1.
Detection of Ransomware Attacks Using Processor and Disk Usage Data. ijmrr [Internet]. 2025 Apr. 25 [cited 2026 Apr. 6];15(2s):363-70. Available from: https://ijmrr.com/index.php/ijmrr/article/view/80