1 |
Jae-yeon Moon, Young-hyun Chang, "Ransomware Analysis and Method for Minimize the Damage", The Journal of the Convergence on Culture Technology pp.79-85, February, 2016
|
2 |
Hyo-mi Nam, Jung-sook Jang, Yong-hee Jeon,, "A Study on the Attack Mechanism Analysis and Countermeasure of Ransomware", Korean Society For Internet Information pp. 283-284, April, 2016
|
3 |
Cabaj, Krzysztof, Piotr, Grochowski, Konrad, Osojca, Dawid, "Network activity analysis of CryptoWall ransomware", PRZEGLAD ELEKTROTECHNICZNY pp.201-204, November, 2015
|
4 |
Ji-yo Park, "A Study on Malicious Behavior Detection of Ransomware in Windows", Department of Information Security, Graduate School of Infromation and Communications, Konkuk University, 2016
|
5 |
Gyeong-sin Kim, Moon-sik Kang, "Next Generation Cyber Security Issues, Threats and Countermeasures," The institute of electronics engineers of korea pp. 69-77, April, 2014
|
6 |
Byng-tae Park, "Security Threat and Response Measures by Ransomware", Department of Electronics and Computer Engineering, Graduate School of Industry, Chonnam National University, 2016
|
7 |
Ji-young Lee, "A Study on Extraction of Ransomware Evidence by Using Forensic Method", Department of Information Security, Graduate School of Dongguk University, 2016
|
8 |
"New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer", http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer/
|
9 |
"A study on the behavior monitoring ",http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=4c2519a94d07172bffe0bdc3ef48d419
|