"I was told to buy a software or lose my computer. I ignored it": A study of ransomware

作者: Sharad Goel , Joseph Bonneau , Camelia Simoiu , Christopher Gates

DOI:

关键词:

摘要:

参考文章(15)
GEORGE R. MILNE, LAUREN I. LABRECQUE, CORY CROMER, Toward an Understanding of the Online Consumer's Risky Behavior and Protection Practices Journal of Consumer Affairs. ,vol. 43, pp. 449- 473 ,(2009) , 10.1111/J.1745-6606.2009.01148.X
Andrew Gelman, Sharad Goel, Douglas Rivers, David Rothschild, The Mythical Swing Voter Quarterly Journal of Political Science. ,vol. 11, pp. 103- 130 ,(2016) , 10.1561/100.00015031
Fawn T. Ngo, Raymond Paternoster, Cybercrime Victimization: An Examination of Individual and Situational Level Factors International Journal of Cyber Criminology. ,vol. 5, pp. 773- ,(2011)
Monika, Pavol Zavarsky, Dale Lindskog, Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization☆ Procedia Computer Science. ,vol. 94, pp. 465- 472 ,(2016) , 10.1016/J.PROCS.2016.08.072
Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler, CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). pp. 303- 312 ,(2016) , 10.1109/ICDCS.2016.46
Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, Elizeu Santos-Neto, Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population new security paradigms workshop. pp. 11- 22 ,(2016) , 10.1145/3011883.3011885
Alexander Janus, Jennifer Cheeseman Day, Jessica Davis, Computer and Internet Use in the United States: 2003 US Department of Commerce. ,(2005)
Michael Ovelgönne, Tudor Dumitraş, B. Aditya Prakash, V. S. Subrahmanian, Benjamin Wang, Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks: A Data-Driven Approach ACM Transactions on Intelligent Systems and Technology. ,vol. 8, pp. 51- ,(2017) , 10.1145/2890509
Leyla Bilge, Yufei Han, Matteo Dell'Amico, RiskTeller: Predicting the Risk of Cyber Incidents computer and communications security. pp. 1299- 1311 ,(2017) , 10.1145/3133956.3134022