On Deception-Based Protection Against Cryptographic Ransomware

Publication
Detection of Intrusions and Malware, and Vulnerability Assessment