Data aware defense (dad): Towards a generic and practical ransomware countermeasure, Nordic Conference on Secure IT Systems, p.192208, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01591939
Cryptovirology: Extortion-based security threats and countermeasures, 1996 IEEE Symposium on Security and Privacy, p.129140, 1996. ,
Ransomware demands now average about 1,000 dollars because so many victims decide to pay up, 2017. ,
Cybercrime tactics and techniques, 2017. ,
Data mining methods for detection of new malicious executables, Proceedings. 2001 IEEE Symposium on, p.3849, 2001. ,
A scalable multi-level feature extraction technique to detect malicious executables, Information Systems Frontiers, vol.10, issue.1, p.3345, 2008. ,
Sbmds: an interpretable string based malware detection system using svm ensemble with bagging, Journal in computer virology, vol.5, issue.4, p.283, 2009. ,
Idea: Opcode-sequence-based malware detection, International Symposium on Engineering Secure Software and Systems, p.3543, 2010. ,
An automated virus classification system, Virus bulletin conference, p.294300, 2005. ,
Learning trees and rules with set-valued features, AAAI/IAAI, vol.1, p.709716, 1996. ,
Analysis of computer intrusions using sequences of function calls, IEEE Transactions on dependable and secure computing, vol.4, issue.2, p.137150, 2007. ,
The Free and Open Source Software for Disk Imaging and Cloning, v:2.5.6-21, 2018. ,
Binary management and analysis framework, 2015. ,
, Cuckoo Foundation. Cuckoo Sandbox 2.0.6: Automated Malware Analysis, 2018.
Analyse et detection de logiciel de rancon, 2019. ,