Cryptolock (and drop it): stopping ransomware attacks on user data

N Scaife, H Carter, P Traynor… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …

The ubiquitous digital file: A review of file management research

JD Dinneen, CA Julien - Journal of the Association for …, 2020 - Wiley Online Library
Computer users spend time every day interacting with digital files and folders, including
downloading, moving, naming, navigating to, searching for, sharing, and deleting them …

[图书][B] Personal information management

WP Jones, J Teevan - 2007 - api.taylorfrancis.com
Personal information management (PIM) refers to the practice and the study of the activities
a person performs in order to acquire or create, store, organize, maintain, retrieve, use, and …

Managing complex engineering projects: What can we learn from the evolving digital footprint?

B Hicks, S Culley, J Gopsill, C Snider - International Journal of Information …, 2020 - Elsevier
Highlights•Important management information can be automatically generated in realtime
from the evolving digital footprint of an engineering project.•Information relating to the …

RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware

F Faghihi, M Zulkernine - Computer Networks, 2021 - Elsevier
Ransomware has presented itself as one of the most critical computer threats in the past few
years. Along with the increase of user's data on portable devices, ransomware has also …

[PDF][PDF] Content Based Automated File Organization Using Machine Learning Approaches.

SA Raza, S Abbas, TM Ghazal, MA Khan… - … , Materials & Continua, 2022 - researchgate.net
In the world of big data, it's quite a task to organize different files based on their similarities.
Dealing with heterogeneous data and keeping a record of every single file stored in any …

A collaborative system for capturing and reusing in-context design knowledge with an integrated representation model

G Peng, H Wang, H Zhang, Y Zhao… - Advanced Engineering …, 2017 - Elsevier
Current research on design knowledge capture and reuse has predominantly focused on
either the codification view of knowledge or the personalisation view of knowledge, resulting …

Teacher P ersonal information management (PIM) practices: Finding, keeping, and R e‐F inding information

AR Diekema, MW Olsen - Journal of the Association for …, 2014 - Wiley Online Library
Primary and secondary (K–12) teachers form the essential core of children's formal learning
before adulthood. Even though teaching is a mainstream, information‐rich profession …

Automated File Labeling for Heterogeneous Files Organization Using Machine Learning.

S Abbas, SA Raza, MA Khan… - Computers …, 2023 - search.ebscohost.com
File labeling techniques have a long history in analyzing the anthological trends in
computational linguistics. The situation becomes worse in the case of files downloaded into …

Variables for personal information management research

O Bergman - Aslib Proceedings: New Information Perspectives, 2013 - emerald.com
Purpose–Personal information management (PIM) is an activity in which an individual stores
personal information items in order to retrieve them later on. As PIM research moves from an …