1. Alabdulsalam, S., Schaefer, K., Kechadi, M.-T., Le-Khac, N.-A.: Internet of things forensics: challenges and case study. In: Gilbert, P., Sujeet, S. (eds.) Advances in Digital Forensics XIV. Springer Berlin Heidelberg, New York (2018).
https://doi.org/10.1007/978-3-319-99277-8_3
2. Gonzalez, D., Hayajneh, T.: Detection and prevention of crypto-ransomware. In: Proceedings of IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), Oct 2017, pp. 472–478
3. Aidan, J.S., Garg, Z.U.: Advanced Petya ransomware and mitigation strategies. In: 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), 2018, pp. 23–28
4. Sgandurra, D., Muñoz-González, L., Mohsen, R., Lupu, E.C.: Automated dynamic analysis of ransomware: benefits, limitations and use for detection (2016).
arXiv:1609.03020
. [Online]. Available:
https://arxiv.org/abs/1609.03020
5. Shinde, R., Van der Veeken, P., Van Schooten, S., van den Berg, J.: Ransomware: studying transfer and mitigation. In: Computing Analytics and Security Trends (CAST) International Conference, 2016, pp. 90–95