Login / Signup
Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art.
Fatimah Aldauiji
Omar Batarfi
Manal Bayousef
Published in:
IEEE Access (2022)
Keyphrases
</>
countermeasures
cyber crime
cyber attacks
identity theft
information security
insider threat
cyber defense
java card
malicious attacks
digital image watermarking
security threats
traffic analysis
malicious users
sir model
database
criminal activities
image watermarking
cyber security
law enforcement
cooperative