References
[1]. Alhayani, B., Abbas, S. T., Khutar, D. Z., & Mohammed,
H. J. (2021). Best ways computation intelligent of face
cyber attacks. Materials Today: Proceedings.
[2]. Altwairqi, A. F., AlZain, M. A., Soh, B., Masud, M., & Al-
Amri, J. (2019). Four most famous cyber attacks for
financial gains. Int. J. Eng. Adv. Technol, 9, 2131-2139.
[3]. Gandhi, K. A. & Kumar, P. V. D. (2017). Survey on
ransomware: a new era of cyber attack. International
Journal of Computer Applications, 168(3), 38-41. https://doi.org/10.5120/ijca2017914446
[4]. Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson,
R. (2005). 2005 CSI/FBI computer crime and security
survey. Computer Security Journal, 21(3), 1.
[5]. Gupta, G., & Tripathi, K. (2017). Study on ransomware
attack and its prevention. International Education &
Research Journal, 3(5), 260-262.
[6]. Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. N. (2017).
A conceptual security approach with awareness strategy
and implementation policy to eliminate ransomware. In
Proceedings of the 2017 International Conference on
Computer Science and Artificial Intelligence, 222-226.
https://doi.org/10.1145/3168390.3168398
[7]. Kiru, M. U., & Jantan, A. B. (2019). The age of
ransomware: understanding ransomware and its
countermeasures. In Artificial Intelligence and Security Challenges in Emerging Networks, 1-37. https://doi.org/10.4018/978-1-5225-7353-1.ch001
[8]. Maiorca, D., Mercaldo, F., Giacinto, G., Visaggio, C.
A., & Martinelli, F. (2017). R-PackDroid: API packagebased
characterization and detection of mobile
ransomware. In Proceedings of the Symposium on
Applied Computing, 1718-1723.
[9]. Shukla, M., Mondal, S., & Lodha, S. (2016). Poster:
Locally virtualized environment for mitigating ransomware
threat. In Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications
Security, 1784-1786. https://doi.org/10.1145/2976749.2989051
[10]. Tailor, J. P., & Patel, A. D. (2017). A comprehensive
survey: ransomware attacks prevention, monitoring and
damage control. International Journal of Research and
Scientific Innovation, 4(15), 116-121.
[11]. Techtarget. (n.d.). Retrieved from https://www.techtarget.com/searchsecurity/tip/10-common-types-ofmalware-attacks-and-how-to-prevent-them
[12]. Zakaria, W. Z. A., Abdollah, M. F., Mohd, O., & Ariffin,
A. F. M. (2017). The rise of ransomware. In Proceedings of
the 2017 International Conference on Software and e-
Business, 66-70. https://doi.org/10.1145/3178212.3178224