2023
DOI: 10.1016/j.cose.2023.103160
|View full text |Cite
|
Sign up to set email alerts
|

Applying staged event-driven access control to combat ransomware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
40
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(40 citation statements)
references
References 28 publications
0
40
0
Order By: Relevance
“…Research has always advocated for a multi-layered security approach to effectively mitigate ransomware threats on mobile devices [30,28,31]. Traditional antivirus solutions have been found somewhat effective but insufficient alone due to the dynamic nature of ransomware attacks [13,32,33].…”
Section: Mitigation Techniquesmentioning
confidence: 99%
“…Research has always advocated for a multi-layered security approach to effectively mitigate ransomware threats on mobile devices [30,28,31]. Traditional antivirus solutions have been found somewhat effective but insufficient alone due to the dynamic nature of ransomware attacks [13,32,33].…”
Section: Mitigation Techniquesmentioning
confidence: 99%
“…Historically, ransomware mitigation on desktop systems has focused on a combination of real-time threat detection, user education, and backup strategies [7,8]. Techniques such as heuristic analysis, sandboxing, and signature-based detection were commonly employed to identify and neutralize threats before they could execute their payloads [9,10,11,12].…”
Section: Ransomware Mitigation On Desktop Computersmentioning
confidence: 99%
“…In the mobile context, ransomware mitigation strategies leveraged unique aspects of mobile operating systems, such as application sandboxing and stricter app store policies [21,7,22]. Efforts were primarily concentrated on preventing the installation of malicious apps through vetted app store mechanisms and using mobile security solutions that monitored for suspicious behaviors [22,23].…”
Section: Ransomware Mitigation On Mobile Devicesmentioning
confidence: 99%
“…Historical analyses of ransomware mitigation strategies highlighted the initial reliance on signature-based detection methods, which were quickly found to be ineffective against polymorphic and zero-day attacks [26,27,28,29]. The development of behavior-based detection tools represented a significant advancement, offering the ability to identify ransomware based on its actions rather than its signature [1,30,31].…”
Section: Existing Ransomware Detection and Prevention Toolsmentioning
confidence: 99%