@article{a2022dwarf, title={Dwarf mongoose optimization with machine-learning-driven ransomware detection in internet of things environment}, author={A. Alissa, Khalid and H. Elkamchouchi, Dalia and Tarmissi, Khaled and Yafoz, Ayman and Alsini, Raed and Alghushairy, Omar and Mohamed, Abdullah and Al Duhayyim, Mesfer}, journal={Applied Sciences}, volume={12}, number={19}, pages={9513}, year={2022}, publisher={MDPI} } @inproceedings{adamov2019analysis, title={An analysis of lockergoga ransomware}, author={Adamov, Alexander and Carlsson, Anders and Surmacz, Tomasz}, booktitle={2019 IEEE East-West Design \& Test Symposium (EWDTS)}, pages={1--5}, year={2019}, organization={IEEE} } @article{ahmed2022mitigating, title={Mitigating adversarial evasion attacks of ransomware using ensemble learning}, author={Ahmed, Usman and Lin, Jerry Chun-Wei and Srivastava, Gautam}, journal={Computers and Electrical Engineering}, volume={100}, pages={107903}, year={2022}, publisher={Elsevier} } @inproceedings{aldaraani2018understanding, title={Understanding the impact of ransomware: a survey on its evolution, mitigation and prevention techniques}, author={Aldaraani, Najla and Begum, Zeenat}, booktitle={2018 21st Saudi Computer Society National Computer Conference (NCC)}, pages={1--5}, year={2018}, organization={IEEE} } @inproceedings{almomani2021efficient, title={An efficient machine learning-based approach for Android v. 11 ransomware detection}, author={Almomani, Iman and AlKhayer, Aala and Ahmed, Mohanned}, booktitle={2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)}, pages={240--244}, year={2021}, organization={IEEE} } @inproceedings{alrawashdeh2018ransomware, title={Ransomware detection using limited precision deep learning structure in fpga}, author={Alrawashdeh, Khaled and Purdy, Carla}, booktitle={NAECON 2018-IEEE National Aerospace and Electronics Conference}, pages={152--157}, year={2018}, organization={IEEE} } @inproceedings{alzahrani2019intelligent, title={An intelligent behavior-based ransomware detection system for android platform}, author={Alzahrani, Abdulrahman and Alshahrani, Hani and Alshehri, Ali and Fu, Huirong}, booktitle={2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)}, pages={28--35}, year={2019}, organization={IEEE} } @article{alzahrani2022analysis, title={An analysis of conti ransomware leaked source codes}, author={Alzahrani, Saleh and Xiao, Yang and Sun, Wei}, journal={IEEE Access}, volume={10}, pages={100178--100193}, year={2022}, publisher={IEEE} } @article{bagui2021machine, title={Machine learning for Android ransomware detection}, author={Bagui, Sikha and Woods, Tyler}, journal={Int. J. Comput. Sci. Inf. Secur.(IJCSIS)}, volume={19}, pages={29--38}, year={2021} } @article{bold2022reducing, title={Reducing false negatives in ransomware detection: A critical evaluation of machine learning algorithms}, author={Bold, Robert and Al-Khateeb, Haider and Ersotelos, Nikolaos}, journal={Applied Sciences}, volume={12}, number={24}, pages={12941}, year={2022}, publisher={MDPI} } @article{conti2018economic, title={On the economic significance of ransomware campaigns: A Bitcoin transactions perspective}, author={Conti, Mauro and Gangwal, Ankit and Ruj, Sushmita}, journal={Computers \& Security}, volume={79}, pages={162--189}, year={2018}, publisher={Elsevier} } @article{aurangzeb2022bigrc, title={BigRC-EML: big-data based ransomware classification using ensemble machine learning}, author={Aurangzeb, Sana and Anwar, Haris and Naeem, Muhammad Asif and Aleem, Muhammad}, journal={Cluster Computing}, volume={25}, number={5}, pages={3405--3422}, year={2022}, publisher={Springer} } @article{berrueta2022crypto, title={Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic}, author={Berrueta, Eduardo and Morato, Daniel and Maga{\~n}a, Eduardo and Izal, Mikel}, journal={Expert Systems with Applications}, volume={209}, pages={118299}, year={2022}, publisher={Elsevier} } @article{connolly2022reducing, title={Reducing ransomware crime: analysis of victims’ payment decisions}, author={Connolly, Alena Yuryna and Borrion, Herv{\'e}}, journal={Computers \& Security}, volume={119}, pages={102760}, year={2022}, publisher={Elsevier} } @inproceedings{faruk2022authentic, title={Authentic Learning of Machine Learning to Ransomware Detection and Prevention}, author={Faruk, Md Jobair Hossain and Masum, Mohammad and Shahriar, Hossain and Qian, Kai and Lo, Dan}, booktitle={2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)}, pages={442--443}, year={2022}, organization={IEEE} } @article{filiz2021effectiveness, title={On the effectiveness of ransomware decryption tools}, author={Filiz, Burak and Arief, Budi and Cetin, Orcun and Hernandez-Castro, Julio}, journal={Computers \& Security}, volume={111}, pages={102469}, year={2021}, publisher={Elsevier} } @article{ganfure2023rtrap, title={RTrap: Trapping and Containing Ransomware With Machine Learning}, author={Ganfure, Gaddisa Olani and Wu, Chun-Feng and Chang, Yuan-Hao and Shih, Wei-Kuan}, journal={IEEE Transactions on Information Forensics and Security}, volume={18}, pages={1433--1448}, year={2023}, publisher={IEEE} } @inproceedings{gangwar2018analysis, title={Analysis and detection of ransomware through its delivery methods}, author={Gangwar, Keertika and Mohanty, Subhranshu and Mohapatra, AK}, booktitle={Data Science and Analytics: 4th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2017, Gurgaon, India, October 13-14, 2017, Revised Selected Papers 4}, pages={353--362}, year={2018}, organization={Springer} } @inproceedings{ganta2020ransomware, title={Ransomware detection in executable files using machine learning}, author={Ganta, Venkata Gopi and Harish, G Venkata and Kumar, V Prem and Rao, G Rama Koteswar}, booktitle={2020 International Conference on Recent Trends on Electronics, Information, Communication \& Technology (RTEICT)}, pages={282--286}, year={2020}, organization={IEEE} } @article{gazet2010comparative, title={Comparative analysis of various ransomware virii}, author={Gazet, Alexandre}, journal={Journal in computer virology}, volume={6}, pages={77--90}, year={2010}, publisher={Springer} } @article{goodell2023commodity, title={Commodity market exposure to energy-firm distress: Evidence from the Colonial Pipeline ransomware attack}, author={Goodell, John W and Corbet, Shaen}, journal={Finance Research Letters}, volume={51}, pages={103329}, year={2023}, publisher={Elsevier} } @article{khan2023ransomware, title={Ransomware prevention using moving target defense based approach}, author={Khan, Muhammad Mubashir and Hyder, Muhammad Faraz and Khan, Shariq Mahmood and Arshad, Junaid and Khan, Muhammad M}, journal={Concurrency and Computation: Practice and Experience}, volume={35}, number={7}, pages={e7592}, year={2023}, publisher={Wiley Online Library} } @article{kim2017machine, title={A machine learning based ransomware detection model using a hybrid analysis}, author={Kim, Ji-Won and Ji, Seon-Hak and Kim, Sung-Ryul}, journal={Journal of Security Engineering}, volume={14}, number={4}, pages={263--280}, year={2017}, publisher={Innovation in Secure and Intelligent Engineering Systems} } @article{kok2019ransomware, title={Ransomware, threat and detection techniques: A review}, author={Kok, S and Abdullah, Azween and Jhanjhi, N and Supramaniam, Mahadevan}, journal={Int. J. Comput. Sci. Netw. Secur}, volume={19}, number={2}, pages={136}, year={2019} } @inproceedings{manjezi2019preventing, title={Preventing and Mitigating Ransomware: A Systematic Literature Review}, author={Manjezi, Zandile and Botha, Reinhardt A}, booktitle={Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15--16, 2018, Revised Selected Papers 17}, pages={149--162}, year={2019}, organization={Springer} } @article{mcintosh2019masquerade, title={Masquerade attacks against security software exclusion lists}, author={McIntosh, Timothy and Jang-Jaccard, Julian and Watters, Paul and Susnjak, Teo}, year={2019}, journal={Australian Journal of Intelligent Information Processing Systems}, volume={16}, number={4}, pages={5-12}, publisher={http://ajiips. com. au/} } @article{mcintosh2021dynamic, title={Dynamic user-centric access control for detection of ransomware attacks}, author={McIntosh, Timothy and Kayes, ASM and Chen, Yi-Ping Phoebe and Ng, Alex and Watters, Paul}, journal={Computers \& Security}, volume={111}, pages={102461}, year={2021}, publisher={Elsevier} } @article{mcintosh2023applying, title={Applying staged event-driven access control to combat ransomware}, author={McIntosh, Timothy and Kayes, ASM and Chen, Yi-Ping Phoebe and Ng, Alex and Watters, Paul}, journal={Computers \& Security}, volume={128}, pages={103160}, year={2023}, publisher={Elsevier} } @article{mcintosh2023harnessing, title={Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation}, author={McIntosh, Timothy and Liu, Tong and Susnjak, Teo and Alavizadeh, Hooman and Ng, Alex and Nowrozy, Raza and Watters, Paul}, journal={Computers \& Security}, volume={134}, pages={103424}, year={2023}, publisher={Elsevier} } @book{mohanta2018preventing, title={Preventing Ransomware: Understand, prevent, and remediate ransomware attacks}, author={Mohanta, Abhijit and Hahad, Mounir and Velmurugan, Kumaraguru}, year={2018}, publisher={Packt Publishing} } @article{muslim2019study, title={A study of ransomware attacks: Evolution and prevention}, author={Muslim, Aini Khalida and Dzulkifli, Dzunnur Zaily Mohd and Nadhim, Mohammed Hayder and Abdellah, Roy Haizal}, journal={Journal of Social Transformation and Regional Development}, volume={1}, number={1}, pages={18--25}, year={2019} } @article{nalinipriya2022ransomware, title={Ransomware recognition in blockchain network using water moth flame optimization-aware DRNN}, author={Nalinipriya, Ganapathi and Balajee, Maram and Priya, Chittibabu and Rajan, Cristin}, journal={Concurrency and Computation: Practice and Experience}, volume={34}, number={19}, pages={e7047}, year={2022}, publisher={Wiley Online Library} } @article{olani2022deepware, title={Deepware: Imaging performance counters with deep learning to detect ransomware}, author={Olani, Gaddisa and Wu, Chun-Feng and Chang, Yuan-Hao and Shih, Wei-Kuan}, journal={IEEE Transactions on Computers}, year={2022}, publisher={IEEE} } @article{oosthoek2023tale, title={A tale of two markets: Investigating the ransomware payments economy}, author={Oosthoek, Kris and Cable, Jack and Smaragdakis, Georgios}, journal={Communications of the ACM}, volume={66}, number={8}, pages={74--83}, year={2023}, publisher={ACM New York, NY, USA} } @article{ren2020three, title={A three-level ransomware detection and prevention mechanism}, author={Ren, Amos and Liang, Chong and Hyug, Im and Broh, Sarfraz and Jhanjhi, NZ}, journal={EAI Endorsed Transactions on Energy Web}, volume={7}, number={26}, year={2020} } @article{richardson2017ransomware, title={Ransomware: Evolution, mitigation and prevention}, author={Richardson, Ronny and North, Max M}, journal={International Management Review}, volume={13}, number={1}, pages={10}, year={2017} } @article{ryan2022dynamics, title={Dynamics of targeted ransomware negotiation}, author={Ryan, Pierce and Fokker, John and Healy, Sorcha and Amann, Andreas}, journal={IEEE Access}, volume={10}, pages={32836--32844}, year={2022}, publisher={IEEE} } @article{saleh2019proactive, title={A proactive approach for detecting ransomware based on hidden Markov model (HMM)}, author={Saleh, Mohammed A}, journal={International Journal of Intelligent Computing Research}, volume={10}, year={2019} } @inproceedings{silva2017large, title={Large scale ransomware detection by cognitive security}, author={Silva, Juan A Herrera and Hern{\'a}ndez-Alvarez, Myriam}, booktitle={2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM)}, pages={1--4}, year={2017}, organization={IEEE} } @article{smith2022machine, title={Machine Learning Algorithms and Frameworks in Ransomware Detection}, author={Smith, Daryle and Khorsandroo, Sajad and Roy, Kaushik}, journal={IEEE Access}, volume={10}, pages={117597--117610}, year={2022}, publisher={IEEE} } @article{tariq2022effective, title={An Effective Self-Configurable Ransomware Prevention Technique for IoMT}, author={Tariq, Usman and Ullah, Imdad and Yousuf Uddin, Mohammed and Kwon, Se Jin}, journal={Sensors}, volume={22}, number={21}, pages={8516}, year={2022}, publisher={MDPI} } @inproceedings{usharani2021dynamic, title={Dynamic analysis on crypto-ransomware by using machine learning: Gandcrab ransomware}, author={Usharani, S and Bala, P Manju and Mary, M Martina Jose}, booktitle={Journal of Physics: Conference Series}, volume={1717}, number={1}, pages={012024}, year={2021}, organization={IOP Publishing} } @inproceedings{vehabovic2023data, title={Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution}, author={Vehabovic, Aldin and Zanddizari, Hadi and Ghani, Nasir and Shaikh, Farooq and Bou-Harb, Elias and Pour, M Safaei and Crichigno, Jorge}, booktitle={NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium}, pages={1--6}, year={2023}, organization={IEEE} } @article{wang2022krprotector, title={KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys}, author={Wang, Senmiao and Zhang, Hua and Qin, Sujuan and Li, Wenmin and Tu, Tengfei and Shen, Ana and Liu, Wentao}, journal={IEEE Internet of Things Journal}, volume={9}, number={19}, pages={18251--18266}, year={2022}, publisher={IEEE} } @article{wazid2022bsfr, title={BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare}, author={Wazid, Mohammad and Das, Ashok Kumar and Shetty, Sachin}, journal={IEEE Transactions on Consumer Electronics}, year={2022}, publisher={IEEE} } @article{yamany2022new, title={A New Scheme for Ransomware Classification and Clustering Using Static Features}, author={Yamany, Bahaa and Elsayed, Mahmoud Said and Jurcut, Anca D and Abdelbaki, Nashwa and Azer, Marianne A}, journal={Electronics}, volume={11}, number={20}, pages={3307}, year={2022}, publisher={MDPI} } @inproceedings{young1996cryptovirology, title={Cryptovirology: Extortion-based security threats and countermeasures}, author={Young, Adam and Yung, Moti}, booktitle={Proceedings 1996 IEEE Symposium on Security and Privacy}, pages={129--140}, year={1996}, organization={IEEE} } @article{zakaria2022rentaka, title={RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection}, author={Zakaria, Wira ZA and Abdollah, Mohd Faizal and Mohd, Othman and Yassin, SM Warusia Mohamed SM M and Ariffin, Aswami}, journal={International Journal of Advanced Computer Science and Applications}, volume={13}, number={5}, year={2022}, publisher={Science and Information (SAI) Organization Limited} }