12,159 results on '"RANSOMWARE"'
Search Results
2. Ransomware Cyberattack Associated With Cardiac Arrest Incidence and Outcomes at Untargeted, Adjacent Hospitals.
3. Enhanced Android Ransomware Detection Through Hybrid Simultaneous Swarm-Based Optimization.
4. Building a Robust Third-Party Risk Management Program in a Connected Ecosystem.
5. Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things.
6. Analyzing TorrentLocker Ransomware Attacks: A Real Case Study.
7. Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review.
8. 基于深度学习的智慧校园勒索病毒防御架构设计.
9. A Ransomware Early Detection Model based on an Enhanced Joint Mutual Information Feature Selection Method.
10. Backend Infrastructure and Specifications Design Using OpenAPI and API-First on CV Elang Java Mandiri.
11. Early Ransomware Detection with Deep Learning Models.
12. Ransomware attack awareness: analyzing college student awareness for effective defense.
13. Legal framework for protecting bank customers against personal data leakage in the digital era: A study of Indonesian regulations.
14. Knowledge Held Hostage: What the British Library Ransomware Attack Can Teach Us.
15. A big data approach to risk management and control: Cybersecurity in accounting.
16. Assessment Of Students Cybersecurity Awareness And Strategies To Safeguard Against Cyber Threats.
17. Digital security for securing private information.
18. A Tale of Two Markets: Investigating the Ransomware Payments Economy.
19. File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems
20. Ransomware Detection and Classification Using Machine Learning and Deep Learning
21. Identifying Malicious Software on Android Devices Through Genetic Algorithm-Driven Feature Selection and Machine Learning
22. Detecting Ransomware Threats in Disk Storage through Behavioral Analysis using CNN2D and Flask Framework
23. All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset
24. Malware Ahead! (Fighting Cyberthreats on Board Ships)
25. Damages Caused by Ransomware and Selected Preventive Countermeasures
26. Ransomware Attack on the QNAP Device: A Case Study
27. The Crime-Crypto Nexus: Nuancing Risk Across Crypto-Crime Transactions
28. Top Cyber Threats: The Rise of Ransomware
29. Preparing a Dataset of Ransomware BTC Addresses for Machine Learning Purpose
30. Web3 and Ransomware Attacks
31. Operation Raven : Design of a Cyber Security Incident Response Game
32. Scared? Prepared? Toward a Ransomware Incident Response Scenario
33. Navigating the Landscape of Ransomware Detection Methods: A Review
34. Bridging the Gap Between Learning and Security: An Investigation of Blended Learning Systems and Ransomware Detection
35. Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack
36. A Generic Framework for Ransomware Prediction and Classification with Artificial Neural Networks
37. An Advanced Comparative Study of Ransomware Anomaly Detection Techniques Through Optimized Hyperparameters
38. Computer Crime
39. Ransomware Classification and Detection: A Supervised Machine Learning Approach
40. The Relevance of Social Engineering Competitions in Cybersecurity Education
41. Modus Operandi, Factors, Implications and Governance of Ransomware Attacks on Transportation Systems
42. Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
43. Ransomware 3.0—A Weapon for Next-Generation Information Warfare
44. WINDOWS 12 WHAT WE WANT.
45. Cloud backup 2024.
46. Securing Workloads in the Cloud: Challenges and Best Practices.
47. SCREEN GRABBERS.
48. BFSI and Security: Will The Wine Glass Stay?
49. Conquering the Security Trifecta: Top CISO Concerns and some actionable recommendations.
50. SVM Ransomware Detection Using Machine Learning Algorithm
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.