References
- H. Y. Kim, D. J. Kang & Y. Yeom. (2017). Dynamic ransomware protection using deterministic random bit generator. 2017 IEEE Conference on Application, Information and Network Security. DOI : 10.1109/ains.2017.8270426
- L. D. Yu.. (2015). Threats and countermeasures of malware. Journal of Convergence for Information Technology. 5(1), 13-18. https://doi.org/10.22156/CS4SMB.2015.5.1.013
- M. Dave. (2016). Beware-Ransomware! River Publisher. http://pop.riverpublishers.com/opinions.php?id=4 DOI : 10.13052/popcas004
- Juggling Identities. (2009). Four. Ideal Types of Crypto-Jewish Identity. USA : Columbia University Press.
- Juggling Identities. (2009). APT attacks and Countermeasures. USA : Columbia University Press.
- A. K. Sood & R. Enbody. (2012). Targeted cyberattacks: a superset of advanced persistent threats. IEEE security & privacy, 11(1), 54-61. DOI : 10.1109/msp.2012.90
- E. Sava & C. Yilmaz. (2015). A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES. The Computer Journal, 58(10), 2716-2737. DOI : 10.1093/comjnl/bxv027
- P. Dixit, J. Zalke & S. Admane. (2017). Speed optimization of aes algorithm with hardware-software co-design. IEEE 2017 2nd International Conference for Convergence in Technology (I2CT). IEEE : India. DOI : 10.1109/i2ct.2017.8226237
- C. P. Pramod & M. Jaiswal. (2017). An advanced AES algorithm using swap and 400 bit data block with flexible S-Box in Cloud Computing. 2017 3rd International Conference on Computing, Communication and Automation (ICCCA). IEEE : India. DOI : 10.1109/ccaa.2017.8229888
- Y. Jeong, Y. Yon & J. Ku. (2017). Hash-chain-based IoT authentication scheme suitable for small and medium enterprises. Convergence Society for SMB, 7(4), 105-111. DOI : 10.22156/cs4smb.2017.7.4.105
- M. S. Wamser & G. Sigl. (2017). Pushing the limits further : Sub-atomic AES. 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC). IEEE : United Arab Emirates. DOI : 10.1109/vlsi-soc.2017.8203470
- S. L. Chikouche & N. Chikouche. (2017). An improved approach for lsb-based image steganography using AES algorithm. 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE-B). IEEE : Algeria. DOI : 10.1109/icee-b.2017.8192077
- A. K. Sood & S. Zeadally. (2016). Drive-By Download Attacks : A Comparative Study. IT Professional, 18(5), 18-25. DOI : 10.1109/mitp.2016.85
- M. Jodavi, M. Abadi & E. Parhizkar. (2015). DbDHunter : An ensemble-based anomaly detection approach to detect drive-by download attacks. 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE : Iran. DOI : 10.1109/iccke.2015.7365841
- J. Lee. (2017). A Study on gateway authentication protocol in IoT. Convergence Society for SMB, 7(3), 91-96. DOI : 10.22156/cs4smb.2017.7.3.091
- Y. Takata, M. Akiyama, T. Yagi, T. Hariu & S. Goto. (2015). MineSpider : Extracting URLs from Environment-Dependent Drive-by Download Attacks. 2015 IEEE 39th Annual Computer Software and Applications Conference. IEEE : Taiwan. DOI : 10.1109/compsac.2015.76
- A. Yousefi, & S. M. Jameii. (2017). Improving the security of internet of things using encryption algorithms. 2017 International Conference on IoT and Application (ICIOT). IEEE : India. DOI : 10.1109/iciota.2017.8073627
- M. S. Gu, Y. Z. Li. (2015). A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code. Journal of Convergence for Information Technology. 7(4), 37-42.
- P. S. Shin, J. M. Kim. (2014). Security and Hacking on Wireless Networking for Small and Medium Business : Survey. Journal of Convergence for Information Technology. 4(3), 15-20. https://doi.org/10.22156/CS4SMB.2014.4.3.015