A brief study of Wannacry Threat: Ransomware Attack 2017
暂无分享,去创建一个
[1] Zubair A. Baig,et al. Ransomware: Emergence of the cyber-extortion menace , 2015 .
[2] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[3] Eric Järpe,et al. A novel method for recovery from Crypto Ransomware infections , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[4] Babu M. Mehtre,et al. Static Malware Analysis Using Machine Learning Methods , 2014, SNDS.
[5] Stefano Zanero,et al. HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.
[6] Sanggeun Song,et al. The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform , 2016, Mob. Inf. Syst..
[7] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.