共 59 条
[1]
Jiang JX(2019)Types of information compromised in breaches of protected health information Ann Intern Med 172 159-28
[2]
Bai G(2023)BSFR-SH: Blockchain-enabled security framework against ransomware attacks for smart healthcare IEEE Trans Consum Electron 69 18-210
[3]
Wazid M(2015)Understanding DDoS attack & its effect in cloud environment Proc Comput Sci 49 202-9
[4]
Kumar Das A(2016)Ransomware attacks: detection, prevention, and cure Netw Secur 2016 5-797
[5]
Shetty S(2021)Digital hostages: Leveraging ransomware attacks in cyberspace Bus Horiz 64 787-117
[6]
Deshmukh RV(2022)A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices Sensors 22 2281-181
[7]
Devadkar KK(2022)The rise of ransomware: Forensic analysis for windows-based ransomware attacks Expert Syst Appl 190 116198-12
[8]
Brewer R(2021)Internet of things and ransomware: Evolution, mitigation and prevention Egypt Inf J 22 105-107
[9]
Wade M(2020)The ransomware-as-a-service economy within the darknet Comput Secur 92 101762-8
[10]
Almomani I(2019)Economics of ransomware attacks SSRN Electron J 138 113400-632