1 |
Definition of Ransomware, https://www.krcert.or.kr/ransomware/information.do
|
2 |
AhnLab, "WannaCryptor Ransomware Analysis," ASEC Tech Report, https://www.ahnlab.com/
|
3 |
KISA, "WannaCry Analysis Special Report," KrCERT Report, https://www.krcert.or.kr/
|
4 |
Cliff C. Zou, Don Towsley, and Weibo Gong, "On the Performance of Internet Worm Scanning Strategies," Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp. 700-723, Jul. 2006.
DOI
|
5 |
Weon Shin, "Mobile Worm Propagation in Analysis on Heterogeneous Mobile Networks," Telecommunications Review, vol. 23, no. 2, pp. 224-234, Apr. 2013.
|
6 |
Prevent a worm by updating Remote Desktop Services (CVE-2019-0708), https://msrc-blog.microsoft.com/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
|
7 |
VIPRE Labs, "Wannacry Technical Analysis," https://labs.vipre.com/wannacry-technical-analysis/
|
8 |
Cliff C. Zou, Weibo Gong, and Don Towsley, "Code Red Worm Propagation Modeling and Analysis," in Proceedings of the 9th ACM conference on Computer and communications security, pp.138-147, Nov. 2002.
|