1.
Detection of Ransomware Attacks Using Processor and Disk Usage Data. ijmrr. 2025;15(2s):363-370. Accessed December 8, 2025. https://ijmrr.com/index.php/ijmrr/article/view/80