Login / Signup
Toward an early assessment for Ransomware attack vulnerabilities.
Rabia Malkawe
Malik Qasaimeh
Firas Ghanim
Mohammad Ababneh
Published in:
DATA (2019)
Keyphrases
</>
attack graphs
countermeasures
attack graph
security vulnerabilities
security risks
attack scenarios
information security
data corruption
buffer overflow
power analysis
dos attacks
computer viruses
assessment tool
denial of service
authentication protocol
computer networks
database