[1]
K. Sri Vayuputra and D. K.V.D Kiran, “Study and analyze the locky ransomware using malware analysis techniques”, IJET, vol. 7, no. 2.7, pp. 225–229, Mar. 2018, doi: 10.14419/ijet.v7i2.7.10585.