共 26 条
- [11] Kharraz A., 2015, INT C DET INTR MALW, P3, DOI DOI 10.1007/978-3-319-20550-2_1
- [13] PAYBREAK : Defense Against Cryptographic Ransomware [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 599 - 611
- [14] Lee J., 2017, Proceedings of the International Conference on Research in Adaptive and Convergent Systems, P208, DOI DOI 10.1145/3129676.3129713
- [15] Lemmou Y., 2017, Advances in Intelligent Systems and Computing, V573, P1, DOI [DOI 10.1007/978-981-10-6898-0_22, 10.1007/978-981-10-6898-0, DOI 10.1007/978-981-10-6898-0]
- [17] Lemmou Y, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), DOI 10.1109/CyberSecPODS.2017.8074854
- [18] Mager M., 2018, STOP STEP AWAY DATA
- [19] Ransomware's Early Mitigation Mechanisms [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [20] Nieuwenhuizen D., 2017, MWR Labs Whitepaper