Academic literature on the topic 'Wannacry'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wannacry.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wannacry"

1

Harisen, Amien. "Ransomware 101: Understanding the Business Model." ACMIT Proceedings 4, no. 1 (2017): 18–22. http://dx.doi.org/10.33555/acmit.v4i1.53.

Full text
Abstract:
WannaCrypt Ransom ware outbreak in 2017 shocked everyone in the term of the spreading and damage it caused. WannaCry Ransomware keep us reminded that the impact of ransomware attack is devastating and costly. Crypto Wall alone racked up around $324 million in 2016 (Trend Micro, 2016), while WannaCry tally not yet to be confirmed, since its spreading in 150 countries including Indonesia within its infection spreading in 2017. Since its modern outbreak in 2014, ransomware produce one word to the cybercriminal operator, profit. In this paper, we will breakdown how the ransomware works, the histor
APA, Harvard, Vancouver, ISO, and other styles
2

Miranda, Marise, Americo Talarico, Bruno Sena, et al. "Outsmating Malware: Using AI to Combat WannaCry." Sptech World Journal V04, Edition 004 (2024): 24. https://doi.org/10.5281/zenodo.10633020.

Full text
Abstract:
<strong>Cybersecurity threats like WannaCry are constantly evolving, leaving traditional defenses struggling to keep up. This research explores a powerful new weapon: Artificial Intelligence (AI). Using Bayesian Networks, a type of AI, we developed a method that detects WannaCry with 67.47% accuracy, outperforming traditional signature-based approaches. But this is just the beginning. Our AI model can learn and adapt, making it effective against even unknown malware, offering a crucial advantage in the ever-changing cybersecurity landscape.</strong> <strong>Keywords: <strong>AI-powered detecti
APA, Harvard, Vancouver, ISO, and other styles
3

Sajan, Dr Priya P. "A Comprehensive Analysis of WannaCry Ransomware." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37242.

Full text
Abstract:
WannaCry, a notorious ransomware strain that emerged in May 2017, quickly gained global attention due to its significant impact on both private and public sectors. This ransomware encrypted victims' files and demanded a Bitcoin ransom for their release, causing extensive disruption. Exploiting a vulnerability in Microsoft Windows' SMB protocol, known as "EternalBlue" (CVE-2017-0144), WannaCry spread rapidly across networks without user interaction. Notably, it severely affected the UK's National Health Service (NHS), disrupting healthcare services. The WannaCry attack highlighted critical cybe
APA, Harvard, Vancouver, ISO, and other styles
4

Osamor, Jude, Jane Odum, Celestine Iwendi, et al. "Ethical Implications of WannaCry: A Cybersecurity Dilemma." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 354–60. https://doi.org/10.34190/iccws.20.1.3353.

Full text
Abstract:
The WannaCry ransomware attack of May 2017 marked a critical turning point in cybersecurity history, prompting profound ethical discussions about software vulnerability management. This comprehensive analysis examines the ethical dimensions of the WannaCry incident, focusing on the responsibilities of government agencies, technology companies, and security professionals in handling zero-day vulnerabilities. The study investigates the complex balance between national security interests and global cybersecurity while proposing ethical frameworks for future practice. Through a detailed examinatio
APA, Harvard, Vancouver, ISO, and other styles
5

Akbanov, Maxat, Vassilios G. Vassilakis, and Michael D. Logothetis. "WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms." Journal of Telecommunications and Information Technology 1 (March 29, 2019): 113–24. http://dx.doi.org/10.26636/jtit.2019.130218.

Full text
Abstract:
In recent years, we have been experiencing fast proliferation of different types of ransomware targeting home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that received significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware. Dynamic analysis techniques are typically used to achieve
APA, Harvard, Vancouver, ISO, and other styles
6

Singgam, Pritiy, Afifah Naila Nasution, and Pedro Stella Mario Meyar Waruwu. "Utilizing Capa in Kali Linux for Wannacry Malware Identification and Analysis." AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia 4, no. 1 (2024): 1242–45. https://doi.org/10.57235/aurelia.v4i1.4775.

Full text
Abstract:
Purpose: This study aims to analyze the WannaCry ransomware using Kali Linux and the Common Access Platform Assistant (CAPA) method to provide a deeper understanding of the malware's attack tactics, capabilities, and behaviors. Methods/Study design/approach: The research was conducted by installing CAPA version 7.4.0 downloaded from GitHub, followed by file extraction and access permission configuration. The WannaCry malware was obtained from the "thezoo" repository on GitHub, extracted, and analyzed using CAPA commands in the Linux terminal. The analysis results were presented in tables showi
APA, Harvard, Vancouver, ISO, and other styles
7

Adams, Chris. "Learning the lessons of WannaCry." Computer Fraud & Security 2018, no. 9 (2018): 6–9. http://dx.doi.org/10.1016/s1361-3723(18)30084-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aminot, Jean-Luc. "WannaCry, une frayeur à l’échelle planétaire." Annales des Mines - Responsabilité et environnement N°98, no. 2 (2020): 53. http://dx.doi.org/10.3917/re1.098.0053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mewis, Dirk. "IT-Sicherheitslücken: Cybercrime in deutschen Krankenhäusern." kma - Klinik Management aktuell 22, no. 10 (2017): 53–56. http://dx.doi.org/10.1055/s-0036-1594863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Turner, Adam B., Stephen McCombie, and Allon J. Uhlmann. "A target-centric intelligence approach to WannaCry 2.0." Journal of Money Laundering Control 22, no. 4 (2019): 646–65. http://dx.doi.org/10.1108/jmlc-01-2019-0005.

Full text
Abstract:
Purpose This paper aims to demonstrate the utility of a target-centric approach to intelligence collection and analysis in the prevention and investigation of ransomware attacks that involve cryptocurrencies. The paper uses the May 2017 WannaCry ransomware usage of the Bitcoin ecosystem as a case study. The approach proves particularly beneficial in facilitating information sharing and an integrated analysis across intelligence domains. Design/methodology/approach This study conducted data collection and analysis of the component Bitcoin elements of the WannaCry ransomware attack. A note of bo
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wannacry"

1

Nilsson, Anton. "Att hindra en Notpetya- och WannaCry-attack : Redogörelse med förebyggande metoder och tekniker." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16288.

Full text
Abstract:
WannaCry och NotPetya är två ransomware-program som använder sig av National Security Agency (NSA) läckta penetreringsverktyg EternalBlue för att få operativsystemsbehörighet över ett Windowssystem som tillåter kommunikation med dess Service Message Block (SMB) server. WannaCry och NotPetya utnyttjar detta genom att söka igenom systemets alla lagringsmedier efter användarfiler och krypterar sedan dessa med både symmetriska och asymmetriska krypteringsalgoritmer. För att få tillgång till den nyckel som används för att dekryptera filerna krävs det att offret betalar förövaren en specifik summa,
APA, Harvard, Vancouver, ISO, and other styles
2

Šrubař, Michal. "Analýza síťové komunikace Ransomware." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363782.

Full text
Abstract:
The focus of this work is crypto-ransomware; a variant of malware, an analysis of this malware&#8217;s network communication, and the identification of means by which it may be detected in the network. The thesis describes the methodology and environment in which the malware&#8217;s network communications were studied. The first part of the thesis provides a network traffic analysis of this type of malware with a focus on HTTP and DNS communication, including anomalies that can be observed in the network during this malware&#8217;s activity. The thesis also includes a discussion of the user be
APA, Harvard, Vancouver, ISO, and other styles
3

Wannack, Martin [Verfasser]. "Pathophysiologie der Blutbildung bei Patienten mit Thrombocytopenia absent radii (TAR)-Syndrom / Martin Wannack." Berlin : Medizinische Fakultät Charité - Universitätsmedizin Berlin, 2011. http://d-nb.info/1026068770/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wannack, Volker Verfasser], Gert [Akademischer Betreuer] [Brunekreeft, Stefan [Akademischer Betreuer] Kettemann, Dennis A. V. [Akademischer Betreuer] Dittrich, and Jörg [Akademischer Betreuer] Borrmann. "Quality Regulation for Monopolistic Electricity Distribution Network Companies: A Theoretical and Experimental Analysis within a Principal-Agent Framework / Volker Wannack. Betreuer: Gert Brunekreeft. Gutachter: Gert Brunekreeft ; Stefan Kettemann ; Dennis A. V. Dittrich ; Jörg Borrmann." Bremen : IRC-Library, Information Resource Center der Jacobs University Bremen, 2015. http://d-nb.info/1081255870/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

LI, YU-LING, and 李郁苓. "A Study of Factors Influencing Users’ Prevention and Action toward WannaCry: Protection Motivation Theory." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/su5u7u.

Full text
Abstract:
碩士<br>銘傳大學<br>企業管理學系<br>106<br>The development of Information Computer Technologies is more and more importance since the end of the 19th century. Although technological progress brings about great benefits for human, the threat of cybercrime has become an omnipresent and important issue. With the rapid development of Information Computer Technologies, Computer Virus are Continuous changing. WannaCry is a new type of Computer Virus that is not only extorting high bitcoin bitcoins through locked files, but also doubling the ransom and destroy files if it is not paid within the time limit. Wanna
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wannacry"

1

Kalita, Emi. WannaCry Ransomware Attack : Protect Yourself from WannaCry Ransomware: Cyber Risk and Cyber War. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wannacry"

1

Prevezianou, Maria F. "WannaCry as a Creeping Crisis." In Understanding the Creeping Crisis. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70692-0_3.

Full text
Abstract:
AbstractThis chapter deepens our understanding of cyber crises with the help of the creeping crisis concept. The chapter shows that although emerging technologies make malicious activities in cyberspace more sophisticated, vulnerabilities enabling such threats have been inherent in cyber assets for a very long time in the form of creeping crises. The question is: was WannaCry the acute crisis or just a precursor event to a bigger explosion? It is argued that the WannaCry ransomware attack in 2017 should be considered a wake-up call. The chapter demonstrates how the cyber threat was lurking in
APA, Harvard, Vancouver, ISO, and other styles
2

Triwahyuni, Dewi, Ismail Daffa’ Fajriansyah, Gilang Cakra Permana, Muhammad Setiawan Ikhsan, and Naufan Raid Azka. "Britain’s Strategy for Strengthening Cybersecurity Following The Wannacry Cryberattack." In Advances in Social Science, Education and Humanities Research. Atlantis Press SARL, 2025. https://doi.org/10.2991/978-2-38476-442-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oikawa, Takanori, Masahiko Takenaka, and Yuki Unno. "Analysis of Actual Propagation Behavior of WannaCry Within an Intranet (Extended Abstract)." In Advances in Networked-based Information Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vasiliev, Danja, and Daniel Irrgang. "WannaScry!" In Design. transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457603-018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reinhold, Thomas. "Wannacry About the Tragedy of the Commons? Game-theory and the Failure of Global Vulnerability Disclosure." In Technology, Peace and Security I Technologie, Frieden und Sicherheit. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43951-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Algarni, Sumaiah. "Cybersecurity Attacks: Analysis of “WannaCry” Attack and Proposing Methods for Reducing or Preventing Such Attacks in Future." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8289-9_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stirano, Federico, Francesco Lubrano, Giacomo Vitali, Fabrizio Bertone, Giuseppe Varavallo, and Paolo Petrucci. "Cross-Domain Security Asset Management for Healthcare." In Cyber-Physical Security for Critical Infrastructures Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_10.

Full text
Abstract:
AbstractHealthcare is one of the most peculiar between all Critical Infrastructures due to its context and role in the society. The characteristics of openness and pervasive usage of IT systems and connected devices make it particularly exposed to both physical threats, such as theft and unauthorized access to restricted areas, and cyber attacks, like the notorious wannacry ransomware that abruptly disrupted the British National Health System in May 2017. Even the recent COVID-19 pandemic period has been negatively characterized by an increase of both physical and cyber incidents that specific
APA, Harvard, Vancouver, ISO, and other styles
8

"Digital Terrorism and Varied Actors." In Utilization of New Technologies in Global Terror. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8876-4.ch005.

Full text
Abstract:
This chapter focuses on the new wave of global, digital terrorism and how actors are using new technologies (including creating their own applications and software) to inflict terror upon populations. Cyber warfare will also be discussed extensively in this chapter as the world has witnessed a rise in detrimental attacks such as Petya and WannaCry.
APA, Harvard, Vancouver, ISO, and other styles
9

Miller, Seumas, and Terry Bossomaier. "Public Health, Pandemics, and Cybertechnology." In Cybersecurity, Ethics, and Collective Responsibility. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780190058135.003.0006.

Full text
Abstract:
Abstract Cybertechnology has given rise to ethical and security issues in the health sector (e.g., ransomware attacks such as WannaCry). Ransomware attacks cripple hospitals causing deaths. Cybertechnology, such as phone apps and bulk health databases utilizing machine-learning techniques, is involved in controlling pandemics (e.g., COVID-19). However, there are potential moral costs, notably in terms of infringements of individual privacy and ownership rights. Here collective goods, such as public health and security, can conflict with individual rights. However, infringements of rights can b
APA, Harvard, Vancouver, ISO, and other styles
10

Perakslis, Eric D., and Martin Stanley. "Case Studies." In Digital Health. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197503133.003.0015.

Full text
Abstract:
The last decade has seen the emergence of cyberthreat and cybercrime against health care. Notable attacks have been driven by activists, cyber criminals and those seeking to sow chaos and fear. In this chapter the WannaCry cyberattack, the attack on Boston Children’s Hospital in 2014, and the recent wave of ransomware attacks against health care are detailed as case studies and opportunities for learning. Despite these and similar events, health care has yet to fully recognize and properly address cyberthreat; therefore, patients and providers remain at risk. Cybersecurity must come out of the
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wannacry"

1

Cardoso, Michael, George Cardoso, and Na Li. "A Framework of Dynamic Analysis of WannaCry." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10849243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Musluoglu, Mert, Nadezhda Kunicina, and Jelena Caiko. "Vulnerability Assessment of Industrial Control Systems for Colonial Pipeline and WannaCry Ransomware." In 2024 IEEE 65th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON). IEEE, 2024. https://doi.org/10.1109/rtucon62997.2024.10830848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chuquilla, Alejandro, Teresa Guarda, and Geovanni Ninahualpa Quina. "Ransomware - WannaCry Security is everyone's." In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019. http://dx.doi.org/10.23919/cisti.2019.8760749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hsiao, Shou-Ching, and Da-Yu Kao. "The static analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hsiao, Shou-Ching, and Da-Yu Kao. "The static analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kao, Da-Yu, and Shou-Ching Hsiao. "The dynamic analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kao, Da-Yu, and Shou-Ching Hsiao. "The dynamic analysis of WannaCry ransomware." In 2018 20th International Conference on Advanced Communications Technology (ICACT). IEEE, 2018. http://dx.doi.org/10.23919/icact.2018.8323682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rogers, Darren, and Vikram Kanth. "WannaCry Data Collection System Design and Tutorial." In MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021. http://dx.doi.org/10.1109/milcom52596.2021.9653051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Satheesh Kumar, M., Jalel Ben-Othman, and K. G. Srinivasagan. "An Investigation on Wannacry Ransomware and its Detection." In 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018. http://dx.doi.org/10.1109/iscc.2018.8538354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

KAO, Da-Yu, Shou-Ching HSIAO, and Raylin TSO. "Analyzing WannaCry Ransomware Considering the Weapons and Exploits." In 2019 21st International Conference on Advanced Communication Technology (ICACT). IEEE, 2019. http://dx.doi.org/10.23919/icact.2019.8702049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!