Author:
Al-rimy Bander Ali Saleh,Maarof Mohd Aizaini,Shaid Syed Zainuddin Mohd
Publisher
Springer International Publishing
Reference43 articles.
1. Xue, L., Sun, G.: Design and implementation of a malware detection system based on network behavior. Secur. Commun. Netw. 8(3), 459–470 (2015)
2. Naval, S., et al.: Employing program semantics for malware detection. IEEE Trans. Inf. Forensics Secur. 10(12), 2591–2604 (2015)
3. Everett, C.: Ransomware: to pay or not to pay? Comput. Fraud Secur. 2016(4), 8–12 (2016)
4. Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Safavi-Naini, R., Christin, N. (eds.) 18th International Conference on Financial Cryptography and Data Security, FC 2014, pp. 457–468. Springer, Heidelberg (2014)
5. Kharraz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware. Paper presented at the 25th USENIX Security Symposium (USENIX Security 16), pp. 757–772 (2016)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献