Deception in double extortion ransomware attacks: An analysis of profitability and credibility.

Tom MeursEdward J. CartwrightAnna CartwrightMarianne JungerAbhishta Abhishta
Published in: Comput. Secur. (2024)
Keyphrases
  • information retrieval
  • data analysis
  • statistical analysis
  • data sets
  • real world
  • genetic algorithm
  • image analysis
  • quantitative analysis
  • countermeasures