The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) 2021
DOI: 10.1109/icsccc51823.2021.9478148
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Ransomware Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Enta Nawral et al [26] proposed the neural network model based on perceptron which is used to have the security check in VANET system. In addition, the public key infrastructure (PKI)…”
Section: Perceptron Model (Ann)mentioning
confidence: 99%
“…Enta Nawral et al [26] proposed the neural network model based on perceptron which is used to have the security check in VANET system. In addition, the public key infrastructure (PKI)…”
Section: Perceptron Model (Ann)mentioning
confidence: 99%
“…With the increasing presence of Android devices and the open nature of the platform, which allows easy app downloads from unofficial sources, the severity of ransomware attacks has reached alarming levels. In such a situation, data recovery can be challenging, and the risk of further attacks and identity theft is increased, leading to a diminished trust in security solutions by users [ 5 , 6 ]. Ransomware attacks commonly focus on specific industries.…”
Section: Introductionmentioning
confidence: 99%
“…Ransomware is a type of malware that encrypts files on a device, rendering them and the systems that rely on them inoperable. Malicious actors will then demand a ransom to decrypt the data [1]. Ransomware is one of the most severe cyber threats to businesses and operations.…”
Section: Introductionmentioning
confidence: 99%