[1]
Megha, D. Tiwari, G. Nagarkoti, and D. L. Banda, “Identifying Ransomware Attack Patterns and Constructing Decrypting Tool ”, J. Appl. Opt., pp. 232–246, Mar. 2024.