参考文献
|
-
Lin, H.C.,Wang, P.,Hong, W.Q.(2019).Using signature analyses to construct an ontological model of ransomware.Communications of the CCISA,25(2),37-58.
連結:
-
Check Point Software Technologies, https://pages.checkpoint.com/cyber-security-report-2021.html (2021/12/10).
-
Virscan, http://r.virscan.org (2022/11/28).
-
台灣電腦網路危機處理暨協調中心 , https://www.twcert.org.tw/tw/cp-14-4502-000a2-1.html. (2022/11/28).
-
The Winlock case – I’m taking bets! ttps://securelist.com/the-winlock-case-im-takingbets/29623 (2022/11/28).
-
VirusTotal, https://www.virustotal.com/gui/home/upload (2022/11/28).
-
Jotti, https://virusscan.jotti.org (2022/11/28).
-
Etoday, https://finance.ettoday.net/news/2179744#ixzz7Q2YclPLT (2022/11/28).
-
Aishwarya, B.,Samala, G.,Koirala, T.K.,Ruhul, I.M..Packet sniffing and network traffic analysis using TCP-a new approach.Advances in Electronics, Communication and Computing
-
Bijitha, C.V.,Rohit, S.,Nath, H.V.(2020).Rohit and H.V. Nath, Secure Knowledge Management in Artificial Intelligence Era.Singapore:Springer.
-
Chen, Q.,Bridges, R.A..Automated behavioral analysis of malware- a case study of WannaCry ransomware.International Conference on Computer Communication and Informatics
-
Dominguez, AS.,Benitez, P.,Gonzalez, R.A.R.(2011).Logistic regression models.Allergol Immunopathol,39(5),295-305.
-
Ekta, G.,Divya, B.,Sanjeev, S.(2014).Malware analysis and classification: a survey.Journal of Information Security,5(2),56-64.
-
Hans, H.,Swain, P.H.(1977).The decision tree classifier: design and potential.IEEE Transactions on Geoscience Electronics,15(3),142-147.
-
Herleen, K.,Naveen, G.(2020).Innovative Data Communication Technologies and Application.U.S.A:Springer.
-
Juraj, U.(2020).Czech Republic,Masaryk University.
-
Kok, S.H.,Abdullah, A.,Jhanjhi, N.Z.(2020).Early detection of crypto-ransomware using pre-encryption detection algorithm.Journal of King Saud University - Computer and Information Sciences,34(5),51984-1999.
-
Kok, S.H.,Azween, A.,Jhanjhi, N.Z.,Supramaniam, M.(2019).Ransomware, threat and detection techniques: a review.International Journal of Computer Science and Network Security,19(2),136-146.
-
Marisa, M.K.,Alexandra, P.(2020).,Carnegie Mellon University.
-
Maxat, A.,Vassilakis, V.G.,Logothetis, M.D.(2019).WannaCry ransomware: analysis of infection, persistence, recovery prevention and propagation mechanisms.Journal of Telecommunications and Information Technology,1,113-124.
-
Nolen, S.,Henry, C.,Patrick, T.,Butler, K.R.B..CryptoLock (and drop it): stopping ransomware attacks on user data.International Conference on Distributed Computing Systems
-
Omer, A.,Refik, S..Investigation of possibilities to detect malware using existing tools.IEEE/ACS 14th International Conference on Computer Systems and Applications
-
Pallavi, A.,Vishal, S.(2013).Network monitoring and analysis by packet sniffing method.International Journal of Engineering Trends and Technology,4(5),2133-2135.
-
Philip, O.,Sakir, S.,Domhnall, C.(2018).Evolution of ransomware.IET Journal,7(5),321-327.
-
Platt, J.C.(1988).Microsoft Research Technical ReportMicrosoft Research Technical Report,U.S.A.:.
-
Sgandurra, D.,Muñoz-González, L.,Mohsen, R.,Lupu, E.C.(2016).,未出版
-
Veronika, S.,Gabor, A.,Akos, D.(2021).Introduction of the ARDS—anti-ransomware defense System model—based on the systematic review of worldwide ransomware attacks.Applied Science,11(13)
-
林韶如(2022)。國防大學理工學院資訊工程學系。
|