Now 93 visitors
Today:1407 Yesterday:1624
Total: 3266 244S 58P 13R
2025-11-05, Week 45
TACT Journal Page
Call for Paper
Author Homepage
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















Paper Number Author:
Paper Title
Keyword
Q&A Number **Select your question number !!
Questioner eMail:
Question
Answer
by
Author
Save Q&A

* Edit or answer any Q&A by selecting Q&A number Hyper Link below + Write button (Save)
ICACT20210206 Question.1
Questioner: abdulfuadrahman@gmail.com    2021-02-09 ¿ÀÈÄ 12:07:55
ICACT20210206 Answer.1
Answer by Auhor kbchawal@kmitl.ac.th   2021-02-09 ¿ÀÈÄ 12:07:55
Chrome Click!!
Thank you for the slide. May I know what is the programming language that is used for this algorithm implementation? Thank you for the question, for this research, I used python 3.9.
ICACT20210206 Question.2
Questioner: James_Lan@htx.gov.sg    2021-02-09 ¿ÀÈÄ 12:40:21
ICACT20210206 Answer.2
Answer by Auhor kbchawal@kmitl.ac.th   2021-02-09 ¿ÀÈÄ 12:40:21
Chrome Click!!
Hi, thanks for the sharing. As the program uses python then is it assumed the victim has the required python program and library installed? if not, what are your views on the programming binary suitable for ransomware encryption/decryption? Thanks. Thank you for your question. In this research the target OS is Windows, therefore, the program is designed for Windows users only. I used Pyinstaller to convert the program and all its dependencies (libraries) to make a .exe file for this program. which then can be run on almost every version of Windows that is still in use without the prior installation of python or any of its dependencies. thank you.
ICACT20210206 Question.3
Questioner: kb090839@gmail.com    2021-02-09 ¿ÀÈÄ 2:19:39
ICACT20210206 Answer.3
Answer by Auhor kbchawal@kmitl.ac.th   2021-02-09 ¿ÀÈÄ 2:19:39
Chrome Click!!
How about the results of the accuracy? Thank you for your question. we have uploaded our ransomware sample to Virustotal.com and it was detected as malicious by 2 out of 72 antivirus engines on Virustotal which are Secure age apex and Cynet.
ICACT20210206 Question.4
Questioner: attempto.mail@gmail.com    2021-02-09 ¿ÀÈÄ 2:24:16
ICACT20210206 Answer.4
Answer by Auhor kbchawal@kmitl.ac.th   2021-02-09 ¿ÀÈÄ 2:24:16
Chrome Click!!
why did you choose AES algorithm? Thank you for your question. Because AES is symmetric key encryption that requires less computational power than an asymmetric one and AES is considered the most secure and robust algorithm in the present.