Toronto PL Recovers from Ransomware Attack

被引:0
|
作者
Enis, Matt
机构
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:6 / 7
页数:2
相关论文
共 50 条
  • [31] The impact of a ransomware cyber attack on a breast cancer center.
    Harvey, Harry
    Joyce, Ronan
    Rock, Kathy
    Browne, Tara Jane
    Bennett, Michael William
    O'Connell, Fionnuala
    Feeley, Linda
    Barry, Josephine
    Ryan, Max F.
    Murphy, Rose
    Smiddy, Pauline
    O'Connell, Cora
    O'Sullivan, Martin
    Kelly, Louise
    O'Hanlon, Deirdre
    Corrigan, Mark
    Redmond, Henry Paul
    Connolly, Roisin M.
    O'Reilly, Seamus
    JOURNAL OF CLINICAL ONCOLOGY, 2022, 40 (16)
  • [32] Ransomware Behavior Attack Construction via Graph Theory Approach
    Rosli, Muhammad Safwan
    Abdullah, Raihana Syahirah
    Yassin, Warusia
    Faizal, M. A.
    Zaki, Wan Nur Fatihah Wan Mohd
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 487 - 496
  • [33] A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook
    Alqahtani, Abdullah
    Sheldon, Frederick T.
    SENSORS, 2022, 22 (05)
  • [34] The aftermath of a crypto-ransomware attack at a large academic institution
    Zhang-Kennedy, Leah
    Assal, Hala
    Rocheleau, Jessica
    Mohamed, Reham
    Baig, Khadija
    Chiasson, Sonia
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1061 - 1078
  • [35] From "Incel" to "Saint": Analyzing the violent worldview behind the 2018 Toronto attack
    Baele, Stephane J.
    Brace, Lewys
    Coan, Travis G.
    TERRORISM AND POLITICAL VIOLENCE, 2021, 33 (08) : 1667 - 1691
  • [36] Commodity market exposure to energy-firm distress: Evidence from the Colonial Pipeline ransomware attack
    Goodell, John W.
    Corbet, Shaen
    FINANCE RESEARCH LETTERS, 2023, 51
  • [37] Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations
    Wang, Cheng
    Redino, Christopher
    Clark, Ryan
    Rahman, Abdul
    Aguinaga, Sal
    Murli, Sathvik
    Nandakumar, Dhruv
    Rao, Roland
    Huang, Lanxiao
    Radke, Daniel
    Bowen, Edward
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 262 - 269
  • [38] Limits of I/O Based Ransomware Detection: An Imitation Based Attack
    Zhou, Chijin
    Guo, Lihua
    Hou, Yiwei
    Ma, Zhenya
    Zhang, Quan
    Wang, Mingzhe
    Liu, Zhe
    Jiang, Yu
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2584 - 2601
  • [39] On Ransomware Family Attribution Using Pre-Attack Paranoia Activities
    Molina, Ricardo Misael Ayala
    Torabi, Sadegh
    Sarieddine, Khaled
    Bou-Harb, Elias
    Bouguila, Nizar
    Assi, Chadi
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01): : 19 - 36
  • [40] Regional Impacts on Digital Health Information Exchange During a Ransomware Attack
    Dameff, C.
    Kahl, N.
    Kwan, B.
    Castillo, E.
    Killen, J.
    Tully, J.
    Chan, T.
    ANNALS OF EMERGENCY MEDICINE, 2023, 82 (04) : S184 - S184