(1)
Detection of Ransomware Attacks Using Processor and Disk Usage Data. ijmrr 2025, 15 (2s), 363-370.