共 15 条
[1]
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[2]
[Anonymous], 2016, INT C BROADB WIR COM
[4]
Baldwin J, 2018, ADV INFORM SECUR, V70, P107, DOI 10.1007/978-3-319-73951-9_6
[5]
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:1560-1564
[6]
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection
[J].
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017),
2018, 10723
:242-258
[7]
Ransomware Detection Considering User's Document Editing
[J].
PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2018,
:907-914
[8]
Kharraz A, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P757
[9]
Kiraz M. S., 2017, CRYPTOLOGY EPRINT AR
[10]
Ravi Nishkam., 2005, Proceedings of the Seventeenth Conference on Innovative Applications of Artificial IntelligenceIAAI, P1541, DOI [DOI 10.5555/1620175.1620274, 10.5555/1620092.1620107]