Author:
Faghihi Farnood,Zulkernine Mohammad,Ding Steven
Publisher
Springer Nature Switzerland
Reference29 articles.
1. Abdel-Basset, M., Moustafa, N., Hawash, H., Ding, W.: Deep Learning Techniques for IoT Security and Privacy. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-89025-4
2. Bajpai, P., Enbody, R.: An empirical study of key generation in cryptographic ransomware. In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–8. IEEE (2020)
3. Berrueta, E., Morato, D., Magaña, E., Izal, M.: A survey on detection techniques for cryptographic ransomware. IEEE Access 7, 144925–144944 (2019)
4. Canadian Centre for Cyber Security: National cyber threat assessment (2020). https://cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2020. Accessed Dec 2021
5. Chen, J., Wang, C., Zhao, Z., Chen, K., Du, R., Ahn, G.J.: Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans. Inf. Forensics Secur. 13(5), 1286–1300 (2017)