[1] 趋势科技.勒索软件的过去、现在和未来.安全报告,2017. Gene H. Kim. The design and implementation of tripwire: a file system integrity checker [J].ACM,1994.
[2] Scaife N, Carter H, Traynor P, et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data[C]// IEEE, International Conference on Distributed Computing Systems. IEEE, 2016:303-312.
[3] Scaife N, Carter H, Traynor P, et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data[C]// IEEE, International Conference on Distributed Computing Systems. IEEE, 2016:303-312.
[4] Ross Brewer. Ransomware attacks: detection, prevention and cure[J]. Network Security,2016,2016(9).
[5] Carbon Black.Carbon-Black-Ransomware-Economy-Report.安全报告,2017.
[6] Gene H. Kim. The design and implementation of tripwire: a file system integrity checker [J].ACM,1994.
[7] Luo X, Liao Q. Awareness Education as the Key to Ransomware Prevention[M]. Taylor & Francis, Inc. 2007.
[8] Andronio N, Zanero S, Maggi F. HelDroid : Dissecting and Detecting Mobile Ransomware[M]// Research in Attacks, Intrusions, and Defenses. Springer International Publishing, 2015.
[9] Kharraz A, Robertson W, Balzarotti D, et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks[M]// Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2015:3-24.
[10] Yang T, Yang Y, Qian K, et al. Automated Detection and Analysis for Android Ransomware[C]// IEEE, International Conference on High PERFORMANCE Computing and Communications. IEEE, 2015:1338-1343.
[11] Cabaj K, Mazurczyk W. Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall[M]. IEEE Press, 2016.
|