[1]
“Detection of Ransomware Attacks Using Processor and Disk Usage Data”, ijmrr, vol. 15, no. 2s, pp. 363–370, Apr. 2025, Accessed: Dec. 08, 2025. [Online]. Available: https://ijmrr.com/index.php/ijmrr/article/view/80