Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data

Publication Type:

Conference Paper

Authors:

Nolen Scaife; Henry Carter; Patrick Traynor; Kevin R.B. Butler

Source:

IEEE 36th International Conference on Distributed Computing Systems (2016)
  • 2795 reads
  • Google Scholar
  • RTF
  • EndNote XML

Check also our Google Scolar profile

  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Dimov, Dimo, and Yuliyan Tsonev. "Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack." Information & Security: An International Journal 47, no. 3 (2020): 317-327.
APA style: Scaife, N., Carter H., Traynor P., & Butler K. R. B. (2016).  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. IEEE 36th International Conference on Distributed Computing Systems.
Chicago style: Scaife, Nolen, Henry Carter, Patrick Traynor, and Kevin R. B. Butler. "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." In IEEE 36th International Conference on Distributed Computing Systems., 2016.
IEEE style: Scaife, N., H. Carter, P. Traynor, and K. R. B. Butler, "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data", IEEE 36th International Conference on Distributed Computing Systems, 2016.
  • Trending
  • Latest
  • Most cited
  • Corruption as a Cybersecurity Threat in the New World Order (3,666)
  • Disinformation: Policy Responses to Building Citizen Resiliency (3,604)
  • Social Media – Hate Speech – Hate Crime (3,514)
  • Future Development of Quantum Computing and Its Relevance to NATO (3,435)
  • Cyber Skills Gaps – A Systematic Review of the Academic Literature (3,269)
view all
  • Political Analysis or Fortune-Telling by Crystal-Ball? Western Think Tanks' Challenges with Forecasting Putin's War
  • Lessons for NATO to Be Learned from Putin's War in Ukraine: Global Health Engagement, Interoperability, and Lethality
  • Excessive Brotherly Love? - 'Fraternity' of Russians and Ukrainians as a Russian Propaganda Narrative
  • The Impact of War on the Ukraine Military Education System: Moving Forward in War and Peace
  • Distorting Your Perception of Russia’s Aggression: How Can We Combat Information Warfare?
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2022
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal