(1)
Megha; Tiwari, D.; Nagarkoti, G.; Banda, D. L. Identifying Ransomware Attack Patterns and Constructing Decrypting Tool . J. Appl. Opt. 2024, 232-246.