Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

CryptoLocker

Known as: CryptoWall 
CryptoLocker is a ransomware trojan that targets computers running Microsoft Windows, believed to have first been posted to the Internet on 5… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Abstract Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such… Expand
2018
2018
Ransomware attacks have been growing worldwide since they appeared around 2012. The idea of ransomware attacks is, encrypting and… Expand
2018
2018
The arrival of affordable high speed internet and superior computing processors has given the ability to access a novel… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2018
2018
Ransomware is now become a bad tool to earn money, theft data, hack the system or to stop the normal functioning of the system… Expand
  • figure 1
Highly Cited
2016
Highly Cited
2016
Bitcoin, a decentralized cryptographic currency that has experienced proliferating popularity over the past few years, is the… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
2016
2016
Ransomware is a kind of malware that installs covertly on a victim’s computer or smartphone, executes a cryptovirology attack and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2016
Highly Cited
2016
Currently, different forms of ransomware are increasingly threatening Internet users. Modern ransomware encrypts important user… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
Malware evaluation is a key factor in security. It supposed to be safe and accurate. The contemporary malware is very… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2016
Highly Cited
2016
Various families of malware use domain generation algorithms (DGAs) to generate a large number of pseudo-random domain names to… Expand
  • figure 1
  • figure 4
  • table III
  • table I
  • table II
2015
2015
In this ever more commercialised world, it's maybe not surprising that a pervasive social phenomenon, advertising, has its dark… Expand