Skip to search form
Skip to main content
>
Semantic Scholar
Semantic Scholar's Logo
Search
Sign In
Create Free Account
You are currently offline. Some features of the site may not work correctly.
CryptoLocker
Known as:
CryptoWall
CryptoLocker is a ransomware trojan that targets computers running Microsoft Windows, believed to have first been posted to the Internet on 5…
Expand
Wikipedia
Create Alert
Related topics
Related topics
26 relations
AutoCAD
Backup
BitTorrent
Bitcoin
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
Sajad Homayoun
,
A. Dehghantanha
,
+4 authors
D. Newton
Future Gener. Comput. Syst.
2019
Corpus ID: 52901105
Abstract Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such…
Expand
2018
2018
What Petya/NotPetya Ransomware Is and What Its Remidiations Are
Sharifah Yaqoub A. Fayi
2018
Corpus ID: 196119948
Ransomware attacks have been growing worldwide since they appeared around 2012. The idea of ransomware attacks is, encrypting and…
Expand
2018
2018
Encryption analysis of AES-Cipher Block Chaining performance in Crypto-Wall Ransomware and SDN based mitigation
A. Pillai
,
M. Vasanthi
,
Ruturaj Kadikar
,
B. Amutha
2018
Corpus ID: 54644065
The arrival of affordable high speed internet and superior computing processors has given the ability to access a novel…
Expand
2018
2018
Strategies for Ransomware Removal and Prevention
Smruti Saxena
,
Hemant Kumar Soni
Fourth International Conference on Advances in…
2018
Corpus ID: 52933694
Ransomware is now become a bad tool to earn money, theft data, hack the system or to stop the normal functioning of the system…
Expand
Highly Cited
2016
Highly Cited
2016
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
K. Liao
,
Ziming Zhao
,
A. Doupé
,
Gail-Joon Ahn
APWG Symposium on Electronic Crime Research…
2016
Corpus ID: 9393600
Bitcoin, a decentralized cryptographic currency that has experienced proliferating popularity over the past few years, is the…
Expand
2016
2016
Deep Learning for Ransomware Detection
Tseng Aragorn
,
Chen Yun-chun
,
Kao YiHsiang
,
Lin Tsungnan
2016
Corpus ID: 63766231
Ransomware is a kind of malware that installs covertly on a victim’s computer or smartphone, executes a cryptovirology attack and…
Expand
Highly Cited
2016
Highly Cited
2016
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall
Krzysztof Cabaj
,
W. Mazurczyk
IEEE Network
2016
Corpus ID: 4716991
Currently, different forms of ransomware are increasingly threatening Internet users. Modern ransomware encrypts important user…
Expand
2016
2016
Developing malware evaluation infrastructure
Krzysztof Cabaj
,
P. Gawkowski
,
K. Grochowski
,
Amadeusz Kosik
Federated Conference on Computer Science and…
2016
Corpus ID: 16209263
Malware evaluation is a key factor in security. It supposed to be safe and accurate. The contemporary malware is very…
Expand
Highly Cited
2016
Highly Cited
2016
Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Jonathan Woodbridge
,
H. Anderson
,
A. Ahuja
,
Daniel Grant
ArXiv
2016
Corpus ID: 16560076
Various families of malware use domain generation algorithms (DGAs) to generate a large number of pseudo-random domain names to…
Expand
2015
2015
When advertising turns nasty
Steve Mansfield-Devine
Netw. Secur.
2015
Corpus ID: 42943912
In this ever more commercialised world, it's maybe not surprising that a pervasive social phenomenon, advertising, has its dark…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE