Login / Signup

On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective?

Phornsawan RoemsriSupadchaya PuangpontipRattikorn Hewett
Published in: ICICT (2023)
Keyphrases
  • security protocols
  • real time
  • neural network
  • information systems
  • high quality
  • watermarking scheme
  • security mechanisms