A Short Review for Ransomware: Pros and Cons
Recently, the software virus Ransomware spread like a cyclone wind. As a cyclone wind creates atmospheric instability, Ransomware similarly creates computer data instability. Each user moves in the direction of digitization. The user securely holds data in his/her computer, but what if the data are...
| Main Authors: | Shakir, Hasan Awni, Jaber, Aws Naser |
|---|---|
| Other Authors: | Xhafa, Fatos |
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer, Cham
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19005/ http://umpir.ump.edu.my/id/eprint/19005/1/fskkp-2018-jaber-Short%20Review%20for%20Ransomware%20Pros%20and%20Cons1.pdf |
Similar Items
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
Technology in Mathematics teaching: the pros and cons
by: Md Khambari, Mas Nida, et al.
Published: (2010)
by: Md Khambari, Mas Nida, et al.
Published: (2010)
Internationalization of Higher Education: The Pros and Cons
by: Akinbod, Akintola Ismaila, et al.
Published: (2017)
by: Akinbod, Akintola Ismaila, et al.
Published: (2017)
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
Potential use of NOACs in developing countries: Pros and cons
by: Bista, D., et al.
Published: (2014)
by: Bista, D., et al.
Published: (2014)
Pros and cons of incomplete contract in Private Finance Initiative (PFI) Project
by: Mansor, Syaimasyaza, et al.
Published: (2019)
by: Mansor, Syaimasyaza, et al.
Published: (2019)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Software Agent And Cloud Computing: A Brief Review
by: Firas, D. Ahmed, et al.
Published: (2016)
by: Firas, D. Ahmed, et al.
Published: (2016)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
The Japanese assistant teacher program in Western Australia: A consideration of the pros and cons
by: Hasegawa, Hiroshi
Published: (2011)
by: Hasegawa, Hiroshi
Published: (2011)
The importance of data classification using machine learning methods in microarray data
by: Jaber, Aws Naser, et al.
Published: (2021)
by: Jaber, Aws Naser, et al.
Published: (2021)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
What are the pros and cons of electronically monitoring inhaler use in asthma?: a multistakeholder perspective
by: Howard, Sam, et al.
Published: (2016)
by: Howard, Sam, et al.
Published: (2016)
Ransomware: stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
Effects of Stock Market Liberalisation: Pros and Cons
The Difference between Developed and Developing Countries
by: Visitkijakarn, Vanvarang
Published: (2010)
by: Visitkijakarn, Vanvarang
Published: (2010)
Agent-based Big Data Analytics in Retailing: A Case Study
by: Firas, D. Ahmed, et al.
Published: (2015)
by: Firas, D. Ahmed, et al.
Published: (2015)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
Perception of green roof and flat roof development in high rise buildings in Malaysia: pros and cons
by: Abd Razak, Nur Syazanna Iryani, et al.
Published: (2022)
by: Abd Razak, Nur Syazanna Iryani, et al.
Published: (2022)
Fatalism as a factor for economic complacency: a reflection on its pros and cons from Islamic standpoint
by: Khan, Israr Ahmad
Published: (2010)
by: Khan, Israr Ahmad
Published: (2010)
A Static Approach towards Mobile Botnet Detection
by: Shahid, Anwar, et al.
Published: (2016)
by: Shahid, Anwar, et al.
Published: (2016)
Pros and cons : INSIDE O.K.U stop center in UiTM / Muhammad Reza Ahmad
by: Ahmad, Muhammad Reza
Published: (2013)
by: Ahmad, Muhammad Reza
Published: (2013)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Characteristics of consumers influencing adoption behavior for XBRL
by: Rawashdeh, Awni, et al.
Published: (2011)
by: Rawashdeh, Awni, et al.
Published: (2011)
The pros and cons of getting engaged in an online social community embedded within digital cognitive behavioral therapy for insomnia: survey among users
by: Coulson, Neil S., et al.
Published: (2016)
by: Coulson, Neil S., et al.
Published: (2016)
Short term forecasting based on hybrid least squares support vector machines
by: Zuriani, Mustaffa, et al.
Published: (2018)
by: Zuriani, Mustaffa, et al.
Published: (2018)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Prediction of international rice production using long short- term memory and machine learning models
by: Arya, Suraj, et al.
Published: (2025)
by: Arya, Suraj, et al.
Published: (2025)
Pros and cons being a part-time music teacher among music students in Universiti Teknologi MARA (UiTM) / Nur Shafreeza Zainal Abidin
by: Zainal Abidin, Nur Shafreeza
Published: (2016)
by: Zainal Abidin, Nur Shafreeza
Published: (2016)
Graduate Entrepreneur Analytical Reports (GEAR) Using Data Warehouse Model: A Case Study at CEDI, UUM
by: Khraibet, Hayder Naser
Published: (2011)
by: Khraibet, Hayder Naser
Published: (2011)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Remote Network Monitoring System (RNMS)
by: al-Hasanat, Mohanad Naser
Published: (2009)
by: al-Hasanat, Mohanad Naser
Published: (2009)
A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Graduate entrepreneur analytical reports (GEAR) using data warehouse model: A case study at CEDI, Universiti Utara Malaysia (UUM)
by: Abu Bakar, Muhamad Shahbani, et al.
Published: (2011)
by: Abu Bakar, Muhamad Shahbani, et al.
Published: (2011)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
A Review on Minutiae Extraction of Fingerprint
by: Rozita, Mohd Yusof, et al.
Published: (2013)
by: Rozita, Mohd Yusof, et al.
Published: (2013)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Similar Items
-
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021) -
Technology in Mathematics teaching: the pros and cons
by: Md Khambari, Mas Nida, et al.
Published: (2010) -
Internationalization of Higher Education: The Pros and Cons
by: Akinbod, Akintola Ismaila, et al.
Published: (2017) -
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022) -
Potential use of NOACs in developing countries: Pros and cons
by: Bista, D., et al.
Published: (2014)