Android Ransomware Analysis Using Convolutional Neural Network and Fuzzy Hashing Features

Most of the time, cybercriminals look for new ways to bypass security controls by improving their attacks. In the 1980s, attackers developed malware to kidnap user data by requesting payments. Malware is called a ransomware. Recently, they have demanded payment in Bitcoin or any other cryptocurrency...

Full description

Bibliographic Details
Main Authors: Horacio Rodriguez-Bazan, Grigori Sidorov, Ponciano Jorge Escamilla-Ambrosio
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10299644/