共 34 条
[1]
Ashish Patel J(2020)A malicious activity monitoring mechanism to detect and prevent ransomware Comput Fraud Secur 2020 14-19
[2]
Avijit TMR(2021)Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security Elsevier Microproc Microsyst 81 103719-10
[3]
Davies SR(2021)Differential area analysis for ransomware attack detection within mixed file datasets Comput Secur 108 102377-306
[4]
Macfarlane R(2021)The anomaly-and signature-based IDS for network security using hybrid inference systems Math Probl Eng 2021 1-299
[5]
Einy S(2021)Ransomcare: data-centric detection and mitigation against smartphone crypto-ransomware Comput Net 191 108011-26
[6]
Oz C(2022)An open dataset of ransomware storage access patterns for training machine learning models Fore Sci Int Digital Invest 40 301314-4007
[7]
Navaei YD(2021)Preparedness for the death of an elderly family member: a possible protective factor for pre-loss grief in informal caregivers Archiv Gerontol Geriatr 94 104353-1137
[8]
Faghihi F(2021)Signature-less ransomware detection and mitigation J Comp Virol Hack Tech 4 299-2102
[9]
Zulkernine M(2022)The rise of ransomware: Forensic analysis for windows-based ransomware attacks Exp Syst Appl 190 116198-undefined
[10]
Hirano M(2020)GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot Comp Secur 92 101732-undefined