{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:15:55Z","timestamp":1771848955128,"version":"3.50.1"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030519735","type":"print"},{"value":"9783030519742","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51974-2_14","type":"book-chapter","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T15:05:44Z","timestamp":1596812744000},"page":"164-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Technical and Behavioural Training and Awareness Solutions for Mitigating Ransomware Attacks"],"prefix":"10.1007","author":[{"given":"Abubakar","family":"Bello","sequence":"first","affiliation":[]},{"given":"Alana","family":"Maurushat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,8]]},"reference":[{"key":"14_CR1","unstructured":"Kostopoulos, G.K.: Cyberspace and Cybersecurity, Second. Taylor and Francis (2017)"},{"key":"14_CR2","unstructured":"FBI. 2018 Internet Crime Report. Federal Bureau of Investigation (2018)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Moore, C.: Detecting ransomware with honeypot techniques. In: 2016 Cybersecurity Cyberforensics Conference (CCC), pp. 77\u201381 (2016)","DOI":"10.1109\/CCC.2016.14"},{"key":"14_CR4","unstructured":"Wilding, E.: Popp goes the weasel. Virus Bull. 20 (1992)"},{"key":"14_CR5","unstructured":"Young, Y., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings of the IEEE Symposium Security Privacy, pp. 129\u2013140 (1996)"},{"key":"14_CR6","first-page":"44","volume":"40","author":"N Hampton","year":"2018","unstructured":"Hampton, N., Baig, Z.A., Zeadally, S.: Ransomware behavioural analysis on windows platforms. J. Inform. Secur. Appl. 40, 44\u201351 (2018)","journal-title":"J. Inform. Secur. Appl."},{"issue":"1","key":"14_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.13052\/jcsm2245-1439.813","volume":"8","author":"A Bello","year":"2019","unstructured":"Bello, A., Mahadevan, V.: A cloud based conceptual identity management model for secured internet of things operation. J. Cyber Secur. Mobility 8(1), 53\u201374 (2019)","journal-title":"J. Cyber Secur. Mobility"},{"key":"14_CR8","unstructured":"Lueth, K.L.: State of the IoT 2018: Number of IoT devices now at 7B - Market accelerating. IOT Analytics (2018). https:\/\/iot-analytics.com\/product\/state-of-the-iot-02\u20132017\/. Accessed 14 May 2019"},{"issue":"5","key":"14_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1049\/iet-net.2017.0207","volume":"7","author":"P O\u2019Kane","year":"2018","unstructured":"O\u2019Kane, P., Sezer, S., Carlin, D.: Evolution of ransomware. IET Netw. 7(5), 321\u2013327 (2018)","journal-title":"IET Netw."},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/s40163-019-0097-9","volume":"8","author":"G Hull","year":"2019","unstructured":"Hull, G., John, H., Arief, B.: Ransomware deployment methods and analysis: views from a predictive model and human responses. Crime Sci. 8(1), 2 (2019)","journal-title":"Crime Sci."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Bajpai, P., Sood, A.K., Enbody, R.: A key-management-based taxonomy for ransomware. In: APWG Symposium on Electronic Crime Research, pp. 1\u201312 (2018)","DOI":"10.1109\/ECRIME.2018.8376213"},{"issue":"2","key":"14_CR12","first-page":"57","volume":"4","author":"A Zimba","year":"2018","unstructured":"Zimba, A., Mulenga, M.: A dive into the deep: demystifying wannacry crypto ransomware network attacks via digital forensics. Int. J. Inform. Technol. Secur. 4(2), 57\u201368 (2018)","journal-title":"Int. J. Inform. Technol. Secur."},{"key":"14_CR13","unstructured":"Salvi, M.H.U., Kerkar, M.R.V.: Ransomware: a cyber extortion. Asianj J. Convergence Technol. 2 (2016)"},{"key":"14_CR14","unstructured":"Gibbs, S.: Wannacry: Hackers Withdraw \u00a3108,000 Of Bitcoin Ransom| Technology| The Guardian (2017). https:\/\/www.theguardian.com\/technology\/2017\/aug\/03\/wannacry-hackers-withdraw-108000-pounds-bitcoin-ransom. Accessed 28 Oct 2019"},{"key":"14_CR15","unstructured":"Bistarelli, S., Parroccini, M., Santini, F.: Visualising bitcoin flows of ransomware: wannacry one week later. In: ITASEc, p. 8 (2018)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Liao, K., Zhao, Z., Doupe, A., et al.: Behind closed doors: measurement and analysis of cryptolocker ransoms In: Bitcoin. APWG Symposium on Electronic Crime Research, pp. 1\u201313 (2016)","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"14_CR17","unstructured":"Ament, C., Jaeger, L.: Unconscious on their own ignorance: overconfidence. Inform. Secur. 13 (2017)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Wang, J., Li, Y., Rao, H.R.: Overconfidence in phishing email detection. J. Assoc. Inform. Syst. 17(11) (2016)","DOI":"10.17705\/1jais.00442"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Zimba, A., Wang, Z., Chen, H.: Reasoning crypto ransomware infection vectors with bayesian networks. In: IEEE International Conference Intelligence and Security Informatics, pp. 149\u2013151 (2017)","DOI":"10.1109\/ISI.2017.8004894"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Gallegos-Segovia, P.L., Bravo-Torres, J.F., Larios-Rosillo, V.M., et al.: Social engineering as an attack vector for ransomware. In: CHILEAN Conference on Electrical, Electronics Engineering, and Informatics and Communication Technologies, pp. 1\u20136 (2017)","DOI":"10.1109\/CHILECON.2017.8229528"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","volume":"74","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy, B.A.S., Maarof, M.A., Shaid, S.Z.: Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput. Secur. 74, 144\u2013166 (2018)","journal-title":"Comput. Secur."},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Ferreira, A.: Why ransomware needs a human touch. In: International Carnahan Conference on Security Technology, pp. 1\u20135 (2018)","DOI":"10.1109\/CCST.2018.8585650"},{"issue":"3","key":"14_CR23","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutorials 18(3), 2027\u20132051 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"14_CR24","unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., et al.: All Your iFRAMEs Point to Us, p. 15 (2008)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wu, X., Liu, C., et al.: Ransomtracer: exploiting cyber deception for ransomware tracing. In: IEEE Third International Conference Data Science Cyberspace, pp. 227\u2013234 (2018)","DOI":"10.1109\/DSC.2018.00040"},{"key":"14_CR26","unstructured":"Symantec: Android.Lockdroid.E| Symantec (2015). https:\/\/www.symantec.com\/security-center\/writeup\/2014\u2013103005\u20132209-99. Accessed 21 May 2019"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Chen, Z.G., Kang, H-S., Yin, S.N., et al.: Automatic ransomware detection and analysis based on dynamic API calls flow graph. In: RACS, pp. 196\u2013201 (2017)","DOI":"10.1145\/3129676.3129704"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Sheen, S., Yadav, A.: Ransomware detection by mining API call usage. In: International Conference Advance Computing Communication Information, pp. 983\u2013987 (2018)","DOI":"10.1109\/ICACCI.2018.8554938"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Lika, R.A., Murugiah, D., Brohi, S.N., Ramasamy, D.: NotPetya: cyber attack prevention through awareness via gamification. In: International Conference on Smart Computing and Electronic Enterprise, pp. 1\u20136 (2018)","DOI":"10.1109\/ICSCEE.2018.8538431"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Alzahrani, A., Alshehri, A., Alharthi, R., et al.: An overview of ransomware in the windows platform. In: Conference on Computer Science and Computational Intelligence, pp. 612\u2013617 (2017)","DOI":"10.1109\/CSCI.2017.106"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Maiorca, D., Mercaldo, F., Giacinto, G., et al.: R-PackDroid: API package-based characterization and detection of mobile ransomware. In: SA, pp. 1718\u20131723 (2017)","DOI":"10.1145\/3019612.3019793"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Scaife, N., Carter, H., Traynor, P., et al.: CryptoLock (and Drop It): stopping ransomware attacks on user data. In: IEEE 36th. International Conference Distributed Computing Systems, pp. 303\u2013312 (2016)","DOI":"10.1109\/ICDCS.2016.46"},{"issue":"6","key":"14_CR33","doi-asserted-by":"publisher","first-page":"82","DOI":"10.30880\/ijie.2018.10.06.011","volume":"10","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy, B.A.S., Maarof, M.A., Prasetyo, Y.A., et al.: Zero-day aware decision fusion-based model for crypto-ransomware early detection. Int. J. Integr. Eng. 10(6), 82\u201388 (2018)","journal-title":"Int. J. Integr. Eng."},{"key":"14_CR34","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.future.2018.07.045","volume":"90","author":"S Homayoun","year":"2019","unstructured":"Homayoun, S.: DRTHIS: deep ransomware threat hunting and intelligence system at the fog layer. Future Gener. Comput. Syst. 90, 94\u2013104 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Azmoodeh, A., Dehghantanha, A., Conti, M., et al.: Detecting crypto-ransomware. In: Iot Network Based Energy Consumption Footprint, vol. 9, no. 4 (2018)","DOI":"10.1007\/s12652-017-0558-5"},{"issue":"18","key":"14_CR36","first-page":"7902","volume":"12","author":"PEP Torres","year":"2017","unstructured":"Torres, P.E.P., Yoo, S.G.: Detecting and neutralizing encrypting ransomware attacks by using machine-learning techniques: a literature review. Int. J. Appl. Eng. Res. 12(18), 7902\u20137911 (2017)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"14_CR37","unstructured":"Sgandurra, D., Mu\u00f1oz-Gonz\u00e1lez, L., Mohsen, R., et al.: Automated dynamic analysis of ransomware: benefits, limitations and use for detection arXiv:1609.03020 [cs] (2016)"},{"key":"14_CR38","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Xiao, X., Mercaldo, F., et al.: Classification of ransomware families with machine learning based on n-gram of opcodes. Future Gener. Comput. Syst. 90, 211\u2013221 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Dion, Y.L., Joshua, A., Brohi, S.N.: Negation of ransomware via gamification and enforcement of standards. In: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence, pp. 203\u2013208 (2017)","DOI":"10.1145\/3168390.3168399"},{"issue":"4","key":"14_CR40","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1080\/10658980701576412","volume":"16","author":"X Luo","year":"2007","unstructured":"Luo, X., Liao, W.: Awareness education as the key to ransomware prevention. Inform. Syst. Secur. 16(4), 195\u2013202 (2007)","journal-title":"Inform. Syst. Secur."},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Raman, R., Lal, A.K.: Achuthan: serious games based approach to cyber security concept learning: indian context. In: 2014 International Conference on Green Computing, Communication and Electrical Engineering (ICGCCEE), Coimbatore, India, pp. 1\u20135 (2014)","DOI":"10.1109\/ICGCCEE.2014.6921392"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Aldawood, H., Skinner, G.: An academic review of current industrial and commercial cyber security social engineering solutions. In: Proceedings of the 3rd International Conference Cryptography, Security and Privacy. ICCSP 2019, Kuala Lumpur, Malaysia, pp. 110\u2013115 (2019)","DOI":"10.1145\/3309074.3309083"},{"key":"14_CR43","unstructured":"Tillmann, N., de Halleux, J., Xie, T.: Pex for fun: engineering an automated testing tool for serious games in computer science, p. 9 (2011)"},{"key":"14_CR44","unstructured":"Micallef, N., Arachchilage, N.: Involving users in the design of a serious game for security questions education. arXiv:1710.03888 [cs] (2017)"},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Beckers, K., Pape, S., Fries, V.: HATCH: hack and trick capricious humans \u2013 a serious game on social engineering. In: Proceedings of the 30th International BCS Human Computer Interaction Conference (2016)","DOI":"10.14236\/ewic\/HCI2016.94"},{"key":"14_CR46","unstructured":"Soceanu, A., Vasylenko, M., Gradinaru, A.: Improving cybersecurity skills using network security virtual labs. In: International MultiConference Engineering Computer Science, Hong Kong, vol. 2, p. 6 (2017)"},{"key":"14_CR47","first-page":"113","volume":"22","author":"K Krombholz","year":"2015","unstructured":"Krombholz, K., Hobel, H., Huber, M., et al.: Advanced social engineering attacks. J. Inform. Secur. Appl. 22, 113\u2013122 (2015)","journal-title":"J. Inform. Secur. Appl."},{"key":"14_CR48","doi-asserted-by":"crossref","unstructured":"Veksler, V.D., Buchler, N., Hoffman, B.E., et al.: Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users. Front. Psychol. 9 (2018)","DOI":"10.3389\/fpsyg.2018.00691"},{"issue":"1","key":"14_CR49","first-page":"21","volume":"3","author":"P Crouse","year":"2016","unstructured":"Crouse, P., Farmer, R.: Information security awareness: a course module using simulated spear-phishing. Inform. Secur. Educ. J. 3(1), 21\u201325 (2016)","journal-title":"Inform. Secur. Educ. J."},{"key":"14_CR50","unstructured":"Alarcon-Ramirez, A., Martinez-Pab\u00f3n, M., Kim, C.: Design and prototype of a wireless tailgate detection system using sun spot platform. Int. J. Embed. Syst. Appl. 14 (2011)"},{"key":"14_CR51","doi-asserted-by":"crossref","unstructured":"Airehrour, D., Nair, N.V., Madanian, S.: Social engineering attacks and countermeasures in the new zealand banking system: advancing a user-reflective mitigation model. Inform. 9(5), 110 (2018)","DOI":"10.3390\/info9050110"},{"key":"14_CR52","unstructured":"Social-Engineer LLC.: The 2018 Social Engineering Capture the Flag. Report (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Applied Informatics and Cybernetics in Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51974-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T06:13:28Z","timestamp":1657692808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51974-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519735","9783030519742"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51974-2_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}