Author:
Zhao Yuhan,Ge Yunfei,Zhu Quanyan
Publisher
Springer International Publishing
Reference25 articles.
1. Colonial pipeline ransomware attack. Wikipedia. https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack. Accessed 20 July 2021
2. Aidan, J.S., Verma, H.K., Awasthi, L.K.: Comprehensive survey on petya ransomware attack. In: 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), pp. 122–125. IEEE (2017)
3. Braue, D.: Global ransomware damage costs predicted to exceed \$265 billion by 2031 (2021). https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/. Accessed 20 July 2021
4. Advances in Intelligent Systems and Computing;N Caporusso,2019
5. Cartwright, E., Hernandez Castro, J., Cartwright, A.: To pay or not: game theoretic models of ransomware. J. Cybersecur. 5(1), tyz009 (2019)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Double-Sided Information Asymmetry in Double Extortion Ransomware;Lecture Notes in Computer Science;2023
2. Introduction;SpringerBriefs in Computer Science;2023