Ramsonware and Honeypot
暂无分享,去创建一个
[1] Krzysztof Cabaj,et al. Network activity analysis of CryptoWall ransomware , 2015 .
[2] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[3] Lauren Pearce. Malware Analysis in a Nutshell , 2016 .
[4] Hardeep Singh,et al. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks , 2016, Applied Clinical Informatics.
[5] Malek Ben Salem,et al. Monitoring Technologies for Mitigating Insider Threats , 2010, Insider Threats in Cyber Security.
[6] Miss. Harshada U Salvi,et al. Ransomware: A Cyber Extortion , 2016 .
[7] Hung-Chang Chang,et al. Malicious Website Detection Based on Honeypot Systems , 2013, CSE 2013.
[8] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[9] Ian Welch,et al. Capture - A behavioral analysis tool for applications and documents , 2007 .
[10] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.
[11] Chris Moore,et al. Detecting Ransomware with Honeypot Techniques , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).