Author:
Kumari Anjali,Bhuiyan Md Zakirul Alam,Namdeo Jigyasa,Kanaujia Shipra,Amin Ruhul,Vollala Satyanarayana
Publisher
Springer International Publishing
Reference12 articles.
1. Scaife, N., Carter, H., Traynor, P., Butler, K.R.B.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303–312. IEEE (2016)
2. Mohurle, S., Patil, M.: A brief study of wannacry threat: ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 1938–1940 (2017)
3. O’Kane, P., Sezer, S., Carlin, D.: Evolution of ransomware. IET Netw. 7(5), 321–327 (2018)
4. Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 129–140. IEEE (1996)
5. Kharraz, A., Robertson, W., Kirda, E.: Protecting against ransomware: a new line of research or restating classic ideas? IEEE Secur. Priv. 16(3), 103–107 (2018)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献