Anti-ransomware method based on active deception
Considering the serious threat that ransomware poses to data security and the increasing intelligence and complexity of its attack methods, an anti-ransomware method based on active deception was proposed to address the limitations of traditional defense methods. By combining static heuristic algori...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | CHEN Kai, MA Duohe, TANG Zhimin, DAI Jun |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2024-07-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2024120 |
Similar Items
Anti-ransomware method based on active deception
by: CHEN Kai, et al.
Published: (2024-07-01)
by: CHEN Kai, et al.
Published: (2024-07-01)
Debates on the Use of Deception in Psychology Research
by: Ayşe Tuna
Published: (2023-12-01)
by: Ayşe Tuna
Published: (2023-12-01)
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring
by: José A. Gómez-Hernández, et al.
Published: (2024-04-01)
by: José A. Gómez-Hernández, et al.
Published: (2024-04-01)
Analytical model of deception detection in intelligence cycle
by: Mavrak Dano
Published: (2016-01-01)
by: Mavrak Dano
Published: (2016-01-01)
Survey on cyber deception
by: Zhao-peng JIA, et al.
Published: (2017-12-01)
by: Zhao-peng JIA, et al.
Published: (2017-12-01)
Survey on cyber deception
by: Zhao-peng JIA, et al.
Published: (2017-12-01)
by: Zhao-peng JIA, et al.
Published: (2017-12-01)
Deception Velocity-Based Method to Discriminate Physical Targets and Active False Targets in a Multistatic Radar System
by: Qiang Li, et al.
Published: (2024-01-01)
by: Qiang Li, et al.
Published: (2024-01-01)
Self-Deception in Psychology and Ethics with an Emphasis on the Views of Ayatollah Javadi Amoli
by: mahdi alizadeh, et al.
Published: (2017-08-01)
by: mahdi alizadeh, et al.
Published: (2017-08-01)
Lies, Lies, and Lies. On Truth, Dishonesty, Deception, and Self-Deception
by: Guido Löhrer
Published: (2022-07-01)
by: Guido Löhrer
Published: (2022-07-01)
Advancing Cybersecurity with Honeypots and Deception Strategies
by: Zlatan Morić, et al.
Published: (2025-01-01)
by: Zlatan Morić, et al.
Published: (2025-01-01)
Enhancing Operational Protection: A Step-By-Step Counter-Deception Guide
by: Toroi George-Ion
Published: (2024-06-01)
by: Toroi George-Ion
Published: (2024-06-01)
Intelligence support for the operational level counter-deception
by: Cristian-Octavian Stanciu, et al.
Published: (2023-07-01)
by: Cristian-Octavian Stanciu, et al.
Published: (2023-07-01)
Evaluation of Effective Factors in Detecting Enormous Deception and Evident Deception
by: M. Reza Kaykha, et al.
Published: (2020-10-01)
by: M. Reza Kaykha, et al.
Published: (2020-10-01)
Markers of Deception in Italian Speech
by: Katelyn eSpence, et al.
Published: (2012-10-01)
by: Katelyn eSpence, et al.
Published: (2012-10-01)
Deception research today
by: Matthias eGamer, et al.
Published: (2014-03-01)
by: Matthias eGamer, et al.
Published: (2014-03-01)
Deception defense method against intelligent penetration attack
by: Jinyin CHEN, et al.
Published: (2022-10-01)
by: Jinyin CHEN, et al.
Published: (2022-10-01)
Deception defense method against intelligent penetration attack
by: Jinyin CHEN, et al.
Published: (2022-10-01)
by: Jinyin CHEN, et al.
Published: (2022-10-01)
Resilience – effects multiplier in preparing counter-deception
by: George-Ion TOROI
Published: (2024-10-01)
by: George-Ion TOROI
Published: (2024-10-01)
Movement of deception in motion capture
by: Shao-Kang Lee, et al.
Published: (2025-10-01)
by: Shao-Kang Lee, et al.
Published: (2025-10-01)
Theoretical Study on Advertising Deception and Its Impact on Consumers
by: Imene NESSAH
Published: (2024-06-01)
by: Imene NESSAH
Published: (2024-06-01)
Deception-Based Defense of Poisoning Attack in Federated Learning
by: Grace Colette Tessa Masse, et al.
Published: (2025-01-01)
by: Grace Colette Tessa Masse, et al.
Published: (2025-01-01)
Ransomware Detection Using Machine Learning: A Survey
by: Amjad Alraizza, et al.
Published: (2023-08-01)
by: Amjad Alraizza, et al.
Published: (2023-08-01)
Research on active defense based on multi-stage cyber deception game
by: Yongjin HU, et al.
Published: (2020-08-01)
by: Yongjin HU, et al.
Published: (2020-08-01)
Research on active defense based on multi-stage cyber deception game
by: Yongjin HU, et al.
Published: (2020-08-01)
by: Yongjin HU, et al.
Published: (2020-08-01)
Human perceptions of social robot deception behaviors: an exploratory analysis
by: Andres Rosero, et al.
Published: (2024-09-01)
by: Andres Rosero, et al.
Published: (2024-09-01)
NEW APPROACHES IN DECEPTION DETECTION I. BACKGROUND AND THEORETICAL FRAMEWORK
by: Jaume Masip, et al.
Published: (2015-05-01)
by: Jaume Masip, et al.
Published: (2015-05-01)
CORMAND2: A Deception Attack Against Industrial Robots
by: Hongyi Pu, et al.
Published: (2024-01-01)
by: Hongyi Pu, et al.
Published: (2024-01-01)
Cultural differences in the efficacy of unexpected questions, sketching, and timeline methods in eliciting cues to deception
by: Irina Tache, et al.
Published: (2023-08-01)
by: Irina Tache, et al.
Published: (2023-08-01)
Reverse Thinking Approach to Deceptive Path Planning Problems
by: Dejun Chen, et al.
Published: (2024-08-01)
by: Dejun Chen, et al.
Published: (2024-08-01)
Encountering deception in virtual spaces: guidelines for virtual ethnography
by: Lisa Lucile Owens
Published: (2023-09-01)
by: Lisa Lucile Owens
Published: (2023-09-01)
Strategic Interviewing to Detect Deception: Cues to Deception across Repeated Interviews
by: Jaume Masip, et al.
Published: (2016-11-01)
by: Jaume Masip, et al.
Published: (2016-11-01)
Research on deception defense techniques based on network characteristics obfuscation
by: Jinlong ZHAO, et al.
Published: (2021-08-01)
by: Jinlong ZHAO, et al.
Published: (2021-08-01)
Who lies to protect another? Motivational, behavioral, and socio-cognitive predictors of children’s interventional deception
by: Płotnikowska Joanna, et al.
Published: (2024-01-01)
by: Płotnikowska Joanna, et al.
Published: (2024-01-01)
Distrusted disclosures: Deception drives anti-transgender but not anti-atheist prejudice
by: Rebecca R. Totton, et al.
Published: (2023-01-01)
by: Rebecca R. Totton, et al.
Published: (2023-01-01)
Experience, learning and the detection of deception
by: Priyodorshi Banerjee, et al.
Published: (2023-09-01)
by: Priyodorshi Banerjee, et al.
Published: (2023-09-01)
The study of the interpersonal deception discourse in the theoretical framework of Buller and Burgoon among second grade high school girls in Tehran
by: M. Azadi, et al.
Published: (2023-09-01)
by: M. Azadi, et al.
Published: (2023-09-01)
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation
by: Max Ismailov, et al.
Published: (2020-08-01)
by: Max Ismailov, et al.
Published: (2020-08-01)
Deceptive Path Planning via Count-Based Reinforcement Learning under Specific Time Constraint
by: Dejun Chen, et al.
Published: (2024-06-01)
by: Dejun Chen, et al.
Published: (2024-06-01)
Learning to Detect Deception from Evasive Answers and Inconsistencies across Repeated Interviews: A Study with Lay Respondents and Police Officers
by: Jaume Masip, et al.
Published: (2018-01-01)
by: Jaume Masip, et al.
Published: (2018-01-01)
Distributed State and Input Estimation Over Sensor Networks Under Deception Attacks
by: Yongzhen Guo, et al.
Published: (2023-01-01)
by: Yongzhen Guo, et al.
Published: (2023-01-01)
Similar Items
-
Anti-ransomware method based on active deception
by: CHEN Kai, et al.
Published: (2024-07-01) -
Debates on the Use of Deception in Psychology Research
by: Ayşe Tuna
Published: (2023-12-01) -
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring
by: José A. Gómez-Hernández, et al.
Published: (2024-04-01) -
Analytical model of deception detection in intelligence cycle
by: Mavrak Dano
Published: (2016-01-01) -
Survey on cyber deception
by: Zhao-peng JIA, et al.
Published: (2017-12-01)
