{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:18:06Z","timestamp":1774628286527,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030009786","type":"print"},{"value":"9783030009793","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T00:00:00Z","timestamp":1538092800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-00979-3_3","type":"book-chapter","created":{"date-parts":[[2018,9,27]],"date-time":"2018-09-27T12:55:41Z","timestamp":1538052941000},"page":"21-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Security Assurance Against Cybercrime Ransomware"],"prefix":"10.1007","author":[{"given":"Habib ur","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Eiad","family":"Yafi","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Nazir","sequence":"additional","affiliation":[]},{"given":"Khurram","family":"Mustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,28]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-39884-1_27","volume-title":"Financial Cryptography and Data Security","author":"Manal Adham","year":"2013","unstructured":"Adham, M., Azodi, A., Desmedt, Y., Karaolis, I.: How to attack two-factor authentication internet banking. In: International Conference on Financial Cryptography and Data Security, pp. 322\u2013328. Springer, Heidelberg (2013)"},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1080\/01930826.2014.893116","volume":"54","author":"Kenning Arlitsch","year":"2014","unstructured":"Arlitsch, K., Edelman, A.: Staying safe: cyber security for people and organizations. J. Lib. Admin. 54(1), 46\u201356 (2014)","journal-title":"Journal of Library Administration"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Bergman, M.K.: White paper: the deep web: surfacing hidden value. J. Electron. Publ. 7(1) (2001)","DOI":"10.3998\/3336451.0007.104"},{"issue":"22","key":"3_CR4","doi-asserted-by":"publisher","first-page":"E786","DOI":"10.1503\/cmaj.1095434","volume":"189","author":"Roger Collier","year":"2017","unstructured":"Collier, R.: NHS ransomware attack spreads worldwide. CMAJ 189, E786\u2013E787 (2017). https:\/\/doi.org\/10.1503\/cmaj.1095434","journal-title":"Canadian Medical Association Journal"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(16)30036-7","volume":"2016","author":"Cath Everett","year":"2016","unstructured":"Everett, C.: Ransomware: to pay or not to pay? Comput. Fraud Secur. 4, 8\u201312 (2016)","journal-title":"Computer Fraud & Security"},{"key":"3_CR6","unstructured":"Gandhi, K.A.: Survey on ransomware: a new era of cyber attack. Int. J. Comput. Appl. 168(3), 38\u201341 (2017)"},{"key":"3_CR7","unstructured":"Greenleaf, G.: Philippines Appoints Privacy Commission in Time for Mass Electoral Data Hack (2016)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., et al.: Local user-centric identity management. J. Trust. Manag. 2(1), 1 (2015)","DOI":"10.1186\/s40493-014-0009-6"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Kirlappos, I., Parkin, S., Sasse, M.A.: Learning from \u2018Shadow Security\u2019: why understanding noncompliant behaviors provides the basis for effective security. In: USEC Workshop on Usable Security (2014)","DOI":"10.14722\/usec.2014.23007"},{"key":"3_CR10","unstructured":"Laszka, A., Farhang, S., Grossklags, J.: On the economics of ransomware (2017). arXiv preprint arXiv:1707.06247"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Levchenko, K., et al.: Click trajectories: end-to-end analysis of the spam value chain. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 431\u2013446 (2011)","DOI":"10.1109\/SP.2011.24"},{"key":"3_CR12","unstructured":"Lunker, M.: Cyber laws: a global perspective. Internet Source (2005). http:\/\/unpanl.un.org\/intradoc\/groups\/public\/documents\/APCITY\/UNPAN005846.pdf"},{"issue":"9","key":"3_CR13","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(15)30080-5","volume":"2015","author":"Steve Mansfield-Devine","year":"2015","unstructured":"Mansfield-Devine, S.: The Ashley Madison affair. Netw. Secur. 9, 8\u201316 (2015)","journal-title":"Network Security"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Martin, G., Kinross, J., Hankin, C.: Effective cyber security is fundamental to patient safety (2017)","DOI":"10.1136\/bmj.j2375"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Minkus, T., Ross, K.W: I know what you\u2019re buying: privacy breaches on ebay. In: International Symposium on Privacy Enhancing Technologies Symposium, pp. 164\u2013183. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-08506-7_9"},{"key":"3_CR16","unstructured":"Mohurle, S., Patil, M.: A brief study of Wannacry Threat: ransomware attack. Int. J. 8(5), 1938\u20131940 (2017)"},{"key":"3_CR17","unstructured":"Net Losses: Estimating the Global Cost of Cybercrime McAfee, Center for Strategic and International Studies (2014). http:\/\/go.nature.com\/15nom3"},{"key":"3_CR18","unstructured":"OBrien, D.: Dridex: Tidal waves of spam pushing dangerous financial trojan. Symantec, White Paper (2016)"},{"key":"3_CR19","unstructured":"OWASP: AppSec Europe HTTP Parameter Pollution (2009). http:\/\/www.owasp.org\/images\/b\/ba\/AppsecEU09_CarettoniDiPaola_v0.8.pdf . Accessed 20 Apr 2014"},{"key":"3_CR20","unstructured":"Perlroth, N.: Hackers in China attacked The Times for last 4 months. NY Times, 30 January 2013"},{"key":"3_CR21","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-981-10-6544-6_17","volume-title":"Communications in Computer and Information Science","author":"Habib ur Rehman","year":"2017","unstructured":"Rehman, H., Nazir, M., Mustafa, K.: Security of web application: state of the art. In: International Conference of Information, Communication and Computer Technology ICICCT 2017 likely to be appear soon in Springer CCIS series (2017)"},{"key":"3_CR22","unstructured":"Robert S., Philip S.: Client-side attacks and defense. In: Syngress (2012). ISBN: 978-1-59749-590-5"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Rudman, L., Irwin, B.: Dridex: analysis of the traffic and automatic generation of IOCs. In: Information Security for South Africa (ISSA), IEEE 2016, pp. 77\u201384, August 2016","DOI":"10.1109\/ISSA.2016.7802932"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Scaife, N., Carter, H., Traynor, P., Butler, K.R.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303\u2013312. IEEE, June 2016","DOI":"10.1109\/ICDCS.2016.46"},{"key":"3_CR25","unstructured":"Shields, K.: Cybersecurity: recognizing the risk and protecting against attacks. NC Banking Inst. 19, 345 (2015). http:\/\/scholarship.law.unc.edu\/ncbi\/vol19\/iss1\/18"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Turpe, S.: Security testing: turning practice into theory. In: IEEE International Conference on Proceedings of Software Testing Verification and Validation Workshop, ICSTW 2008, pp. 294\u2013302 (2008)","DOI":"10.1109\/ICSTW.2008.38"},{"issue":"7602","key":"3_CR27","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1038\/533164a","volume":"533","author":"M. Mitchell Waldrop","year":"2016","unstructured":"Waldrop, M.M.: How to hack the hackers: the human side of cybercrime. Nature 533(7602), 164\u2013167 (2016)","journal-title":"Nature"},{"key":"3_CR28","unstructured":"Walters, R.: Cyber attacks on US companies in 2014. Heritage Foundation Issue Brief, vol. 4289 (2014)."},{"key":"3_CR29","unstructured":"Web Application Attack and Audit Framework. http:\/\/w3af.sourceforge.net . Accessed 20 Apr 2014"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Weinberger, S.: Is this the start of cyberwarfare? Nature 474(7350), 142 (2011). Chicago","DOI":"10.1038\/474142a"},{"key":"3_CR31","unstructured":"Wilkinson, C.: Cyber Risks: The Growing Threat (2013)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, H., Yao, D.D., Ramakrishnan, N.: Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications security, pp. 39\u201350, June 2014","DOI":"10.1145\/2590296.2590309"},{"key":"3_CR33","unstructured":"https:\/\/www.mcafee.com\/in\/resources\/reports\/rp-threats-predictions-2016.pdf . Accessed 27 Jun 2018"},{"key":"3_CR34","unstructured":"https:\/\/www.webroot.com\/shared\/pdf\/reinventing-antivirus.pdf"},{"key":"3_CR35","unstructured":"https:\/\/www.mcafee.com\/in\/resources\/reports\/rp-threats-predictions-2016.pdf . Accessed 27 Jun 2018"},{"issue":"7","key":"3_CR36","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.tics.2015.05.001","volume":"19","author":"PD Bruza","year":"2015","unstructured":"Bruza, P.D., Wang, Z., Busemeyer, J.R.: Quantum cognition: a new theoretical approach to psychology. Trends Cogn. Sci. 19(7), 383\u2013393 (2015)","journal-title":"Trends Cogn. Sci."},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Rehman, H., Khan, U., Nazir, M., Mustafa, K.: Strengthening the Bitcoin safety: a graded span based key partitioning mechanism. In: International Journal of Information Technology (selected for publication in vol. 10) (2018)","DOI":"10.1007\/s41870-018-0252-7"},{"key":"3_CR38","unstructured":"Alexander, R., Hawkins, R., Kelly, T.: Security assurance cases: motivation and the state of the art. High Integrity Systems Engineering, Department of Computer Science, University of York, York, UK (2011)"},{"key":"3_CR39","unstructured":"Almasri, A.H., Zuhairi, M.F., Darwish, M.A., Yafi, E.: Privacy and security of cloud computing: a comprehensive review of techniques and challenges. J. Eng. Appl. Sci. (Under Review)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing &amp; Optimization"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00979-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T21:20:36Z","timestamp":1662153636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00979-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,28]]},"ISBN":["9783030009786","9783030009793"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00979-3_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,28]]},"assertion":[{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pattaya","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icico.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}