Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

TeslaCrypt

TeslaCrypt was a ransomware trojan. It is now defunct, and its master key released by the developers. A free decryption tool is available on the web… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian… Expand
  • table I
  • figure 2
  • table II
  • table III
  • figure 3
Is this relevant?
2019
2019
Abstract Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such… Expand
Is this relevant?
2019
2019
Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users and companies, but what is… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
2018
2018
Bilisim teknolojilerinde yasanan hizli gelismeler internet kullanicilarinin hayatinda pek cok seyi kolaylastirmisken, kotu… Expand
Is this relevant?
2018
2018
Security experts observed between 2015 and 2017 an exponential increase in the number of advanced threats via ransomware, They… Expand
  • figure 3
  • figure 2
  • figure 4
  • table I
  • figure 10
Is this relevant?
2017
2017
During the year 2016, ransomware continued to spread panic throughout the world. Kaspersky reported that, between January and… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 10
Is this relevant?
2017
2017
This paper contains an analysis of the payload of the popular ransomware for Windows, Android, Linux, and MacOSX platforms… Expand
  • figure 2
Is this relevant?
Review
2017
Review
2017
We present in this work an economic analysis of ransomware, with relevant data from Cryptolocker, CryptoWall, TeslaCrypt and… Expand
Is this relevant?
2016
2016
Malware evaluation is a key factor in security. It supposed to be safe and accurate. The contemporary malware is very… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?