publication . Preprint . 2018

RAPTOR: Ransomware Attack PredicTOR

Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina;
Open Access English
  • Published: 05 Mar 2018
Comment: 20 pages
free text keywords: Computer Science - Cryptography and Security
Related Organizations
Download from
19 references, page 1 of 2

1. Securelist: It threat evolution q1 2017. statistics. (2017) Accessed: 2018-02-16.

2. Kryptoslogic: Wannacry: Two weeks and 16 million averted ransoms later. (2017) Accessed: 2018-02-16.

3. Hao, S., Kantchelian, A., Miller, B., Paxson, V., Feamster, N.: Predator: Proactive recognition and elimination of domain abuse at time-of-registration. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM (2016) 1568{1579 [OpenAIRE]

4. Coull, S.E., White, A.M., Yen, T.F., Monrose, F., Reiter, M.K.: Understanding domain registration abuses. In: IFIP International Information Security Conference, Springer (2010) 68{79 [OpenAIRE]

5. Alrwais, S.A., Yuan, K., Alowaisheq, E., Li, Z., Wang, X.: Understanding the dark side of domain parking. In: USENIX Security. (2014) 207{222

6. Szurdi, J., Kocso, B., Cseh, G., Spring, J., Felegyhazi, M., Kanich, C.: The long" taile" of typosquatting domain names. In: USENIX Security. (2014) 191{206

7. Agten, P., Joosen, W., Piessens, F., Nikiforakis, N.: Seven months' worth of mistakes: A longitudinal study of typosquatting abuse. In: Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015), Internet Society (2015) [OpenAIRE]

8. Felegyhazi, M., Kreibich, C., Paxson, V.: On the potential of proactive domain blacklisting. LEET 10 (2010) 6{6

9. Hao, S., Thomas, M., Paxson, V., Feamster, N., Kreibich, C., Grier, C., Hollenbeck, S.: Understanding the domain registration behavior of spammers. In: Proceedings of the 2013 conference on Internet measurement conference, ACM (2013) 63{76

10. Lendasse, A., De Bodt, E., Wertz, V., Verleysen, M.: Non-linear nancial time series forecasting-application to the bel 20 stock market index. European Journal of Economic and Social Systems 14(1) (2000) 81{91

11. Chakraborty, P., Khadivi, P., Lewis, B., Mahendiran, A., Chen, J., Butler, P., Nsoesie, E.O., Mekaru, S.R., Brownstein, J.S., Marathe, M.V., et al.: Forecasting a moving target: Ensemble models for ili case count predictions. In: Proceedings of the 2014 SIAM international conference on data mining, SIAM (2014) 262{270 [OpenAIRE]

12. Shumway, R.H., Sto er, D.S.: Time series analysis and its applications: with R examples. Springer Science & Business Media (2010)

13. Box-Ste ensmeier, J.M., Freeman, J.R., Hitt, M.P., Pevehouse, J.C.: Time series analysis for the social sciences. Cambridge University Press (2014)

14. Box, G.E., Jenkins, G.M., Reinsel, G.C., Ljung, G.M.: Time series analysis: forecasting and control. John Wiley & Sons (2015)

15. Prado, R., West, M.: Time series: modeling, computation, and inference. CRC Press (2010)

19 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue