Author:
Hsiao Shou-Ching,Kao Da-Yu
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Comprehensive Analysis Of Cyber-Attack Techniques And Vulnerabilities In Communication Channels Of Embedded Systems;2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI);2024-06-27
2. An Empirical Study of Data Disruption by Ransomware Attacks;Proceedings of the IEEE/ACM 46th International Conference on Software Engineering;2024-04-12
3. Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges;Electronics;2023-11-01
4. Ransomware Extraction Using Static Portable Executable (PE) Feature-Based Approach;2023 6th International Conference of Computer and Informatics Engineering (IC2IE);2023-09-14
5. Evaluating Moving Target Defenses against Realistic Attack Scenarios;2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS);2023-05