[1]
K. Zirari, H. K. Idrissi, A. El-Yahyaoui, H. Bensaid, and A. En-Nouaary, “Deciphering Ransomware: Strategic API Usage and Behavioral Patterns for Advanced Detection Techniques”, Int. J. Interact. Mob. Technol., vol. 19, no. 10, pp. pp. 199–221, May 2025.