Analysis of Ransomware, Methodologies Used by Attackers and Mitigation Techniques
Crossref DOI link: https://doi.org/10.1007/978-981-15-7527-3_37
Published Online: 2021-01-05
Published Print: 2021
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Jimada, Shivaram
Nguyen, Thi Dieu Linh
Sanda, Jahanavi
Vududala, Sai Kiran
Text and Data Mining valid from 2021-01-01
Version of Record valid from 2021-01-01
Chapter History
First Online: 5 January 2021