These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook. Alqahtani A; Sheldon FT Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983 [TBL] [Abstract][Full Text] [Related]
3. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches. Almomani I; Alkhayer A; El-Shafai W Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671 [TBL] [Abstract][Full Text] [Related]
4. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices. Almomani I; Alkhayer A; El-Shafai W Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452 [TBL] [Abstract][Full Text] [Related]
5. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms. Herrera-Silva JA; Hernández-Álvarez M Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772092 [TBL] [Abstract][Full Text] [Related]
6. Classification of ransomware using different types of neural networks. Madani H; Ouerdi N; Boumesaoud A; Azizi A Sci Rep; 2022 Mar; 12(1):4770. PubMed ID: 35306523 [TBL] [Abstract][Full Text] [Related]
7. On the classification of Microsoft-Windows ransomware using hardware profile. Aurangzeb S; Rais RNB; Aleem M; Islam MA; Iqbal MA PeerJ Comput Sci; 2021; 7():e361. PubMed ID: 33817011 [TBL] [Abstract][Full Text] [Related]
8. Ransomware: Analysing the Impact on Windows Active Directory Domain Services. McDonald G; Papadopoulos P; Pitropakis N; Ahmad J; Buchanan WJ Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161699 [TBL] [Abstract][Full Text] [Related]
9. Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments. Fernández Maimó L; Huertas Celdrán A; Perales Gómez ÁL; García Clemente FJ; Weimer J; Lee I Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30841592 [TBL] [Abstract][Full Text] [Related]
10. Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit. Shaik V; K DN MethodsX; 2022; 9():101924. PubMed ID: 36438858 [TBL] [Abstract][Full Text] [Related]
11. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier. Zahoora U; Khan A; Rajarajan M; Khan SH; Asam M; Jamal T Sci Rep; 2022 Sep; 12(1):15647. PubMed ID: 36123364 [TBL] [Abstract][Full Text] [Related]
12. A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security. Mihaljević MJ Entropy (Basel); 2019 Jul; 21(7):. PubMed ID: 33267415 [TBL] [Abstract][Full Text] [Related]
13. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. Lee K; Lee J; Lee SY; Yim K Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991730 [TBL] [Abstract][Full Text] [Related]
14. An Effective Self-Configurable Ransomware Prevention Technique for IoMT. Tariq U; Ullah I; Yousuf Uddin M; Kwon SJ Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366214 [TBL] [Abstract][Full Text] [Related]
15. Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map. Alsafyani M; Alhomayani F; Alsuwat H; Alsuwat E Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772454 [TBL] [Abstract][Full Text] [Related]
16. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms. Lee J; Lee K Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205533 [TBL] [Abstract][Full Text] [Related]