Martsenyuk et al., 2020
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Hsiao et al. | The static analysis of WannaCry ransomware | |
| Sood et al. | An empirical study of HTTP-based financial botnets | |
| Binsalleeh et al. | On the analysis of the zeus botnet crimeware toolkit | |
| Kienzle et al. | Security patterns repository version 1.0 | |
| Kara et al. | The ghost in the system: technical analysis of remote access trojan | |
| Pham et al. | Universal serial bus based software attacks and protection solutions | |
| Mirza et al. | Ransomware analysis using cyber kill chain | |
| Thakur et al. | Ransomware: Threats, identification and prevention | |
| Malik et al. | Multi pronged approach for ransomware analysis | |
| CN100520797C (en) | Apparatus and method for preventing virus dynamic state attack program | |
| Belous et al. | Computer viruses, malicious logic, and spyware | |
| Rashid et al. | Detecting Remote Access Trojan (RAT) Attacks based on Different LAN Analysis Methods | |
| Martsenyuk et al. | Features of multifunctional Backdoor technology in the personal space of users. | |
| Anand et al. | Comparative study of ransomwares | |
| Kaur et al. | An empirical analysis of crypto-ransomware behavior | |
| Indu et al. | Ransomware: A New Era of Digital Terrorism | |
| Pilania et al. | Zeus: In-Depth Malware Analysis of Banking Trojan Malware | |
| Srinivasan | Protecting anti-virus software under viral attacks | |
| Stajano et al. | Security issues for internet appliances | |
| Triantafyllou | Malware analysis | |
| Grammatikakis et al. | System threats | |
| Endsuleit et al. | A security analysis on jade (-s) v. 3.2 | |
| Asamoah | Antivirus software versus malware | |
| Pompura | Improved Detection of Multi-Faceted Polymorphic Malware | |
| Abba et al. | Ransomware Strategies |