Cited By
View all- Rother CChen B(2024)Reversing File Access Control Using Disk Forensics on Low-Level Flash MemoryJournal of Cybersecurity and Privacy10.3390/jcp40400384:4(805-822)Online publication date: 1-Oct-2024
- McIntosh TSusnjak TLiu TXu DWatters PLiu DHao YNg AHalgamuge M(2024)Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data ExfiltrationACM Computing Surveys10.1145/369134057:1(1-40)Online publication date: 7-Oct-2024
- Dafoe JSingh HChen NChen B(2024)Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous VehiclesSecurity and Privacy in Cyber-Physical Systems and Smart Vehicles10.1007/978-3-031-51630-6_2(15-33)Online publication date: 5-Feb-2024