Affiliation:
1. Tokyo Institute of Technology
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference22 articles.
1. [1] Y. Jin, M. Tomoishi, and S. Matsuura, “Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information,” 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, pp.459-464, 2016. 10.1109/compsac.2016.93
2. [2] Y. Jin, M. Tomoishi, and S. Matsuura, “An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations,” 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, pp.608-613, 2017. 10.1109/compsac.2017.56
3. [3] C. Moore, “Detecting Ransomware with Honeypot Techniques,” 2016 Cybersecurity and Cyberforensics Conference (CCC), Amman, pp.77-81. 2016. 10.1109/ccc.2016.14
4. [4] N. Scaife, H. Carter, P. Traynor, and K.R.B. Butler, “CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data,” 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), Nara, pp.303-312, 2016. 10.1109/icdcs.2016.46
5. [5] Advanced Persistent Threats: A Symantec Perspective, https://www.symantec.com/content/en/us/enterprise/white_papers/b-advanced_persistent_threats_WP_21215957.en-us.pdf (accessed 2017-11-12).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献