1. Ali, S., Wang, J., Leung, V., Ali, A.: Decentralized ransomware recovery network: enhancing resilience and security through secret sharing schemes. In: Proceedings of the 9th International Conference on Internet of Things, Big Data and Security - IoTBDS, pp. 294–301. SciTePress (2024). ISBN 978-989-758-699-6; ISSN 2184–4976. https://doi.org/10.5220/0012713500003705.
2. Ali, S., Wang, J., Leung, V.C.M.: Defensive strategies against PCC attacks based on ideal (t, n)-secret sharing scheme. J. King Saud Univ.-Comput. Inf. Sci. 35(9), 101784 (2023)
3. Alhawi, O.M., Baldwin, J., Dehghantanha, A.: Leveraging machine learning techniques for windows ransomware network traffic detection. In: Cyber Threat Intelligence, pp. 93–106 (2018)
4. Kok, S., Abdullah, A., Jhanjhi, N., Supramaniam, M.: Ransomware, threat and detection techniques: a review. Int. J. Comput. Sci. Netw. Secur 19(2), 136 (2019)
5. Tahmasebi, M.: Beyond defense: proactive approaches to disaster recovery and threat intelligence in modern enterprises. J. Inf. Secur. 15(2), 106–133 (2024)