ransomware detection honeypot with multiple voting framework
Kara Cyber-espionage malware attacks detection and analysis: A case study
Awang et al. Identification of information security threats using data mining approach in campus network
Raymond et al. Investigation of Android Malware Using Deep Learning Approach.
Chowdhury et al. Malware detection for healthcare data security
Gupta et al. Developing a blockchain-based and distributed database-oriented multi-malware detection engine
Chong SeCBD: the application idea from study evaluation of ransomware attack method in big data architecture
Irfan et al. A malware detection framework based on forensic and unsupervised machine learning methodologies
Uma et al. Survey on Android malware detection and protection using data mining algorithms
Yadav et al. A complete study on malware types and detecting ransomware using API calls
Malkawe et al. Toward an early assessment for Ransomware attack vulnerabilities
Ross et al. Pevuln: A benchmark dataset for using machine learning to detect vulnerabilities in pe malware
Shaaban et al. Comparison study of digital forensics analysis techniques; findings versus resources
Karrar Adopting Graph-Based Machine Learning Algorithms to Classify Android Malware
Jethva A new ransomware detection scheme based on tracking file signature and file entropy
Nissim et al. Scholarly Digital Libraries as a Platform for Malware Distribution.
Rajkumar et al. Ransomware Attacks in Cyber Space and Mitigation Strategies
Waqas et al. Security Awareness on Ransomware Threats Detection and their Protection Techniques