Cited By
View all- Rother CChen B(2024)Reversing File Access Control Using Disk Forensics on Low-Level Flash MemoryJournal of Cybersecurity and Privacy10.3390/jcp40400384:4(805-822)Online publication date: 1-Oct-2024
- Huang JLiu TChen YPeng HHuang TLei CHuang CFournaris APalmieri P(2024)Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the HypervisorProceedings of the 2024 on Cloud Computing Security Workshop10.1145/3689938.3694780(66-79)Online publication date: 19-Nov-2024
- Enomoto SKuzuno HYamada HShiraishi YMorii M(2024)Early mitigation of CPU-optimized ransomware using monitoring encryption instructionsInternational Journal of Information Security10.1007/s10207-024-00892-223:5(3393-3413)Online publication date: 30-Jul-2024
- Show More Cited By