Enhanced Dooley Graphs for Modeling, Analyzing, and Attributing Ransomware Attack

Submitted by Katie Dey on

Applying computation to cyber challenges requires a way to represent the attack so that a computer can reason about it. Ransomware attacks differ from many other cyber-attacks in the interaction between perpetrator and victim. It requires the victim to know that he is under attack, interact deliberately with the attacker, and collaborate to determine the outcome of the attack.

Subscribe to