1 |
Microsoft, Microsoft Security Intelligence Report Vol. 24, [Internet]. Available: https://info.microsoft.com/ww-landing-M365-SIR-v24-Report-eBook.html?lcid=en-us
|
2 |
IBM, IBM X-Force Threat Intelligence Index 2019, [Internet]. Available: https://xforceintelligenceindex.mybluemix.net/
|
3 |
S. Kim, J. Yoo, "A Study on Prediction of Malicious Code Infection Websites Using Markov Chain", Journal of Security Engineering, Vol.14, No.1, pp. 9-20, 2017.
DOI
|
4 |
H. W. Hethcote, "The Mathematics of Infectious Diseases", SIAM Review, vol. 42, No. 4, pp.599-653, 2000.
DOI
|
5 |
Y. Wang, S. Wen, Y. Xiang, and W. Zhou, "Modeling the Propagation of Worms in Networks: A Survey", IEEE Communications Surveys and Tutorials, Vol. 16, Issue 2, pp. 942-960, 2014.
DOI
|
6 |
J. D. Murray, Mathematical Biology, Springer International Publishing, 1993.
|
7 |
W. Shin, "A Study on the Spread and Responses of Mobile Worms by Wireless Network Environments", Journal of Korea Institute of Information and Communication Engineering, vol. 10, No. 4, pp.429-440, 2013.
|
8 |
C. C. Zou, W. Gong, D. Towsley. "Code Red Worm Propagation Modeling and Analysis", in Proceedings of the 9th ACM conference on Computer and communications security, pp.138-147, 2002.
|
9 |
Microsoft Security Response Center, Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) [Internet]. Available: https://msrc-blog.microsoft.com/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
|
10 |
AhnLab ASEC, "WannaCryptor Ransomware Analysis", AhnLab, Analysis Report, 2017.
|
11 |
KISA KrCERT, WannaCry Analysis Special Report [Internet]. Available:, https://www.krcert.or.kr/data/reportView.do?bulletin_writing_sequence=26747
|
12 |
T. H. Park, K. B. Kim and W. Shin, "A Prediction Model for the Spread of WannaCryptor Ransomware," in Proceeding of Conference on Information Security and Cryptography-Summer 2019, Busan, pp. 204-208, 2019.
|