Login / Signup
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.
Amin Kharraz
William K. Robertson
Davide Balzarotti
Leyla Bilge
Engin Kirda
Published in:
DIMVA (2015)
Keyphrases
</>
countermeasures
security flaws
b spline
malicious attacks
traffic analysis
terrorist attacks
security mechanisms
genetic algorithm
attack detection
watermarking scheme
security threats
computer security
security risks
tool wear
control points
cutting tool
web services
data sets