{"id":"https://openalex.org/W4237332204","doi":"https://doi.org/10.23919/icact.2018.8323682","title":"The dynamic analysis of WannaCry ransomware","display_name":"The dynamic analysis of WannaCry ransomware","publication_year":2018,"publication_date":"2018-02-01","ids":{"openalex":"https://openalex.org/W4237332204","doi":"https://doi.org/10.23919/icact.2018.8323682"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2018.8323682","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323682","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038738213","display_name":"Da\u2010Yu Kao","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Da-Yu Kao","raw_affiliation_strings":["Department of Information Management, Central Police University, Taoyuan City, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taoyuan City, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074230668","display_name":"Shou-Ching Hsiao","orcid":null},"institutions":[{"id":"https://openalex.org/I2801834177","display_name":"Taipei City Government","ror":"https://ror.org/02eqw3q87","country_code":"TW","type":"government","lineage":["https://openalex.org/I2801834177"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shou-Ching Hsiao","raw_affiliation_strings":["Haishan Precinct, New Taipei City Police Department, New Taipei City, Taiwan"],"affiliations":[{"raw_affiliation_string":"Haishan Precinct, New Taipei City Police Department, New Taipei City, Taiwan","institution_ids":["https://openalex.org/I2801834177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038738213"],"corresponding_institution_ids":["https://openalex.org/I143545923"],"apc_list":null,"apc_paid":null,"fwci":4.6008,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.96190476,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"159","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9666836261749268},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8819411396980286},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.7251526117324829},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7085195183753967},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6662987470626831},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5809708833694458},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.5484708547592163},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4661860167980194},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.4534469246864319},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4521191716194153},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07007536292076111}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9666836261749268},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8819411396980286},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.7251526117324829},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7085195183753967},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6662987470626831},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5809708833694458},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.5484708547592163},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4661860167980194},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.4534469246864319},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4521191716194153},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07007536292076111},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2018.8323682","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323682","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1493503294","https://openalex.org/W2307930854","https://openalex.org/W2461373307","https://openalex.org/W2504389695","https://openalex.org/W2517042543","https://openalex.org/W2520494781","https://openalex.org/W2556954913","https://openalex.org/W2563150099"],"related_works":["https://openalex.org/W3214090987","https://openalex.org/W2768892939","https://openalex.org/W2469507153","https://openalex.org/W2964256930","https://openalex.org/W2008790809","https://openalex.org/W2134874482","https://openalex.org/W4285507391","https://openalex.org/W2397240470","https://openalex.org/W2602767565","https://openalex.org/W170652726"],"abstract_inverted_index":{"The":[0,60,122],"global":[1],"ransomware":[2,65],"cyberattacks":[3],"cripples":[4],"the":[5,10,31,39,45,135],"national":[6],"hospital":[7],"system":[8],"across":[9],"United":[11],"Kingdom,":[12],"and":[13,18,69,96,133],"causes":[14],"waves":[15],"of":[16,35,63,74],"appointments":[17],"operations":[19],"to":[20,28,79,109,130],"be":[21],"cancelled.":[22],"Similar":[23],"attacking":[24],"methods":[25],"have":[26],"come":[27],"sweep":[29],"over":[30],"world.":[32],"Such":[33],"trend":[34],"highprofile":[36],"cyberattack":[37],"sheds":[38],"lights":[40],"on":[41,100,126],"rapid":[42],"defence":[43],"through":[44],"malware":[46,52,86,105],"information":[47,87,137],"sharing":[48,88],"platform.":[49],"A":[50],"complete":[51],"analysis":[53,62],"process":[54],"is":[55,83,140],"quite":[56],"a":[57],"time-consuming":[58],"campaign.":[59],"dynamic":[61],"WannaCry":[64],"explores":[66],"behavioural":[67],"indicators":[68],"extracts":[70],"important":[71],"IOCs":[72,118],"(Indicators":[73],"Compromise).":[75],"Utilizing":[76],"Yara":[77],"tool":[78],"create":[80],"customized":[81],"patterns":[82],"useful":[84],"for":[85],"mechanism.":[89],"Also,":[90],"such":[91],"mechanism":[92],"help":[93],"reduce":[94],"time":[95],"human":[97],"resource":[98],"spent":[99],"detecting":[101],"or":[102],"finding":[103],"similar":[104],"families.":[106],"We":[107],"aim":[108],"generate":[110],"effective":[111],"cyber":[112],"threat":[113],"intelligence":[114],"by":[115],"formulating":[116],"collected":[117],"into":[119],"structured":[120],"formations.":[121],"positive":[123],"effects":[124],"show":[125],"immediate":[127],"defensive":[128],"response":[129],"security":[131,138],"breaches,":[132],"meanwhile":[134],"integrated":[136],"protection":[139],"consolidated.":[141]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
