2023
DOI: 10.1109/access.2023.3328314
|View full text |Cite
|
Sign up to set email alerts
|

Android Ransomware Analysis Using Convolutional Neural Network and Fuzzy Hashing Features

Horacio Rodriguez-Bazan,
Grigori Sidorov,
Ponciano Jorge Escamilla-Ambrosio

Abstract: Most of the time, cybercriminals look for new ways to bypass security controls by improving their attacks. In the 1980s, attackers developed malware to kidnap user data by requesting payment. Malware is called a ransomware. Recently, they have demanded payment in Bitcoin or any other cryptocurrency. Ransomware is one of the most dangerous threats on the Internet, and this type of malware could affect almost all devices. Malware cipher device data, making them inaccessible to users. In this study, a new method … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 40 publications
0
0
0
Order By: Relevance