Author of the publication

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks.

, , , and . KSII Trans. Internet Inf. Syst., 13 (6): 3258-3279 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reasoning crypto ransomware infection vectors with Bayesian networks., , and . ISI, page 149-151. IEEE, (2017)Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security., , , and . J. Comput. Inf. Syst., 60 (4): 297-308 (2020)A Ransomware Classification Framework Based on File-Deletion and File-Encryption Attack Structures., , and . CoRR, (2021)Emerging Mobile Phone-based Social Engineering Cyberattacks in the Zambian ICT Sector., , and . CoRR, (2022)Addressing Crypto-Ransomware Attacks: Before You Decide whether To-Pay or Not-To., , and . J. Comput. Inf. Syst., 61 (1): 53-63 (2021)Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics., , , and . Future Gener. Comput. Syst., (2020)Demystifying Cryptocurrency Mining Attacks: A Semi-supervised Learning Approach Based on Digital Forensics and Dynamic Network Characteristics., , , and . CoRR, (2021)Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems., , and . ICT Express, 4 (1): 14-18 (2018)Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks., , and . J. Organ. Comput. Electron. Commer., 29 (1): 40-59 (2019)Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions., , and . Int. J. Netw. Secur., 20 (3): 558-567 (2018)