{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:18:29Z","timestamp":1755998309244,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623769"},{"type":"electronic","value":"9789811623776"}],"license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2377-6_58","type":"book-chapter","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T01:44:09Z","timestamp":1632447849000},"page":"629-637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Protection Based on Hidden Space in Windows Against Ransomware"],"prefix":"10.1007","author":[{"given":"Joon-Young","family":"Paik","sequence":"first","affiliation":[]},{"given":"GeunYong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seoyeon","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Rize","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Eun-Sun","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,24]]},"reference":[{"key":"58_CR1","unstructured":"Symantec: WannaCry: lessons learned 1 year later. https:\/\/www.symantec.com\/blogs\/feature-stories\/wannacry-lessons-learned-1-year-later. Accessed 2 Sep 2019"},{"key":"58_CR2","unstructured":"Analysis of ransomware epidemic in February 2019. https:\/\/blog.360totalsecu-rity.com\/en\/analysis-of-ransomware-epidemic-in-february-2019. Accessed 15 Sep 2019"},{"key":"58_CR3","doi-asserted-by":"crossref","unstructured":"Scaife N, Carter H, Traynor P, Butler K (2016) CryptoLock (and Drop It): stopping ran-somware attacks on user data. In: IEEE international conference on distributed computing systems (ICDCS), pp 303\u2013312","DOI":"10.1109\/ICDCS.2016.46"},{"key":"58_CR4","unstructured":"Kharaz A, Arshad S, Mulliner C, Robertson W, Kirda E (2016) UNVEIL: a large-scale, automated approach to detecting ransomware. In: USENIX security symposium, pp 757\u2013772"},{"key":"58_CR5","doi-asserted-by":"crossref","unstructured":"Continella A, Guagnelli A, Zingaro G, Deasquale G, Barenghi A, Zanero S, Maggi F (2016) ShieldFS: a self-healing, ransomware-aware filesystem. In: Annual conference on computer security applications (ACSAC), pp 336\u2013347","DOI":"10.1145\/2991079.2991110"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"Subedi K, Budhathoki DR, Chen B, Dasgupta D (2017) RDS3: ransomware defense strategy by using stealthily space space. In: IEEE symposium series on computational intelligence (SSCI), pp 1\u20138","DOI":"10.1109\/SSCI.2017.8280842"},{"issue":"9","key":"58_CR7","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1587\/transinf.2017EDL8052","volume":"E100","author":"J Yun","year":"2017","unstructured":"Yun J, Hur J, Shin Y, Koo D (2017) CLDSafe: an efficient file backup system in cloud storage against ransomware. IEICE Trans Inf Syst E100(9):2228\u20132231","journal-title":"IEICE Trans Inf Syst"},{"issue":"8","key":"58_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1353-4858(06)70430-5","volume":"2006","author":"M Broomfield","year":"2006","unstructured":"Broomfield M (2006) NTFS alternate data streams: focused hacking. Netw Secur 2006(8):7\u20139","journal-title":"Netw Secur"},{"key":"58_CR9","doi-asserted-by":"crossref","unstructured":"Baek S, Jung Y, Mohaisen A, Lee S, Nyang D (2018) SSD-insider: internal defense of solid-state drive against ransomware with perfect data recovery. In: IEEE conference on distributed computing systems (ICDCS), pp 875\u2013884","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"58_CR10","unstructured":"Deviare2 Hook Homepage. https:\/\/github.com\/nektra\/Deviare2. Accessed 01 Oct 2020"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2377-6_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T18:18:28Z","timestamp":1644430708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2377-6_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"ISBN":["9789811623769","9789811623776"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2377-6_58","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"24 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}