has been cited by the following article(s):
[1]
|
A Review on Ransomware Attack
|
|
2021 |
|
|
[2]
|
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
|
|
2020 |
|
|
[3]
|
藉由監控 I/O 請求以進行勒索軟體偵測
|
|
2019 |
|
|
[4]
|
植基於檔案異動行為建模與備援之勒索軟體防禦機制
|
|
2019 |
|
|
[5]
|
Machine learning based file entropy analysis for ransomware detection in backup systems
|
|
2019 |
|
|
[6]
|
AUTOMATIC DETECTION AND ANALYSIS OF RANSOMWARE ATTACKS
|
|
South Asian Journal of Research in Engineering Science and Technology,
2019 |
|
|
[7]
|
Offline Based Ransomware Detection and Analysis Method using Dynamic API Calls Flow Graph
|
|
2018 |
|
|
[8]
|
Ransomware prevention technique using key backup
|
|
Concurrency and computation: practice and experience,
2018 |
|
|
[9]
|
다이나믹 API 호출 흐름 그래프를 이용한 오프라인 기반 랜섬웨어 탐지 및 분석 기술 개발
|
|
Journal of Digital Contents Society,
2018 |
|
|
[10]
|
Erhebung von Informations-und Datenquellen für Cyber-Lagebilder
|
|
Cyber Situational Awareness in Public-Private-Partnerships,
2018 |
|
|
[11]
|
Ransomware: A Survey and Trends.
|
|
Journal of Information Assurance & Security,
2017 |
|
|
[12]
|
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph
|
|
RACS 2017 Proceedings of the International Conference on Research in Adaptive and Convergent Systems,
2017 |
|
|
[13]
|
Ransomware: a survey and trends
|
|
2017 |
|
|
[14]
|
랜섬웨어의 공격 기법 분석과 대응 방안에 대한 연구
|
|
Proceedings of the 33th KSII Spring Conference,
2016 |
|
|
[15]
|
Security Challenges in Recent Internet Threats and Enhanced Security Service Model for Future IT Environments
|
|
網際網路技術學刊,
2016 |
|
|
[16]
|
Ransomware-Prevention Technique Using Key Backup
|
|
Big Data Technologies and Applications,
2016 |
|
|
[17]
|
The Effective Ransomware Prevention Technique using Process Monitoring on Android Platform
|
|
Mobile Information Systems ,
2015 |
|
|
[1]
|
The rise of ransomware: Forensic analysis for windows based ransomware attacks
Expert Systems with Applications,
2022
DOI:10.1016/j.eswa.2021.116198
|
|
|
[2]
|
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
Entropy,
2022
DOI:10.3390/e24020239
|
|
|
[3]
|
Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions
Applied Sciences,
2021
DOI:10.3390/app12010172
|
|
|
[4]
|
A Review on Ransomware Attack
2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC),
2021
DOI:10.1109/ICSCCC51823.2021.9478148
|
|
|
[5]
|
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON),
2020
DOI:10.1109/UEMCON51285.2020.9298128
|
|
|
[6]
|
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2931136
|
|
|
[7]
|
Cyber Situational Awareness in Public-Private-Partnerships
2018
DOI:10.1007/978-3-662-56084-6_6
|
|
|
[8]
|
Big Data Technologies and Applications
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
2017
DOI:10.1007/978-3-319-58967-1_12
|
|
|
[9]
|
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph
Proceedings of the International Conference on Research in Adaptive and Convergent Systems - RACS '17,
2017
DOI:10.1145/3129676.3129704
|
|
|
[10]
|
The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform
Mobile Information Systems,
2016
DOI:10.1155/2016/2946735
|
|
|