Open Access
Issue
ITM Web Conf.
Volume 80, 2025
2025 2nd International Conference on Advanced Computer Applications and Artificial Intelligence (ACAAI 2025)
Article Number 04008
Number of page(s) 8
Section Applications in Industry, Finance & AI Ethics
DOI https://doi.org/10.1051/itmconf/20258004008
Published online 16 December 2025
  1. Y. Ni, Research on Troubleshooting Techniques for SMB Protocol. Information Systems Engineering (2025), 87-90 [Google Scholar]
  2. J. Xie, C. Feng, B. Zhang, C. Tang, An automatic evaluation approach for binary software vulnerabilities with address space layout randomization enabled, in Proceedings of the 2021 IEEE International Conference on Big Data, Artificial Intelligence and Computer Science, (2021), Article 00045 [Google Scholar]
  3. A. Anwar, T. Sellers, Y.H. Chen, E. Kirda, R. Hodgman, A. Oprea, Recent year on the internet: Measuring and understanding the threats to everyday internet devices, in Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC ‘22), (2022), pp. 251-266 [Google Scholar]
  4. M.R. Gupta, Y.P. Koli, V.A. Patiyane, K.A. Wagh, K.P. Wagh, Eternal blue vulnerability. International Journal for Research in Applied Science and Engineering Technology 11, 53795 (2023) [Google Scholar]
  5. W. Jiang, Penetration Attacks and System Security Reinforcement Based on the ‘EternalBlue’ Vulnerability. Radio and Television Network 28, 61-63 (2021) [Google Scholar]
  6. P. Huang, Reappearance and Protection Measures of the EternalBlue Ransomware, in Proceedings of the 32nd China Digital TV and Network Development Annual Conference and the 27th International Radio and Television Technology Symposium (CCNS&ISBT 2024), (2024), pp. 488-494 [Google Scholar]
  7. M. Faturrohman, A. Salsabila, Z. Mardiah, A.R. Kardian, Attack into the server message block (CVE-2020-0796) vulnerabilities in Windows 10 using metasploit framework. JEEMECS (Journal of Electrical Engineering, Mechatronic and Computer Science) 6, 37-44 (2023) [Google Scholar]
  8. PatrOwl, Critical vulnerability in SMBv3 (SMBGhost/CVE-2020-0796). PatrOwl Security Advisory (2020) [Google Scholar]
  9. M.R. Gupta, Y.P. Koli, V.A. Patiyane, K.P. Wagh, Eternal blue vulnerability. International Journal for Research in Applied Science & Engineering Technology (IJRASET) 11, 1054 (2023) [Google Scholar]
  10. X. Li, J. Liu, M. Fan, Research on Prevention and Response Strategies for the WannaCry Ransomware. Computer Knowledge and Technology 13, 19-20 (2017) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.