Publisher
Springer Nature Switzerland
Reference19 articles.
1. Angafor, G.N., Yevseyeva, I., He, Y.: Game-based learning: a review of tabletop exercises for cybersecurity incident response training. Secur. Priv. 3(6), e126 (2020). https://doi.org/10.1002/spy2.126. https://onlinelibrary.wiley.com/doi/abs/10.1002/spy2.126
2. Boticiu, S., Teichmann, F.: How does one negotiate with ransomware attackers? Int. Cybersecur. Law Rev. (2023). https://doi.org/10.1365/s43439-023-00106-w
3. Caporusso, N., Chea, S., Abukhaled, R.: A game-theoretical model of ransomware. In: Ahram, T.Z., Nicholson, D. (eds.) AHFE 2018, vol. 782, pp. 69–78. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-319-94782-2_7
4. Cybersecurity & Infrastructure Security Agency: Cybersecurity tabletop exercise tips (2022). https://www.cisa.gov/sites/default/files/publications/Cybersecurity-Tabletop-Exercise-Tips_508c.pdf
5. DFIR Research Group, Team Cymru: Analyzing ransomware negotiations with conti: an in-depth analysis (2022)