Author:
Chittooparambil Helen Jose,Shanmugam Bharanidharan,Azam Sami,Kannoorpatti Krishnan,Jonkman Mirjam,Samy Ganthan Narayana
Publisher
Springer International Publishing
Reference23 articles.
1. Luo, X., Liao, Q.: Awareness education as the key to ransomware prevention. Inf. Syst. Secur. 16(4), 195–202 (2007)
2. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the Gordian Knot: a look under the hood of ransomware attacks. In: Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA (2015)
3. Monika, P.Z., Lindskog, D.: Experimental analysis of ransomware on windows and android platforms: evolution and characterization. Procedia Comput. Sci. 94, 465–472 (2016)
4. Sjouwerman, S.: Ransomware In YouTube Ads, Techtalk.pcpitstop.com, 2014 (2016). http://techtalk.pcpitstop.com/2014/08/26/ransomware-youtube-ads/ . Accessed 14 June 2018
5. ACSC 2015 report, 2015 Cyber Security Survey: Major Australian Businesses, Australian Government, Canberra (2015)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review;Information;2024-08-14
2. Malware Classification using LSTM-CF Framework for Disk Forensic Analysis;2024 IEEE International Conference on Contemporary Computing and Communications (InC4);2024-03-15
3. Ransomware Classification and Detection: A Supervised Machine Learning Approach;Lecture Notes in Networks and Systems;2024
4. Obfuscated Ransomware Family Classification Using Machine Learning;2023 International Conference on Computational Science and Computational Intelligence (CSCI);2023-12-13
5. Malware Detection Using Random Forest;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06