Please wait ...
Entropy_of_PE_Sections
This dataset extracts the entropy of each of the PE sections of all benign reports and ransomware reports for detecting ransomware.
Created by: Avinash
Downloaded 1 times
DOI: https://doi.org/10.3390/computers12100201
Link: https://www.mdpi.com/2073-431X/12/10/201
Date added: Dec. 6, 2023, 10:21 a.m.
Reference:
Singh, A., Ikuesan, R.A. and Venter, H. (2023), “MalFe—Malware Feature Engineering Generation Platform”, Computers, MDPI AG, Vol. 12 No. 10, p. 201, doi: 10.3390/computers12100201.
Created by: Avinash
Downloaded 1 times
Publication Info
Dataset: Entropy_of_PE_SectionsDOI: https://doi.org/10.3390/computers12100201
Link: https://www.mdpi.com/2073-431X/12/10/201
Date added: Dec. 6, 2023, 10:21 a.m.
Reference:
Singh, A., Ikuesan, R.A. and Venter, H. (2023), “MalFe—Malware Feature Engineering Generation Platform”, Computers, MDPI AG, Vol. 12 No. 10, p. 201, doi: 10.3390/computers12100201.
Process Memory of Ransomware
This dataset counts the frequency of the memory access privileges
Created by: Avinash
Downloaded 2 times
DOI: https://doi.org/10.34190/iccws.17.1.53
Link: https://papers.academic-conferences.org/index.php/iccws/article/view/53
Date added: Sept. 2, 2024, 11:54 a.m.
Reference:
Singh, A., Ikuesan, R. and Venter, H., 2022, March. Ransomware Detection using Process Memory. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 413-422).
Created by: Avinash
Downloaded 2 times
Publication Info
Dataset: Process Memory of RansomwareDOI: https://doi.org/10.34190/iccws.17.1.53
Link: https://papers.academic-conferences.org/index.php/iccws/article/view/53
Date added: Sept. 2, 2024, 11:54 a.m.
Reference:
Singh, A., Ikuesan, R. and Venter, H., 2022, March. Ransomware Detection using Process Memory. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 413-422).
Ransomware_Detection_Using_PE_Imports
A dataset of the function names of PE imports and the DLL the functions are called from.
Created by: Tanatswa Dendere
Downloaded 5 times
DOI: https://doi.org/10.34190/iccws.19.1.2031
Link: https://papers.academic-conferences.org/index.php/iccws/article/view/2031
Date added: Sept. 2, 2024, 11:57 a.m.
Reference:
Dendere, T.R. and Singh, A., 2024, March. Ransomware Detection Using Portable Executable Imports. In International Conference on Cyber Warfare and Security (Vol. 19, No. 1, pp. 66-74).
Created by: Tanatswa Dendere
Downloaded 5 times
Publication Info
Dataset: Ransomware_Detection_Using_PE_ImportsDOI: https://doi.org/10.34190/iccws.19.1.2031
Link: https://papers.academic-conferences.org/index.php/iccws/article/view/2031
Date added: Sept. 2, 2024, 11:57 a.m.
Reference:
Dendere, T.R. and Singh, A., 2024, March. Ransomware Detection Using Portable Executable Imports. In International Conference on Cyber Warfare and Security (Vol. 19, No. 1, pp. 66-74).