1 |
Moore, Chris. "Detecting Ransomware with Honeypot Techniques." Cybersecurity and Cyberforensics Conference (CCC), IEEE, 2016, p77-81
|
2 |
"Threat analysis report for the first half of 2016" TrendMicro, 2016.
|
3 |
Ward, Mark. "Cryptolocker victims to get files back for free." BBC News, 2014.
|
4 |
Pathak, P. B., and Yeshwant Mahavidyalaya Nanded, "A dangerous trend of cybercrime: Ransomware growing challenge," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2016
|
5 |
Jaeyeon Moon and Younghyun Chang, "Ransomware Analysis and Method for Minimize the Damage," The Journal of the Convergence on Culture Technology, 2016, p79-85
|
6 |
Oh, Joo-Hyung, Im, Chae-Tae and Jeong, Hyun-Cheol. "Technical Trends and Response Methods of Drive-by Download," Communications of the Korean Institute of Information Scientists and Engineers, 28.
|
7 |
Richet and Jean-Loup, "Extortion on the Internet: the Rise of Crypto-Ransomware." Harvard University. Retrieved October, 2015
|
8 |
Nolen Scaife, Henry Carter, Patrick Traynor and Kevin R.B. Butler, "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data," International Conference on Distributed Computing Systems, 2016.
|
9 |
Richardson Ronny and Max North, "Ransomware: Evolution, Mitigation and Prevention." International Management Review 13.1, 2017
|
10 |
Miss. Harshada U. Salvi, and Mr. Ravidra V. Kerkar, "Ransomware: A Cyber Extortion," Asian Journal of Cenvergence in Technology, 2015.
|