Contingency Planning: Can You Handle a Ransomware Attack?

被引:0
|
作者
Ma, T. [1 ]
Siochi, R. [2 ]
Donaghue, J. [3 ]
Tallhamer, M. [4 ]
机构
[1] Virginia Commonwealth Univ, Richmond, VA 23284 USA
[2] West Virginia Univ, Morgantown, WV 26506 USA
[3] Cleveland Clinc Fairview, Weston, FL 02142 USA
[4] Centura Hlth, Centennial, CA USA
关键词
D O I
暂无
中图分类号
R8 [特种医学]; R445 [影像诊断学];
学科分类号
1002 ; 100207 ; 1009 ;
摘要
TH-AB-BRB-
引用
收藏
页码:E566 / E567
页数:2
相关论文
共 50 条
  • [31] You Can Handle the Truth: Mispredicting the Consequences of Honest Communication
    Levine, Emma E.
    Cohen, Taya R.
    JOURNAL OF EXPERIMENTAL PSYCHOLOGY-GENERAL, 2018, 147 (09) : 1400 - 1429
  • [32] Lithium Battery Risks: You can't handle the truth!
    Plank, Jerry
    Lighting Design and Application: LD and A, 2023, 53 (12): : 24 - 25
  • [33] CONFESSIONS OF AN AUTOBIOGRAPHY SCHOLAR; OR, YOU CAN'T HANDLE THE TRUTHINESS
    Adams, Timothy Dow
    BIOGRAPHY-AN INTERDISCIPLINARY QUARTERLY, 2009, 32 (02): : 340 - +
  • [34] Can you handle it? Validating negative responses to restraint in cats
    Moody, Carly M.
    Picketts, Victoria A.
    Mason, Georgia J.
    Dewey, Cate E.
    Niel, Lee
    APPLIED ANIMAL BEHAVIOUR SCIENCE, 2018, 204 : 94 - 100
  • [35] VIRTUAL PREDICAMENTS: CUTTING ON SCREEN. CAN YOU HANDLE IT?
    Gibson, Cassandra Ann
    JOURNAL OF THE AMERICAN ACADEMY OF CHILD AND ADOLESCENT PSYCHIATRY, 2024, 63 (10): : S84 - S84
  • [36] Review of Colonial Pipeline Ransomware Attack
    Beerman, Jack
    Berent, David
    Falter, Zach
    Bhunia, Suman
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 8 - 15
  • [37] Six steps to dealing with a ransomware attack
    Dimitriadis C.
    Computer Fraud and Security, 2023, 2023 (10):
  • [38] Knowledge Held Hostage: What the British Library Ransomware Attack Can Teach Us
    Fiscus, Moira
    COLLEGE & RESEARCH LIBRARIES, 2024, 85 (05): : 628 - 634
  • [39] Comprehensive Survey on Petya Ransomware Attack
    Aidan, Jagmeet Singh
    Verma, Harsh Kumar
    Awasthi, Lalit Kumar
    2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 122 - 125
  • [40] VR Headset Ransomware Attack Vulnerability
    Tahat, Majd Z.
    Glisson, William B.
    Al Smadi, Baker
    2024 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CCECE 2024, 2024, : 740 - 745