Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Reducing false negatives in ransomware detection: A critical evaluation of machine learning algorithms (2022)
Journal Article

Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a S... Read More about Reducing false negatives in ransomware detection: A critical evaluation of machine learning algorithms.