Studying Ransomware Attacks Using Web Search Logs.
Chetan BansalPantazis DeligiannisChandra Shekhar MaddilaNikitha RaoPublished in: CoRR (2020)
Keyphrases
- countermeasures
- watermarking scheme
- security protocols
- cooperative
- watermarking algorithm
- data publishing
- databases
- attack detection
- smart card
- security mechanisms
- java card
- secure routing
- database
- terrorist attacks
- malicious attacks
- denial of service attacks
- security risks
- watermarking technique
- multiscale
- case study