{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:39:07Z","timestamp":1725889147094},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319589664"},{"type":"electronic","value":"9783319589671"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58967-1_12","type":"book-chapter","created":{"date-parts":[[2017,6,6]],"date-time":"2017-06-06T07:54:30Z","timestamp":1496735670000},"page":"105-114","source":"Crossref","is-referenced-by-count":4,"title":["Ransomware-Prevention Technique Using Key Backup"],"prefix":"10.1007","author":[{"given":"Kyungroul","family":"Lee","sequence":"first","affiliation":[]},{"given":"Insu","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"issue":"6","key":"12_CR1","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S1361-3723(13)70053-8","volume":"2013","author":"D Manky","year":"2013","unstructured":"Manky, D.: Cybercrime as a Service: a very modern business. J. Comput. Fraud Secur. 2013(6), 9\u201313 (2013)","journal-title":"J. Comput. Fraud Secur."},{"issue":"4","key":"12_CR2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1361-3723(16)30036-7","volume":"2016","author":"C Everett","year":"2016","unstructured":"Everett, C.: Ransomware: to pay or not to pay? J. Comput. Fraud Secur. 2016(4), 8\u201312 (2016)","journal-title":"J. Comput. Fraud Secur."},{"key":"12_CR3","unstructured":"Xin, L., Qinyu, L.: Ransomware: a new cyber hijacking threat to enterprises. In: Handbook of Research on Information Security and Assurance, IGI (2009)"},{"key":"12_CR4","unstructured":"Giri, B.N., Jyoti, N.: McAfee AVERT, The Emergence of Ransomware, AVAR (2006)"},{"issue":"1","key":"12_CR5","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s11416-008-0092-2","volume":"6","author":"A Gazet","year":"2008","unstructured":"Gazet, A.: Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77\u201390 (2008)","journal-title":"J. Comput. Virol."},{"key":"12_CR6","unstructured":"Liao, Q.: Ransomware: a growing threat to SMEs. In: Conference Southwest Decision Science Institutes (2008)"},{"key":"12_CR7","first-page":"9","volume":"2016","author":"S Song","year":"2016","unstructured":"Song, S., Kim, B., Lee, S.: The effective ransomware prevention technique using process monitoring on android platform. J. Mobile Inform. Syst. 2016, 9 (2016)","journal-title":"J. Mobile Inform. Syst."},{"key":"12_CR8","unstructured":"Violet, B.: CryotoLocker\u2019s crimeware: a trail of millions in laundered Bitcoin, ZDNet, December 2013"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Ahmadian, M.M., Shahriari, H.R., Ghaffarian, S.M.: Connection-monitor & connection-breaker: a novel approach for prevention and detection of high survivable ransomwares. In: Conference Information Security and Cryptology, pp. 79\u201384, September 2015","DOI":"10.1109\/ISCISC.2015.7387902"},{"key":"12_CR10","unstructured":"McAfee, McAfee Labs Threats report. http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-mar-2016.pdf"},{"key":"12_CR11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.4236\/wjet.2015.33C030","volume":"3","author":"D Kim","year":"2015","unstructured":"Kim, D., Kim, S.: Design of quantification model for ransom ware prevent. World J. Eng. Technol. 3, 203\u2013207 (2015)","journal-title":"World J. Eng. Technol."},{"issue":"3\/4","key":"12_CR12","first-page":"134","volume":"2","author":"S Kim","year":"2012","unstructured":"Kim, S., Park, J., Lee, K., You, I., Yim, K.: A brief survey on rootkit techniques in malicious codes. J. Internet Serv. Inform. Secur. 2(3\/4), 134\u2013147 (2012)","journal-title":"J. Internet Serv. Inform. Secur."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Lee, K., Lee, Y., Park, J., You, I., Yim, K.: Security issues on the CNG cryptography library (Cryptography API: Next Generation). In: Conference Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 709\u2013713, July 2013","DOI":"10.1109\/IMIS.2013.128"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Lee, K., You, I., Yim, K.: Vulnerability analysis on the CNG crypto library. In: Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 221\u2013224, July 2015","DOI":"10.1109\/IMIS.2015.34"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Big Data Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58967-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T17:05:57Z","timestamp":1569431157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-58967-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319589664","9783319589671"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58967-1_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}