Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,920,989 papers from all fields of science
Search
Sign In
Create Free Account
TeslaCrypt
TeslaCrypt was a ransomware trojan. It is now defunct, and its master key released by the developers. A free decryption tool is available on the web…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Adobe Flash
Bitcoin
CryptoLocker
Cryptovirology
Expand
Broader (1)
Malware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
Sajad Homayoun
,
A. Dehghantanha
,
+4 authors
D. E. Newton
Future generations computer systems
2019
Corpus ID: 52901105
2019
2019
Behaviour Based Ransomware Detection
C. Chew
,
Vimal Kumar
International Conference on Computers and Their…
2019
Corpus ID: 88499430
Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users and companies, but what is…
Expand
2018
2018
TESLACRYPT FİDYE YAZILIM VİRÜSÜNÜN TESPİTİ, TEKNİK ANALİZİ VE ÇÖZÜMÜ
I. Kara
2018
Corpus ID: 194681735
Bilisim teknolojilerinde yasanan hizli gelismeler internet kullanicilarinin hayatinda pek cok seyi kolaylastirmisken, kotu…
Expand
2018
2018
Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt
Yassine Lemmou
,
E. M. Souidi
International Conference on Cyber Security And…
2018
Corpus ID: 54450094
Security experts observed between 2015 and 2017 an exponential increase in the number of advanced threats via ransomware, They…
Expand
Highly Cited
2018
Highly Cited
2018
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
Sajad Homayoun
,
A. Dehghantanha
,
Marzieh Ahmadzadeh
,
S. Hashemi
,
R. Khayami
IEEE Transactions on Emerging Topics in Computing
2018
Corpus ID: 37234994
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian…
Expand
2017
2017
PrincessLocker analysis
Yassine Lemmou
,
E. M. Souidi
International Conference on Cyber Security And…
2017
Corpus ID: 23586093
During the year 2016, ransomware continued to spread panic throughout the world. Kaspersky reported that, between January and…
Expand
Review
2017
Review
2017
Economic Analysis of Ransomware
J. Hernandez-Castro
,
E. Cartwright
,
Anna Stepanova
ArXiv
2017
Corpus ID: 8794966
We present in this work an economic analysis of ransomware, with relevant data from Cryptolocker, CryptoWall, TeslaCrypt and…
Expand
2017
2017
The state of ransomware. Trends and mitigation techniques
A. Adamov
,
Anders Carlsson
East-West Design & Test Symposium
2017
Corpus ID: 29113653
This paper contains an analysis of the payload of the popular ransomware for Windows, Android, Linux, and MacOSX platforms…
Expand
2016
2016
Developing malware evaluation infrastructure
Krzysztof Cabaj
,
P. Gawkowski
,
K. Grochowski
,
Amadeusz Kosik
Conference on Computer Science and Information…
2016
Corpus ID: 16209263
Malware evaluation is a key factor in security. It supposed to be safe and accurate. The contemporary malware is very…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE