2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) 2015
DOI: 10.1109/iscisc.2015.7387902
|View full text |Cite
|
Sign up to set email alerts
|

Connection-monitor & connection-breaker: A novel approach for prevention and detection of high survivable ransomwares

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 58 publications
(56 citation statements)
references
References 5 publications
0
53
0
Order By: Relevance
“…Ahmadian et al [23] present an approach for detecting and preventing highly survivable ransomware based on a principal feature discovered in the taxonomy. The focus of their work is to provide data resilience via monitoring and preventing the encryption of the victim's data.…”
Section: Related Workmentioning
confidence: 99%
“…Ahmadian et al [23] present an approach for detecting and preventing highly survivable ransomware based on a principal feature discovered in the taxonomy. The focus of their work is to provide data resilience via monitoring and preventing the encryption of the victim's data.…”
Section: Related Workmentioning
confidence: 99%
“…8 According to Kaspersky, when it is operated in the manner above, ransomware is exceedingly dangerous because the encrypted files cannot be recovered. The first step is seeking out the victim, for which ransomware writers propagate their ransomware using spam mail or other propagation methods.…”
Section: Name Descriptionmentioning
confidence: 99%
“…12 CryptorBit This ransomware emerged in 2013, and it encrypts the first 512 bytes of a file based on polyalphabetic substitution. 8 Trojan. Win32.Filecode This ransomware performs encryption based on private key-based cryptographic algorithm.…”
Section: Gpcodermentioning
confidence: 99%
See 2 more Smart Citations