Author:
Johnson Shanoop,Gowtham R.,Nair Anand R.
Publisher
Springer Nature Singapore
Reference34 articles.
1. J. Fu, J. Xue, Y. Wang, Z. Liu, C. Shan, Malware visualization for fine-grained classification. IEEE Access 6, 14510–14523 (2018)
2. A. Ali, Ransomware: a research and a personal case study of dealing with this nasty malware. Issues Inform. Sci. Inf. Technol. 14, 087–099 (2017)
3. B. Eduardo, D. Morat Oss, E. Magana Lizarrondo, M. Izal Azcarate, A survey on detection techniques for cryptographic ransomware. IEEE Access 7, 144925–144944 (2019)
4. B.A. Al-rimy, M.A. Maarof, S.Z. Shaid, Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput. Secur. 74, 144–166 (2018)
5. K. DaeYoub, J. Lee, Blacklist versus whitelist-based ransomware solutions. IEEE Consumer Electron. Mag. 9(3), 22–28 (2020)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献