Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions
暂无分享,去创建一个
A. S. M. Kayes | Timothy R. McIntosh | Timothy McIntosh | Yi-Ping Phoebe Chen | Alex Ng | Paul Watters | P. Watters | A. Kayes | Alex Ng
[1] Mohammad Mehdi Ahmadian,et al. Connection-monitor & connection-breaker: A novel approach for prevention and detection of high survivable ransomwares , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[2] Jong Hyuk Park,et al. CloudRPS: a cloud analysis based enhanced ransomware prevention system , 2016, The Journal of Supercomputing.
[3] Iman M. Almomani,et al. Optimizing Extreme Learning Machines Using Chains of Salps for Efficient Android Ransomware Detection , 2020, Applied Sciences.
[4] Iman Almomani,et al. Ransomware Detection System for Android Applications , 2019, Electronics.
[5] Jiqiang Liu,et al. Detecting Android Locker-Ransomware on Chinese Social Networks , 2019, IEEE Access.
[6] Alana Maurushat,et al. Technical and Behavioural Training and Awareness Solutions for Mitigating Ransomware Attacks , 2020, CSOC.
[7] Wu Jing,et al. Ransomware Detection Based on an Improved Double-Layer Negative Selection Algorithm , 2019 .
[8] Pedro García-Teodoro,et al. R-Locker: Thwarting ransomware action through a honeyfile-based approach , 2018, Comput. Secur..
[9] Wojciech Mazurczyk,et al. Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics , 2016, Comput. Electr. Eng..
[10] Damon McCoy,et al. Tracking Ransomware End-to-end , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[11] Ryotaro Kobayashi,et al. Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor , 2019, 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS).
[12] Kangbin Yim,et al. Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems , 2019, IEEE Access.
[13] Budi Arief,et al. PaperW8: an IoT bricking ransomware proof of concept , 2020, ARES.
[14] Bander Ali Saleh Al-rimy,et al. Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection , 2018, Future Gener. Comput. Syst..
[15] Sutharshan Rajasegarar,et al. VoterChoice: A ransomware detection honeypot with multiple voting framework , 2020, Concurr. Comput. Pract. Exp..
[16] Md. Mahbubur Rahman,et al. RansHunt: A support vector machines based ransomware analysis framework with integrated feature set , 2017, 2017 20th International Conference of Computer and Information Technology (ICCIT).
[17] Bo Chen,et al. RDS3: Ransomware defense strategy by using stealthily spare space , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[18] Budi Arief,et al. Ransomware deployment methods and analysis: views from a predictive model and human responses , 2019, Crime Science.
[19] Ji-Hoon Lee,et al. White list-based ransomware real-time detection and prevention for user device protection , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).
[20] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[21] Miroslaw Malek,et al. Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection , 2017, FPS.
[22] David Evans,et al. The user is not the enemy: fighting malware by tracking user intentions , 2008, NSPW '08.
[23] Mauro Conti,et al. On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective , 2018, Comput. Secur..
[24] Adnane Addaim,et al. Proposed Solution for HID Fileless Ransomware Using Machine Learning , 2020 .
[25] Dusko Pavlovic,et al. Dynamic Distributed Secure Storage Against Ransomware , 2020, IEEE Transactions on Computational Social Systems.
[26] Michael J. May,et al. Combating Ransomware using Content Analysis and Complex File Events , 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[27] Mohammad Mehedi Hassan,et al. Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches , 2020, IEEE Access.
[28] Mayank Verma,et al. Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques , 2018, 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).
[29] Dan Grossman,et al. AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems , 2016, CCS.
[30] Fuad A. Ghaleb,et al. A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction , 2020, IEEE Access.
[31] Debdeep Mukhopadhyay,et al. RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders , 2019, 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[32] Elisa Bertino,et al. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware , 2018, RAID.
[33] Baoxu Liu,et al. Poster : A New Approach to Detecting Ransomware with Deception , 2017 .
[34] Nir Kshetri,et al. Do Crypto-Currencies Fuel Ransomware? , 2017, IT Professional.
[35] Mikel Izal,et al. Ransomware early detection by the analysis of file sharing traffic , 2018, J. Netw. Comput. Appl..
[36] Hongsong Chen,et al. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems , 2018, ICT Express.
[37] Julio Hernandez-Castro,et al. To pay or not: game theoretic models of ransomware , 2019, J. Cybersecur..
[38] Oliver Michel,et al. Machine Learning-Based Detection of Ransomware Using SDN , 2018, SDN-NFV@CODASPY.
[39] Paul A. Watters,et al. Enforcing situation-aware access control to build malware-resilient file systems , 2021, Future Gener. Comput. Syst..
[40] Sungjin Lee,et al. SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[41] J. Price,et al. Research Limitations and the Necessity of Reporting Them , 2004 .
[42] Hamid Reza Ghaffary,et al. I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion , 2020, Comput. Sci. Rev..
[43] Arun Kumar Sangaiah,et al. Classification of ransomware families with machine learning based on N-gram of opcodes , 2019, Future Gener. Comput. Syst..
[44] Mohammad Mehedi Hassan,et al. A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection , 2020, J. Netw. Comput. Appl..
[45] Jianming Wang,et al. Buffer Management for Identifying Crypto-Ransomware Attack in Environment with No Semantic Information , 2019, 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom).
[46] Mohammad Mehdi Ahmadian,et al. 2entFOX: A framework for high survivable ransomwares detection , 2016, 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[47] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[48] Andrea Continella,et al. An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network , 2020, 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI).
[49] Muna Al-Hawawreh,et al. Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things , 2019, IEEE Internet of Things Journal.
[50] Issa Traoré,et al. Detecting Ransomware in Encrypted Web Traffic , 2019, FPS.
[51] Ziming Zhao,et al. Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection , 2018, IEEE Transactions on Information Forensics and Security.
[52] Aniello Cimitile,et al. Talos: no more ransomware victims with formal methods , 2018, International Journal of Information Security.
[53] Gabriele Lenzini,et al. Next Generation Cryptographic Ransomware , 2018, NordSec.
[54] Xin Luo,et al. Awareness Education as the Key to Ransomware Prevention , 2007, Inf. Secur. J. A Glob. Perspect..
[55] Budi Arief,et al. Why Current Statistical Approaches to Ransomware Detection Fail , 2020, ISC.
[56] Marcus Botacin,et al. Challenges and pitfalls in malware research , 2021, Comput. Secur..
[57] Nir Nissim,et al. Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory , 2018, Expert Syst. Appl..
[58] Jean-Louis Lanet,et al. Ransomware and the Legacy Crypto API , 2016, CRiSIS.
[59] Dipankar Dasgupta,et al. Forensic Analysis of Ransomware Families Using Static and Dynamic Analysis , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[60] Azween Abdullah,et al. Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm , 2019, Comput..
[61] Julian Jang,et al. Masquerade Attacks Against Security Software Exclusion Lists , 2019, Aust. J. Intell. Inf. Process. Syst..
[62] Julian Jang,et al. Large Scale Behavioral Analysis of Ransomware Attacks , 2018, ICONIP.
[63] NZ Jhanjhi,et al. Evaluation metric for crypto-ransomware detection using machine learning , 2020, J. Inf. Secur. Appl..
[64] Shen Su,et al. Automatically Traceback RDP-Based Targeted Ransomware Attacks , 2018, Wirel. Commun. Mob. Comput..
[65] Stefano Zanero,et al. HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.
[66] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[67] Sakir Sezer,et al. A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware , 2019, IEEE Access.
[68] Gowtham Ramesh,et al. Automated dynamic approach for detecting ransomware using finite-state machine , 2020, Decis. Support Syst..
[69] Seifedine Kadry,et al. A Digital DNA Sequencing Engine for Ransomware Detection Using Machine Learning , 2020, IEEE Access.
[70] Jean-Marc Robert,et al. An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems , 2016, CANS.
[71] Alireza Karimi,et al. Android ransomware detection using reduced opcode sequence and image similarity , 2017, 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE).
[72] Pranshu Bajpai,et al. Attacking Key Management in Ransomware , 2020, IT Professional.
[73] Insup Lee,et al. Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments , 2019, Sensors.
[74] Pranshu Bajpai,et al. An Empirical Study of Key Generation in Cryptographic Ransomware , 2020, 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security).
[75] Jihoon Lee,et al. Blacklist vs. Whitelist-Based Ransomware Solutions , 2020, IEEE Consumer Electronics Magazine.
[76] Kohei Mukaiyama,et al. Ransomware Detection Considering User's Document Editing , 2018, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).
[77] Gaurav Agarwal,et al. Interactive Security of Ransomware with Heuristic Random Bit Generator , 2021 .
[78] Per Håkon Meland,et al. The Ransomware-as-a-Service economy within the darknet , 2020, Comput. Secur..
[79] Sanjeev Thakur,et al. An app based on static analysis for android ransomware , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[80] Yu Yang,et al. Automated Detection and Analysis for Android Ransomware , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[81] Steve Mansfield-Devine. Fileless attacks: compromising targets without malware , 2017, Netw. Secur..
[82] Julian C. Bradfield,et al. A general definition of malware , 2010, Journal in Computer Virology.
[83] Satoshi Fukumoto,et al. Detecting Ransomware using Support Vector Machines , 2018, ICPP Workshops.
[84] Arun Kumar Sangaiah,et al. Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes , 2020, Future Gener. Comput. Syst..
[85] Julian Jang,et al. The Inadequacy of Entropy-Based Ransomware Detection , 2019, ICONIP.
[86] Moti Yung,et al. Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[87] Sanggeun Song,et al. The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform , 2016, Mob. Inf. Syst..
[88] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[89] Tom Rodden,et al. Consent for all: revealing the hidden complexity of terms and conditions , 2013, CHI.
[90] S. Revathi,et al. Ransomware protection in loT using software defined networking , 2020 .
[91] Kristina Lerman,et al. RAPTOR: Ransomware Attack PredicTOR , 2018, ArXiv.
[92] Nashwa Abdelbaki,et al. A New Static-Based Framework for Ransomware Detection , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[93] Ali A. Ghorbani,et al. DNA-Droid: A Real-Time Android Ransomware Detection Framework , 2017, NSS.
[94] Chang-Gyu Lee,et al. KEY-SSD: Access-Control Drive to Protect Files from Ransomware Attacks , 2019, ArXiv.
[95] Daniel Morato,et al. A Survey on Detection Techniques for Cryptographic Ransomware , 2019, IEEE Access.
[96] Engin Kirda,et al. Redemption: Real-Time Protection Against Ransomware at End-Hosts , 2017, RAID.
[97] Somesh Jha,et al. A semantics-based approach to malware detection , 2007, POPL '07.
[98] Jack F. Bravo-Torres,et al. Social engineering as an attack vector for ransomware , 2017, 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON).
[99] Pavol Zavarsky,et al. Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions , 2018, 2018 1st International Conference on Data Intelligence and Security (ICDIS).
[100] Hamid Jahankhani,et al. Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure , 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3).
[101] S. Revathi,et al. Ransomware protection in IoT using software defined networking , 2020 .
[102] Yuli Adam Prasetyo,et al. Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection , 2018, International Journal of Integrated Engineering.
[103] Gabriele Lenzini,et al. No Random, No Ransom: A Key to Stop Cryptographic Ransomware , 2018, DIMVA.
[104] Danny Hendler,et al. Ransomware prevention using application authentication-based file access control , 2018, SAC.
[105] Andreas Peter,et al. DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting , 2017, ACSAC.
[106] Ali Dehghantanha,et al. Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence , 2018, IEEE Transactions on Emerging Topics in Computing.
[107] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[108] Robert A. Bridges,et al. Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection , 2019, SciSec.
[109] Junghee Lee,et al. Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense , 2018, IEEE Computer Architecture Letters.
[110] Tseng Aragorn,et al. Deep Learning for Ransomware Detection , 2016 .
[111] Alfredo Cuzzocrea,et al. A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[112] Ali Dehghantanha,et al. DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer , 2019, Future Gener. Comput. Syst..
[113] Alessandro Barenghi,et al. ShieldFS: a self-healing, ransomware-aware filesystem , 2016, ACSAC.
[114] Peng Liu,et al. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware , 2017, CCS.
[115] Bander Ali Saleh Al-rimy,et al. Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection , 2019, Future Gener. Comput. Syst..
[116] Ross Brewer,et al. Ransomware attacks: detection, prevention and cure , 2016, Netw. Secur..
[117] A. Stephen McGough,et al. A King’s Ransom for Encryption: Ransomware Classification using Augmented One-Shot Learning and Bayesian Approximation , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[118] Tooska Dargahi,et al. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features , 2019, Journal of Computer Virology and Hacking Techniques.
[119] Vinay J. Ribeiro,et al. RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).
[120] Daniele Sgandurra,et al. Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection , 2016, ArXiv.
[121] Fabio Martinelli,et al. R-PackDroid: API package-based characterization and detection of mobile ransomware , 2017, SAC.
[122] Fabio Martinelli,et al. On the effectiveness of system API-related information for Android ransomware detection , 2018, Comput. Secur..
[123] Prabaharan Poornachandran,et al. Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).
[124] Yong Jin,et al. A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).
[125] Eul Gyu Im,et al. Ransomware detection using machine learning algorithms , 2019, Concurr. Comput. Pract. Exp..
[126] Vadlamani Ravi,et al. Machine Learning and Feature Selection Based Ransomware Detection Using Hexacodes , 2020, FICTA.
[127] Dimitrios Tzovaras,et al. A Behaviour based Ransomware Detection using Neural Network Models , 2020, 2020 10th International Conference on Advanced Computer Information Technologies (ACIT).
[128] Marcel Waldvogel,et al. Fighting Ransomware with Guided Undo , 2018 .
[129] Hani Alshahrani,et al. An Intelligent Behavior-Based Ransomware Detection System For Android Platform , 2019, 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
[130] Gabriele Lenzini,et al. NoCry: No More Secure Encryption Keys for Cryptographic Ransomware , 2019, ETAA@ESORICS.
[131] Richard J. Enbody,et al. A key-management-based taxonomy for ransomware , 2018, 2018 APWG Symposium on Electronic Crime Research (eCrime).
[132] Ali Shuja Siddiqui,et al. Hardware based protection against malwares by PUF based access control mechanism , 2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS).
[133] Huy Kang Kim,et al. Ransomware protection using the moving target defense perspective , 2019, Comput. Electr. Eng..
[134] William J. Buchanan,et al. Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation , 2020, Digit. Investig..
[135] Jean-Louis Lanet,et al. Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure , 2017, NordSec.
[136] Antonella Santone,et al. Ransomware Steals Your Phone. Formal Methods Rescue It , 2016, FORTE.
[137] Chris Moore,et al. Detecting Ransomware with Honeypot Techniques , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).
[138] Kyungroul Lee,et al. Ransomware prevention technique using key backup , 2018, Concurr. Comput. Pract. Exp..
[139] Peng Liu,et al. MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer , 2019, CODASPY.
[140] Robert A. Bridges,et al. Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[141] Ali Selamat,et al. RANDS: A Machine Learning-Based Anti-Ransomware Tool for Windows Platforms , 2019, New Trends in Software Methodologies, Tools and Techniques.
[142] Vimal Kumar,et al. Behaviour Based Ransomware Detection , 2019, CATA.
[143] Jason Earl Thomas. Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks , 2018 .
[144] Budi Arief,et al. A Roadmap for Improving the Impact of Anti-ransomware Research , 2019, NordSec.
[145] Lior Rokach,et al. Dynamic Malware Analysis in the Modern Era—A State of the Art Survey , 2019, ACM Comput. Surv..
[146] Sherali Zeadally,et al. Ransomware behavioural analysis on windows platforms , 2018, J. Inf. Secur. Appl..
[147] Fei Tang,et al. RansomSpector: An introspection-based approach to detect crypto ransomware , 2020, Comput. Secur..
[148] Yahye Abukar Ahmed,et al. Automated Analysis Approach for the Detection of High Survivable Ransomware , 2020, KSII Trans. Internet Inf. Syst..
[149] Xavier J. A. Bellekens,et al. CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives , 2017, Inf..
[150] Qi Gong,et al. Ransomware detection based on V-detector negative selection algorithm , 2017, 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).
[151] Eric Järpe,et al. A novel method for recovery from Crypto Ransomware infections , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[152] Lena Connolly,et al. The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures , 2019, Comput. Secur..
[153] Huirong Fu,et al. RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform , 2018, 2018 IEEE International Conference on Electro/Information Technology (EIT).
[154] Krishna Chandra Roy,et al. DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification , 2020, Inf. Syst. Frontiers.
[155] Yoojae Won,et al. Ransomware detection method based on context-aware entropy analysis , 2018, Soft Comput..
[156] Gianluca Stringhini,et al. PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.
[157] Iman Almomani,et al. On the Effectiveness of Application Permissions for Android Ransomware Detection , 2020, 2020 6th Conference on Data Science and Machine Learning Applications (CDMA).
[158] Ondrej Krejcar,et al. A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning , 2020, Applied Sciences.