Academic literature on the topic 'Wannacry'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wannacry.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wannacry"
Harisen, Amien. "Ransomware 101: Understanding the Business Model." ACMIT Proceedings 4, no. 1 (2017): 18–22. http://dx.doi.org/10.33555/acmit.v4i1.53.
Full textMiranda, Marise, Americo Talarico, Bruno Sena, et al. "Outsmating Malware: Using AI to Combat WannaCry." Sptech World Journal V04, Edition 004 (2024): 24. https://doi.org/10.5281/zenodo.10633020.
Full textSajan, Dr Priya P. "A Comprehensive Analysis of WannaCry Ransomware." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37242.
Full textOsamor, Jude, Jane Odum, Celestine Iwendi, et al. "Ethical Implications of WannaCry: A Cybersecurity Dilemma." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 354–60. https://doi.org/10.34190/iccws.20.1.3353.
Full textAkbanov, Maxat, Vassilios G. Vassilakis, and Michael D. Logothetis. "WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms." Journal of Telecommunications and Information Technology 1 (March 29, 2019): 113–24. http://dx.doi.org/10.26636/jtit.2019.130218.
Full textSinggam, Pritiy, Afifah Naila Nasution, and Pedro Stella Mario Meyar Waruwu. "Utilizing Capa in Kali Linux for Wannacry Malware Identification and Analysis." AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia 4, no. 1 (2024): 1242–45. https://doi.org/10.57235/aurelia.v4i1.4775.
Full textAdams, Chris. "Learning the lessons of WannaCry." Computer Fraud & Security 2018, no. 9 (2018): 6–9. http://dx.doi.org/10.1016/s1361-3723(18)30084-8.
Full textAminot, Jean-Luc. "WannaCry, une frayeur à l’échelle planétaire." Annales des Mines - Responsabilité et environnement N°98, no. 2 (2020): 53. http://dx.doi.org/10.3917/re1.098.0053.
Full textMewis, Dirk. "IT-Sicherheitslücken: Cybercrime in deutschen Krankenhäusern." kma - Klinik Management aktuell 22, no. 10 (2017): 53–56. http://dx.doi.org/10.1055/s-0036-1594863.
Full textTurner, Adam B., Stephen McCombie, and Allon J. Uhlmann. "A target-centric intelligence approach to WannaCry 2.0." Journal of Money Laundering Control 22, no. 4 (2019): 646–65. http://dx.doi.org/10.1108/jmlc-01-2019-0005.
Full textDissertations / Theses on the topic "Wannacry"
Nilsson, Anton. "Att hindra en Notpetya- och WannaCry-attack : Redogörelse med förebyggande metoder och tekniker." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16288.
Full textŠrubař, Michal. "Analýza síťové komunikace Ransomware." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363782.
Full textWannack, Martin [Verfasser]. "Pathophysiologie der Blutbildung bei Patienten mit Thrombocytopenia absent radii (TAR)-Syndrom / Martin Wannack." Berlin : Medizinische Fakultät Charité - Universitätsmedizin Berlin, 2011. http://d-nb.info/1026068770/34.
Full textWannack, Volker Verfasser], Gert [Akademischer Betreuer] [Brunekreeft, Stefan [Akademischer Betreuer] Kettemann, Dennis A. V. [Akademischer Betreuer] Dittrich, and Jörg [Akademischer Betreuer] Borrmann. "Quality Regulation for Monopolistic Electricity Distribution Network Companies: A Theoretical and Experimental Analysis within a Principal-Agent Framework / Volker Wannack. Betreuer: Gert Brunekreeft. Gutachter: Gert Brunekreeft ; Stefan Kettemann ; Dennis A. V. Dittrich ; Jörg Borrmann." Bremen : IRC-Library, Information Resource Center der Jacobs University Bremen, 2015. http://d-nb.info/1081255870/34.
Full textLI, YU-LING, and 李郁苓. "A Study of Factors Influencing Users’ Prevention and Action toward WannaCry: Protection Motivation Theory." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/su5u7u.
Full textBooks on the topic "Wannacry"
Kalita, Emi. WannaCry Ransomware Attack : Protect Yourself from WannaCry Ransomware: Cyber Risk and Cyber War. Independently Published, 2017.
Find full textBook chapters on the topic "Wannacry"
Prevezianou, Maria F. "WannaCry as a Creeping Crisis." In Understanding the Creeping Crisis. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70692-0_3.
Full textTriwahyuni, Dewi, Ismail Daffa’ Fajriansyah, Gilang Cakra Permana, Muhammad Setiawan Ikhsan, and Naufan Raid Azka. "Britain’s Strategy for Strengthening Cybersecurity Following The Wannacry Cryberattack." In Advances in Social Science, Education and Humanities Research. Atlantis Press SARL, 2025. https://doi.org/10.2991/978-2-38476-442-6_12.
Full textOikawa, Takanori, Masahiko Takenaka, and Yuki Unno. "Analysis of Actual Propagation Behavior of WannaCry Within an Intranet (Extended Abstract)." In Advances in Networked-based Information Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_54.
Full textVasiliev, Danja, and Daniel Irrgang. "WannaScry!" In Design. transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457603-018.
Full textReinhold, Thomas. "Wannacry About the Tragedy of the Commons? Game-theory and the Failure of Global Vulnerability Disclosure." In Technology, Peace and Security I Technologie, Frieden und Sicherheit. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43951-4_12.
Full textAlgarni, Sumaiah. "Cybersecurity Attacks: Analysis of “WannaCry” Attack and Proposing Methods for Reducing or Preventing Such Attacks in Future." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8289-9_73.
Full textStirano, Federico, Francesco Lubrano, Giacomo Vitali, Fabrizio Bertone, Giuseppe Varavallo, and Paolo Petrucci. "Cross-Domain Security Asset Management for Healthcare." In Cyber-Physical Security for Critical Infrastructures Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_10.
Full text"Digital Terrorism and Varied Actors." In Utilization of New Technologies in Global Terror. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8876-4.ch005.
Full textMiller, Seumas, and Terry Bossomaier. "Public Health, Pandemics, and Cybertechnology." In Cybersecurity, Ethics, and Collective Responsibility. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780190058135.003.0006.
Full textPerakslis, Eric D., and Martin Stanley. "Case Studies." In Digital Health. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197503133.003.0015.
Full textConference papers on the topic "Wannacry"
Cardoso, Michael, George Cardoso, and Na Li. "A Framework of Dynamic Analysis of WannaCry." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10849243.
Full textMusluoglu, Mert, Nadezhda Kunicina, and Jelena Caiko. "Vulnerability Assessment of Industrial Control Systems for Colonial Pipeline and WannaCry Ransomware." In 2024 IEEE 65th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON). IEEE, 2024. https://doi.org/10.1109/rtucon62997.2024.10830848.
Full textChuquilla, Alejandro, Teresa Guarda, and Geovanni Ninahualpa Quina. "Ransomware - WannaCry Security is everyone's." In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019. http://dx.doi.org/10.23919/cisti.2019.8760749.
Full textHsiao, Shou-Ching, and Da-Yu Kao. "The static analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323679.
Full textHsiao, Shou-Ching, and Da-Yu Kao. "The static analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323680.
Full textKao, Da-Yu, and Shou-Ching Hsiao. "The dynamic analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323681.
Full textKao, Da-Yu, and Shou-Ching Hsiao. "The dynamic analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323682.
Full textRogers, Darren, and Vikram Kanth. "WannaCry Data Collection System Design and Tutorial." In MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021. http://dx.doi.org/10.1109/milcom52596.2021.9653051.
Full textSatheesh Kumar, M., Jalel Ben-Othman, and K. G. Srinivasagan. "An Investigation on Wannacry Ransomware and its Detection." In 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018. http://dx.doi.org/10.1109/iscc.2018.8538354.
Full textKAO, Da-Yu, Shou-Ching HSIAO, and Raylin TSO. "Analyzing WannaCry Ransomware Considering the Weapons and Exploits." In 2019 21st International Conference on Advanced Communication Technology (ICACT). IEEE, 2019. http://dx.doi.org/10.23919/icact.2019.8702049.
Full text