共 51 条
[1]
[Anonymous], 2013, POISON IVY ASSESSING
[2]
Baksi R. P., 2017, ARXIV171200841
[3]
Baksi RudraPrasad., 2018, Proceedings of the International Conference on Security and Management (SAM), P245
[5]
Bishop Matt., 2008, CSIIRW 08, P1, DOI [DOI 10.1145/1595676.1595678?ACCESSTAB=TRUE, 10.1145/1595676.1595678?accessTabtrue, DOI 10.1145/1595676.1595678?ACCESSTABTRUE]
[6]
Bizga A, 2020, RANSOMWARE ATTACK CO
[7]
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
[J].
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016),
2016, 9996
:18-38
[8]
Clark Z., 2017, The worm that spreads wanacrypt0r
[9]
Correspondent T., 2020, TIMES INDIA
[10]
Costan V., 2016, IACR Cryptology ePrint Archive