An effective ransomware detection approach in a cloud environment using volatile memory features
暂无分享,去创建一个
[1] C. Rama Krishna,et al. RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique , 2021, Digit. Investig..
[2] Francesco Mercaldo,et al. A framework for supporting ransomware detection and prevention based on hybrid analysis , 2021, Journal of Computer Virology and Hacking Techniques.
[3] Jinsoo Hwang,et al. Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques , 2020, Wirel. Pers. Commun..
[4] Gerardo Canfora,et al. LEILA: Formal Tool for Identifying Mobile Malicious Behaviour , 2019, IEEE Transactions on Software Engineering.
[5] Mikel Izal,et al. Ransomware early detection by the analysis of file sharing traffic , 2018, J. Netw. Comput. Appl..
[6] Elisa Bertino,et al. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware , 2018, RAID.
[7] Yuval Elovici,et al. Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining , 2018, Knowl. Based Syst..
[8] Nir Nissim,et al. Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory , 2018, Expert Syst. Appl..
[9] Joongheon Kim,et al. POSTER: Mining with Proof-of-Probability in Blockchain , 2018, AsiaCCS.
[10] Ali Dehghantanha,et al. Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection , 2018, ArXiv.
[11] L. Javier García-Villalba,et al. Alert correlation framework for malware detection by anomaly-based packet payload analysis , 2017, J. Netw. Comput. Appl..
[12] Prabaharan Poornachandran,et al. Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).
[13] K. P. Soman,et al. Evaluating shallow and deep networks for ransomware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[14] Thomas Barabosch,et al. Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps , 2017, DIMVA.
[15] Fabio Martinelli,et al. R-PackDroid: API package-based characterization and detection of mobile ransomware , 2017, SAC.
[16] Gianluca Stringhini,et al. PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.
[17] Daniele Sgandurra,et al. Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection , 2016, ArXiv.
[18] Wojciech Mazurczyk,et al. Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall , 2016, IEEE Network.
[19] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[20] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[21] Vinay Avasthi,et al. Ransomware Digital Extortion: A Rising New Age Threat , 2016 .
[22] Jaeyeon Moon,et al. Ransomware Analysis and Method for Minimize the Damage , 2016 .
[23] Stefano Zanero,et al. HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.
[24] S. Dija,et al. Extraction of memory forensic artifacts from windows 7 RAM image , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[25] Lianhai Wang,et al. Extracting windows registry information from physical memory , 2011, 2011 3rd International Conference on Computer Research and Development.
[26] D. Nieuwenhuizen. A behavioural-based approach to ransomware detection , 2017 .
[27] Baoxu Liu,et al. Poster : A New Approach to Detecting Ransomware with Deception , 2017 .