共 124 条
[2]
Abu-amara Fadi, 2021, International Journal of Information Technology, P2371, DOI [10.1007/s41870-021-00760-5, 10.1007/s41870-021-00760-5]
[3]
Agamben Giorgio., 2005, STATE EXCEPTION, DOI 10.7208/chicago/9780226009261.001.0001
[4]
Agarwal C., 2017, P 10 INT C THEOR PRA, P178, DOI [10.1145/3047273.3047303, DOI 10.1145/3047273.3047303]
[5]
Comprehensive Survey on Petya Ransomware Attack
[J].
2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS),
2017,
:122-125
[6]
Ali A., 2016, Issues in Information Systems, V17, P58
[7]
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[8]
[Anonymous], 2016, IT Now, V58, P32, DOI [10.1093/itnow/bww103, 10.1093/itnow/bww103]
[9]
[Anonymous], 2021, Wave VI Regional Report: July 2020-April 2021, DOI [10.2824/324797, DOI 10.2824/324797]
[10]
Using Eyetracker to Find Ways to Mitigate Ransomware
[J].
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2020,
:448-456