1.
Detection of Ransomware Attacks Using Processor and Disk Usage Data. ijmrr. 2025;15(2s):363-370. Accessed April 4, 2026. https://ijmrr.com/index.php/ijmrr/article/view/80