1.
Megha, Tiwari D, Nagarkoti G, Banda DL. Identifying Ransomware Attack Patterns and Constructing Decrypting Tool . J. Appl. Opt. [Internet]. 2024 Mar. 14 [cited 2025 Feb. 5];:232-46. Available from: https://appliedopticsjournal.net/index.php/JAO/article/view/109