Login / Signup
The aftermath of a crypto-ransomware attack at a large academic institution.
Leah Zhang-Kennedy
Hala Assal
Jessica N. Rocheleau
Reham Mohamed
Khadija Baig
Sonia Chiasson
Published in:
USENIX Security Symposium (2018)
Keyphrases
</>
database
higher education
countermeasures
secret key
ddos attacks
malicious attacks
data mining
information technology
authentication protocol
cyber attacks
encryption algorithm
denial of service attacks
attack detection
malicious users
attack scenarios