Dynamic Distributed Secure Storage Against Ransomware
暂无分享,去创建一个
[1] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[2] Baochun Li,et al. Erasure coding for cloud storage systems: A survey , 2013 .
[3] P. Matthews,et al. Generating uniformly distributed random latin squares , 1996 .
[4] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[5] Donald E. Knuth,et al. Dancing links , 2000, cs/0011047.
[6] Gianluca Stringhini,et al. PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.
[7] J. Plank. Erasure Codes for Storage Systems , 2013 .
[8] Pan Zhou,et al. Toward Optimal Storage Scaling via Network Coding: From Theory to Practice , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[9] Roberto Fontana. Random Latin squares and Sudoku designs generation , 2013 .
[10] Damon McCoy,et al. Tracking Ransomware End-to-end , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[11] Moti Yung,et al. Cryptovirology , 2017, Commun. ACM.
[12] Bo Chen,et al. RDS3: Ransomware defense strategy by using stealthily spare space , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[13] Dimitris S. Papailiopoulos,et al. XORing Elephants: Novel Erasure Codes for Big Data , 2013, Proc. VLDB Endow..
[14] Wojciech Mazurczyk,et al. Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall , 2016, IEEE Network.
[15] George Dyson,et al. Darwin among the machines , 1998, The Mathematical Gazette.
[16] Moti Yung,et al. Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[17] Paul Baran,et al. On Distributed Communications , 1964 .