On Deception-Based Protection Against Cryptographic Ransomware.
Ziya Alper GençGabriele LenziniDaniele SgandurraPublished in: DIMVA (2019)
Keyphrases
- smart card
- incomplete information
- key management
- hash functions
- encryption scheme
- digital signature
- qualitative and quantitative
- random number generator
- security protocols
- mental states
- encryption key
- data sets
- secure communication
- cellular automata
- multi agent
- website
- decision making
- learning algorithm
- neural network