[1]
|
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services
Sensors,
2023
DOI:10.3390/s23063023
|
|
|
[2]
|
The rise of ransomware: Forensic analysis for windows based ransomware attacks
Expert Systems with Applications,
2022
DOI:10.1016/j.eswa.2021.116198
|
|
|
[3]
|
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
Entropy,
2022
DOI:10.3390/e24020239
|
|
|
[4]
|
The rise of ransomware: Forensic analysis for windows based ransomware attacks
Expert Systems with Applications,
2022
DOI:10.1016/j.eswa.2021.116198
|
|
|
[5]
|
Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions
Applied Sciences,
2021
DOI:10.3390/app12010172
|
|
|
[6]
|
A Review on Ransomware Attack
2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC),
2021
DOI:10.1109/ICSCCC51823.2021.9478148
|
|
|
[7]
|
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON),
2020
DOI:10.1109/UEMCON51285.2020.9298128
|
|
|
[8]
|
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2931136
|
|
|
[9]
|
Cyber Situational Awareness in Public-Private-Partnerships
2018
DOI:10.1007/978-3-662-56084-6_6
|
|
|
[10]
|
Big Data Technologies and Applications
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
2017
DOI:10.1007/978-3-319-58967-1_12
|
|
|
[11]
|
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph
Proceedings of the International Conference on Research in Adaptive and Convergent Systems - RACS '17,
2017
DOI:10.1145/3129676.3129704
|
|
|
[12]
|
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph
Proceedings of the International Conference on Research in Adaptive and Convergent Systems,
2017
DOI:10.1145/3129676.3129704
|
|
|
[13]
|
The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform
Mobile Information Systems,
2016
DOI:10.1155/2016/2946735
|
|
|