A Comprehensive Analysis of Machine Learning Based File Trap Selection Methods to Detect Crypto Ransomware Authors: Mohan Anand Putrevu, Hrushikesh Chunduri, Venkata Sai Charan Putrevu, Sandeep K Shukla | Published: 2024-09-13 Ransomware Assessment 2024.09.13 2025.05.27 Literature Database
Ransomware Detection Using Machine Learning in the Linux Kernel Authors: Adrian Brodzik, Tomasz Malec-Kruszyński, Wojciech Niewolski, Mikołaj Tkaczyk, Krzysztof Bocianiak, Sok-Yen Loui | Published: 2024-09-10 System ObservabilityRansomware AssessmentMachine Learning Method 2024.09.10 2025.05.27 Literature Database
Zero-day attack and ransomware detection Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08 CybersecurityRansomware AssessmentMachine Learning Method 2024.08.08 2025.05.27 Literature Database
Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset Authors: Peace Azugo, Hein Venter, Mike Wa Nkongolo | Published: 2024-04-19 CybersecurityDataset GenerationRansomware Assessment 2024.04.19 2025.05.27 Literature Database
WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12 CybersecurityRansomware AssessmentSelection and Evaluation of Optimization Algorithms 2024.03.12 2025.05.27 Literature Database
Ransomware threat mitigation through network traffic analysis and machine learning techniques Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04 CybersecurityRansomware AssessmentMachine Learning Method 2024.01.27 2025.05.27 Literature Database
Studying Ransomware Attacks Using Web Search Logs Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23 User Behavior AnalysisRansomware AssessmentInformation Gathering Methods 2020.05.01 2025.05.28 Literature Database
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection Authors: Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges | Published: 2019-10-15 Cyber ThreatRansomware AssessmentFeature Selection Method 2019.10.15 2025.05.28 Literature Database