1. W. Mattias, F. Jan, S. Andreas, J. Eric, A novel method for recovery from crypto ransomware infection, in 2nd IEEE International Conference on Computer and Communications, (2016), pp. 1354–1358
2. K.E. Gnanesh, T. Dheeraj Bhavan Narayana, M.D. Kamalesh, Retrieval of encrypted data using trapdoor method in cloud computing. J. Comput. Theor. Nanosci. 16(8), 3237–3241 (2019)
3. M. Reeta, Strategies: to defeat ransomware attacks. Int. J. Eng. Res. General Sci. 5, 112–116 (2017)
4. M.A. Chowdary, M. Kundan, D.A.V.A. Mary, Effective credit card forgery prevention using multilevel authentication, in IOP Conference Series: Materials Science and Engineering, vol. 590, issue no. 1, (IOP Publishing, 2019), p. 012021. https://doi.org/10.1088/1757-899X/590/1/012021
5. T.P. Jacob, T. Ravi, Optimal regression test case prioritization using genetic algorithm. Life Sci. J. 10(3), 1021–1033 (2013)