Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,528,247 papers from all fields of science
Search
Sign In
Create Free Account
Locky
Locky is ransomware malware released in 2016. It is delivered by email (that was allegedly an invoice requiring payment) with an attached Microsoft…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Bitcoin
Domain generation algorithm
Dridex
Social engineering (security)
Expand
Broader (1)
Malware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Analysis Malware Flawed Ammyy RAT Dengan Metode Reverse Engineering
Tesa Pajar Setia
,
Nur Widiyasono
,
Aldy Putra Aldya
Jurnal Informatika: Jurnal Pengembangan IT
2018
Corpus ID: 67885639
Malware is currently growing rapidly, diverse and complex. But, human resources that can carry out malware analysis is limited…
Expand
2017
2017
Preventive Measures and Incident Response for Locky Ransomware
K. Prakash
,
Tabrez Nafis
,
S. Biswas
2017
Corpus ID: 55814748
: In today’s cyber world, humans connect with each other through some communication channels and digital devices. The use of…
Expand
2017
2017
Event.Locky: System of Event-Data Extraction from Webpages based on Web Mining
Chenyi Liao
,
Kei Hiroi
,
Katsuhiko Kaji
,
Ken Sakurada
,
Nobuo Kawaguchi
Journal of Information Processing
2017
Corpus ID: 44138774
Nearby event data, such as those for exhibitions and sales promotions, may help users spend their free time more efficiently…
Expand
2016
2016
Message d'attention : le rançongiciel ODIN
Gaëlle Montier
2016
Corpus ID: 237180041
ODIN est une declinaison du ransomware LOCKY qui chiffre l’ensemble du disque dur. Il se propage via des courriels demandant le…
Expand
2016
2016
Malware: Locky schlägt wieder zu
Red.
Uro-News
2016
Corpus ID: 2272822
2016
2016
alerte ransomware locky
A. Barlet
2016
Corpus ID: 232526219
2012
2012
Quantitative Analysis of Non Repudiable Protocol for Remote Voting
S. Yousuf
,
M. Sikandar
,
Hayat Khayal
,
Imran Sohail
,
Aihab Khan
2012
Corpus ID: 62209286
With the phenomenal growth of internet and electronic transactions, security services, such as non repudiation, become crucial to…
Expand
2010
2010
indoor.Locky: 屋内位置推定のための無線LAN情報プラットフォーム
梶原 克彦
,
河口 信夫
,
Katsuhiko Kaji
,
Nobuo Kawaguchi
2010
Corpus ID: 176707564
情報処理学会研究報告. MBL, [モバイルコンピューティングとユビキタス通信研究会研究報告]; 2010-MBL-56-1 情報処理学会研究報告. ITS, [高度交通システム]; 2010-ITS-43-1
2010
2010
TimeTable.Locky: nation wide WiFi location information system based on user contributed information
Motoki Yano
,
Katsuhiko Kaji
,
Nobuo Kawaguchi
International Workshop on Location and the Web
2010
Corpus ID: 24334748
We introduce an iPhone / iPod touch timetable application using WiFi location system named "Eki.Locky". This application adopts…
Expand
2008
2008
Locky. jp : 無線LANを用いた位置情報ポータルとその応用
河口 信夫
2008
Corpus ID: 176568317
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE