1. Bitcoin and cryptocurrency technologies: a comprehensive introduction;Narayanan,2016
2. Ransomware: emergence of the cxyber-extortion menace;Hampton,2015
3. Ransomware: a new cyber hijacking threat to enterprises;Luo,2009
4. An evaluation of API calls hooking performance;Marhusin,2008
5. Malware detection using assembly and API call sequences;Shankarapani;J Comput Virol,2011