The rise of ransomware: Forensic analysis for windows based ransomware attacks
Author:
Funder
Çankiri Karatekin Üniversitesi
Publisher
Elsevier BV
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference67 articles.
1. Ransomware detection and mitigation using software-defined networking: The case of WannaCry;Akbanov;Computers & Electrical Engineering,2019
2. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions;Al-rimy;Computers & Security,2018
3. Ahmadian, M. M., Shahriari, H. R., & Ghaffarian, S. M. (2015, September). Connection-monitor & connection-breaker: A novel approach for prevention and detection of high survivable ransomwares. In 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) (pp. 79-84). IEEE. https://doi.org/10.1109/ISCISC.2015.7387902.
4. Alkhateeb, E. M. S. (2017, August). Dynamic malware detection using api similarity. In 2017 IEEE international conference on computer and information technology (CIT) (pp. 297-301). IEEE. https://doi.org/ 10.1109/CIT.2017.14.
5. Andronio, N., Zanero, S., & Maggi, F. (2015, November). Heldroid: Dissecting and detecting mobile ransomware. In international symposium on recent advances in intrusion detection (pp. 382-404). Springer, Cham. https://doi.org/10.1007/978-3-319-26362-5_18.
Cited by 39 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital forensic of Maze ransomware: A case of electricity distributor enterprise in ASEAN;Expert Systems with Applications;2024-09
2. Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware;IEEE Transactions on Dependable and Secure Computing;2024-09
3. Analyzing TorrentLocker Ransomware Attacks: A Real Case Study;Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi;2024-08-31
4. Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration;ACM Computing Surveys;2024-08-30
5. Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers;Big Data Mining and Analytics;2024-06
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3