{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:24:06Z","timestamp":1775471046239,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T00:00:00Z","timestamp":1556841600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s40860-019-00080-3","type":"journal-article","created":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T18:04:06Z","timestamp":1556906646000},"page":"67-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms"],"prefix":"10.1007","volume":"5","author":[{"given":"Abdullahi Mohammed","family":"Maigida","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9196-9447","authenticated-orcid":false,"given":"Shafi\u2019i Muhammad","family":"Abdulhamid","sequence":"additional","affiliation":[]},{"given":"Morufu","family":"Olalere","sequence":"additional","affiliation":[]},{"given":"John K.","family":"Alhassan","sequence":"additional","affiliation":[]},{"given":"Haruna","family":"Chiroma","sequence":"additional","affiliation":[]},{"given":"Emmanuel Gbenga","family":"Dada","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,3]]},"reference":[{"key":"80_CR1","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.procs.2015.08.443","volume":"62","author":"AI Abubakar","year":"2015","unstructured":"Abubakar AI, Chiroma H, Muaz SA, Ila LB (2015) A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Proc Comput Sci 62:221\u2013227","journal-title":"Proc Comput Sci"},{"key":"80_CR2","doi-asserted-by":"crossref","unstructured":"Abdulhamid SM, Latiff MSA, Madni SHH, Oluwafemi O (2015) A survey of league championship algorithm: prospects and challenges. arXiv preprint \n                    arXiv:1603.09728","DOI":"10.17485\/ijst\/2015\/v8iS3\/60476"},{"key":"80_CR3","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.future.2015.08.006","volume":"56","author":"M Abdullahi","year":"2016","unstructured":"Abdullahi M, Ngadi MA (2016) Symbiotic organism search optimization based task scheduling in cloud computing environment. Future Gener Comput Syst 56:640\u2013650","journal-title":"Future Gener Comput Syst"},{"key":"80_CR4","doi-asserted-by":"publisher","unstructured":"Ahmadian MM, Shahriari HR (2016) 2entFOX: a framework for high survivable ransomwares detection. In: 13th International ISC conference on information security and cryptology, ISCISC 2016, pp 79\u201384. \n                    https:\/\/doi.org\/10.1109\/ISCISC.2016.7736455","DOI":"10.1109\/ISCISC.2016.7736455"},{"key":"80_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59427-9","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy BAS, Maarof MA (2018) A 0-day aware crypto-ransomware early behavioral detection framework. Recent Trends Inf Commun Technol. \n                    https:\/\/doi.org\/10.1007\/978-3-319-59427-9","journal-title":"Recent Trends Inf Commun Technol"},{"issue":"2018","key":"80_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","volume":"74","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74(2018):144\u2013166","journal-title":"Comput Secur"},{"key":"80_CR7","doi-asserted-by":"crossref","unstructured":"Andronio N, Zanero S, Maggi F (2015) Heldroid: dissecting and detecting mobile ransomware. In: International workshop on recent advances in intrusion detection. Springer, Cham, pp 382\u2013404","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"80_CR8","unstructured":"Aziz SM (2016) Ransomware in high-risk environments IT-792, independent research project December 2016 Advisor\u202f"},{"issue":"14","key":"80_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i14\/82936","volume":"9","author":"A Bhardwaj","year":"2016","unstructured":"Bhardwaj A, Avasthi V, Sastry H, Subrahmanyam GVB (2016) Ransomware digital extortion: a rising new age threat. Indian J Sci Technol 9(14):1\u20135. \n                    https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i14\/82936","journal-title":"Indian J Sci Technol"},{"issue":"9","key":"80_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30086-1","volume":"2016","author":"R Brewer","year":"2016","unstructured":"Brewer R (2016) Ransomware attacks: detection, prevention and cure. Netw Secur 2016(9):5\u20139. \n                    https:\/\/doi.org\/10.1016\/S1353-4858(16)30086-1","journal-title":"Netw Secur"},{"key":"80_CR11","unstructured":"Cabaj K, Gregorczyk M, Mazurczyk W (2015) Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. \n                    https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1611\/1611.08294.pdf\n                    \n                  . Accessed 27 Apr 2019"},{"issue":"5","key":"80_CR12","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1109\/TIFS.2017.2787905","volume":"13","author":"J Chen","year":"2018","unstructured":"Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn GJ (2018) Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans Inf Forensics Secur 13(5):1286\u20131300","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"80_CR13","doi-asserted-by":"publisher","first-page":"253","DOI":"10.19070\/2332-287X-1600061","volume":"4","author":"K-S Choi","year":"2016","unstructured":"Choi K-S, Scott TM, Leclair DP, Ks C, Tm S, Dp L (2016) Ransomware against police: diagnosis of risk factors via application of cyber-routine activities theory virtual commons citation ransomware against police: diagnosis of risk factors via application of cyber-routine activities theory. Int J Forensic Sci Pathol 4(7):253\u2013258. \n                    https:\/\/doi.org\/10.19070\/2332-287X-1600061","journal-title":"Int J Forensic Sci Pathol"},{"key":"80_CR14","unstructured":"Coccaro R (2017) Evaluation of weaknesses in US cybersecurity and recommendations for improvement (Doctoral dissertation, Utica College)"},{"key":"80_CR15","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.eswa.2018.02.039","volume":"102","author":"A Cohen","year":"2018","unstructured":"Cohen A, Nissim N (2018) Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Syst Appl 102:158\u2013178","journal-title":"Expert Syst Appl"},{"key":"80_CR16","doi-asserted-by":"publisher","unstructured":"Continella A, Guagnelli A, Zingaro G, Pasquale GD, Barenghi A, Zanero S, Maggi F (2016) ShieldFS: a self-healing, ransomware-aware filesystem. \n                    https:\/\/doi.org\/10.1145\/2991079.2991110","DOI":"10.1145\/2991079.2991110"},{"key":"80_CR17","unstructured":"Deloitte (2016) Ransomware holding your data. Deloitte Threat Intelligence and Analytics. \n                    https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/us\/Documents\/risk\/us-aers-ransomware.pdf"},{"issue":"3","key":"80_CR18","first-page":"5","volume":"41","author":"PR Demuro","year":"2017","unstructured":"Demuro PR (2017) Keeping internet pirates at bay: ransomware negotiation in the healthcare industry keeping internet pirates at bay: ransomware negotiation in the healthcare industry. Nova Law Rev 41(3):5","journal-title":"Nova Law Rev"},{"key":"80_CR19","volume-title":"Extinguishing ransomware\u2014a hybrid approach to android ransomware detection","author":"A Ferrante","year":"2017","unstructured":"Ferrante A, Malek M, Martinelli F, Mercaldo F, Milosevic J (2017) Extinguishing ransomware\u2014a hybrid approach to android ransomware detection. Springer, Cham"},{"key":"80_CR20","unstructured":"Formby D, Durbha S, Beyah R (2017) Out of control: ransomware for industrial control systems. In: RSA conference, 1\u20138. \n                    http:\/\/www.cap.gatech.edu\/plcransomware.pdf\n                    \n                  . Accessed 27 Apr 2019"},{"key":"80_CR21","doi-asserted-by":"publisher","unstructured":"Gagneja KK (2017) Knowing the ransomware and building defense against it-specific to healthcare institutes. In: Proceedings of the 2017 3rd conference on mobile and secure services, MOBISECSERV 2017. \n                    https:\/\/doi.org\/10.1109\/MOBISECSERV.2017.7886569","DOI":"10.1109\/MOBISECSERV.2017.7886569"},{"key":"80_CR22","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.cose.2017.11.019","volume":"73","author":"JA G\u00f3mez-Hern\u00e1ndez","year":"2018","unstructured":"G\u00f3mez-Hern\u00e1ndez JA, \u00c1lvarez-Gonz\u00e1lez L, Garc\u00eda-Teodoro P (2018) R-locker: thwarting ransomware action through a honeyfile-based approach. Comput Secur 73:389\u2013398","journal-title":"Comput Secur"},{"issue":"5","key":"80_CR23","first-page":"260","volume":"3","author":"G Gupta","year":"2017","unstructured":"Gupta G, Tripathi K (2017) Study on ransomware attack and its prevention. Int Educ Res J 3(5):260\u2013262","journal-title":"Int Educ Res J"},{"key":"80_CR24","first-page":"44","volume":"40","author":"N Hampton","year":"2018","unstructured":"Hampton N, Baig Z, Zeadally S (2018) Ransomware behavioural analysis on windows platforms. J Inf Secur Appl 40:44\u201351","journal-title":"J Inf Secur Appl"},{"key":"80_CR25","doi-asserted-by":"publisher","unstructured":"Hernandez-Castro J, Cartwright E, Stepanova A (2017) Economic analysis of ransomware. Soc Sci Res Netw 2017(1):1\u201314. \n                    https:\/\/doi.org\/10.2139\/ssrn.2937641","DOI":"10.2139\/ssrn.2937641"},{"key":"80_CR26","doi-asserted-by":"publisher","unstructured":"Hong S, Chen J (2016) Poster: sdguard\u2014an android application implementing privacy protection and ransomware detection, 26362. In: Proceedings of the 15th annual international conference on mobile systems, applications, and services. MobiSys '17, Niagara Falls, New York, USA, June 19\u201323, p 149. \n                    https:\/\/doi.org\/10.1145\/3081333.3089293","DOI":"10.1145\/3081333.3089293"},{"key":"80_CR27","unstructured":"Idris I, Abdulhamid SM (2014) An improved AIS based e-mail classification technique for spam detection. arXiv preprint \n                    arXiv:1402.1242"},{"key":"80_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003","author":"M Imran","year":"2017","unstructured":"Imran M, Guizani M, Yaqoob I, Ahmed E, Al-garadi MA, Imran M (2017) The rise of ransomware and emerging security challenges in the internet of things. Comput Netw. \n                    https:\/\/doi.org\/10.1016\/j.comnet.2017.09.003","journal-title":"Comput Netw"},{"key":"80_CR29","unstructured":"Kharraz A, Arshad S, Mulliner C, Robertson W, Kirda E (2016) UNVEIL: a large-scale, automated approach to detecting ransomware. In: 25th USENIX security symposium (USENIX security 16), pp. 757\u2013772"},{"key":"80_CR30","doi-asserted-by":"crossref","unstructured":"Kharraz A, Kirda E (2017) Redemption: real-time protection against ransomware at end-hosts. In: Dacier M, Bailey M, Polychronakis M, Antonakakis M (eds) Research in attacks, intrusions, and defenses. RAID 2017. Lecture notes in computer science, vol 10453. Springer, Cham, pp 98\u2013119","DOI":"10.1007\/978-3-319-66332-6_5"},{"key":"80_CR31","unstructured":"Kiraz MS, Gen\u00e7 ZA, \u00d6zt\u00fcrk E (2017) Detecting large integer arithmetic for defense against crypto ransomware. Cryptology, Report 2017\/558. \n                    http:\/\/eprint.iacr.org\/2017\/558\n                    \n                  . Accessed 21 Dec 2018"},{"issue":"1","key":"80_CR32","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering\u2014a systematic literature review. Inform Softw Technol 51(1):7\u201315","journal-title":"Inform Softw Technol"},{"key":"80_CR33","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1145\/3052973.3053035","volume":"15","author":"E Kolodenker","year":"2017","unstructured":"Kolodenker E, Koch W, Stringhini G, Egele M (2017) PayBreak: defense against cryptographic ransomware. AsiaCCS 15:599\u2013611. \n                    https:\/\/doi.org\/10.1145\/3052973.3053035","journal-title":"AsiaCCS"},{"issue":"1","key":"80_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/THC-161263","volume":"25","author":"CS Kruse","year":"2017","unstructured":"Kruse CS, Frederick B, Jacobson T, Monticone DK (2017) Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care 25(1):1\u201310. \n                    https:\/\/doi.org\/10.3233\/THC-161263","journal-title":"Technol Health Care"},{"key":"80_CR35","doi-asserted-by":"crossref","unstructured":"Laszka A, Farhang S, Grossklags J (2017) On the economics of ransomware. \n                    http:\/\/arxiv.org\/abs\/1707.06247","DOI":"10.1007\/978-3-319-68711-7_21"},{"issue":"1","key":"80_CR36","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s00521-016-2448-8","volume":"29","author":"MSA Latiff","year":"2018","unstructured":"Latiff MSA, Madni SHH, Abdullahi M (2018) Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm. Neural Comput Appl 29(1):279\u2013293","journal-title":"Neural Comput Appl"},{"issue":"3","key":"80_CR37","doi-asserted-by":"publisher","first-page":"e4337","DOI":"10.1002\/cpe.4337","volume":"30","author":"K Lee","year":"2018","unstructured":"Lee K, Yim K, Seo JT (2018) Ransomware prevention technique using key backup. Concurrency and Computation Practice and Experience 30(3):e4337","journal-title":"Concurrency and Computation Practice and Experience"},{"issue":"20","key":"80_CR38","first-page":"1","volume":"3","author":"J Lee","year":"2018","unstructured":"Lee J, Lee K (2018) Spillover effect of ransomware: economic analysis of web vulnerability market. Res Brief Inform Commun Technol Evol 3(20):1\u201311","journal-title":"Res Brief Inform Commun Technol Evol"},{"key":"80_CR39","doi-asserted-by":"publisher","unstructured":"Mercaldo F, Nardone V, Santone A (2016) Ransomware inside out. In: Proceedings\u20142016 11th international conference on availability, reliability and security, ARES 2016, 628\u2013637. \n                    https:\/\/doi.org\/10.1109\/ARES.2016.35","DOI":"10.1109\/ARES.2016.35"},{"key":"80_CR40","unstructured":"Mercaldo F, Nardone V, Santone A, Visaggio CA (2016) Ransomware steals your phone. Formal methods rescue it. In: International conference on formal techniques for distributed objects, components, and systems. Springer, Cham, pp 212\u2013221"},{"key":"80_CR41","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.procs.2016.08.072","volume":"94","author":"P Monika Zavarsky","year":"2016","unstructured":"Monika Zavarsky P, Lindskog D (2016) Experimental analysis of ransomware on windows and android platforms: evolution and characterization. Proc Comput Sci 94:465\u2013472. \n                    https:\/\/doi.org\/10.1016\/j.procs.2016.08.072","journal-title":"Proc Comput Sci"},{"key":"80_CR42","doi-asserted-by":"publisher","unstructured":"Moore C (2016) Detecting ransomware with honeypot techniques. In: Proceedings\u20142016 cybersecurity and cyberforensics conference, CCC 2016, pp 77\u201381. \n                    https:\/\/doi.org\/10.1109\/CCC.2016.14","DOI":"10.1109\/CCC.2016.14"},{"key":"80_CR43","unstructured":"Nieuwenhuizen D (2017) A behavioural-based approach to ransomware detection. Whitepaper. MWR Labs Whitepaper"},{"key":"80_CR44","unstructured":"Patyal M, Sampalli S, Ye Q, Rahman M (2017). Multi-layered defense architecture against ransomware. Int J Bus Cyber Secur 1(2): 52\u201364. \n                    http:\/\/ezproxy.umuc.edu\/login?url=http:\/\/search.ebscohost.com\/login.aspx?direct=true&db=bth&AN=121205538&site=eds-live&scope=site"},{"key":"80_CR45","first-page":"54","volume":"1865","author":"O Ray","year":"2017","unstructured":"Ray O, Hicks S, Moyle S (2017) Using ILP to analyse ransomware attacks. CEUR Workshop Proceedings 1865:54\u201359","journal-title":"CEUR Workshop Proceedings"},{"issue":"1","key":"80_CR46","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1108\/17506200710779521","volume":"13","author":"R Richardson","year":"2017","unstructured":"Richardson R, North M (2017) Ransomware: evolution, mitigation and prevention. Int Manag Rev 13(1):10\u201322. \n                    https:\/\/doi.org\/10.1108\/17506200710779521","journal-title":"Int Manag Rev"},{"issue":"4","key":"80_CR47","first-page":"14","volume":"2016","author":"BC Saiyed","year":"2016","unstructured":"Saiyed BC (2016) CryptoLocker. Inform Syst Secur Assoc J 2016(4):14\u201318","journal-title":"Inform Syst Secur Assoc J"},{"key":"80_CR48","doi-asserted-by":"publisher","first-page":"57","DOI":"10.5437\/08953608X5403011","volume":"15","author":"K Savage","year":"2015","unstructured":"Savage K, Coogan P, Lau H (2015) The evolution of ransomware. Secur Response 15:57. \n                    https:\/\/doi.org\/10.5437\/08953608X5403011","journal-title":"Secur Response"},{"key":"80_CR49","doi-asserted-by":"publisher","unstructured":"Scaife N, Carter H, Traynor P, Butler KRB (2016) CryptoLock (and Drop It): Stopping ransomware attacks on user data. In: Proceedings\u2014international conference on distributed computing systems, 2016\u2013Augus, pp 303\u2013312. \n                    https:\/\/doi.org\/10.1109\/ICDCS.2016.46","DOI":"10.1109\/ICDCS.2016.46"},{"key":"80_CR50","unstructured":"SEC E (2017) Cybersecurity: ransomware alert. Natl Exam Progr Risk Alert 5(4):15\u201316"},{"key":"80_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.15199\/48.2015.11.48","volume":"15","author":"D Sgandurra","year":"2016","unstructured":"Sgandurra D, Mu\u00f1oz-Gonz\u00e1lez L, Mohsen R, Lupu EC (2016) Automated dynamic analysis of ransomware: benefits, limitations and use for detection. Przeglad Elektrotechniczny 15:1\u201313. \n                    https:\/\/doi.org\/10.15199\/48.2015.11.48","journal-title":"Przeglad Elektrotechniczny"},{"key":"80_CR52","doi-asserted-by":"crossref","unstructured":"Shaukat SK, Ribeiro VJ (2018) IEEE copyright notice: RansomWall: a layered defense system against cryptographic ransomware attacks using machine learning. This paper is a preprint (IEEE \u201caccepted\u201d status)","DOI":"10.1109\/COMSNETS.2018.8328219"},{"key":"80_CR53","unstructured":"Silva JAH, Hern\u00e1ndez-Alvarez M (2017) Large scale ransomware detection by cognitive security. In: Ecuador technical chapters meeting (ETCM), 2017 IEEE. IEEE, pp 1\u20134"},{"key":"80_CR54","unstructured":"Smith J (2017) Ransomware incident response for law enforcement (Doctoral dissertation, Utica College)"},{"key":"80_CR55","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1155\/2016\/2946735","volume":"2016","author":"S Song","year":"2016","unstructured":"Song S, Kim B, Lee S (2016) The effective ransomware prevention technique using process monitoring on android platform. Mobile Inform Syst 2016:15\u201320. \n                    https:\/\/doi.org\/10.1155\/2016\/2946735","journal-title":"Mobile Inform Syst"},{"issue":"6","key":"80_CR56","first-page":"25","volume":"22","author":"T Team","year":"2017","unstructured":"Team T, Ringers D (2017) The cost of ransomware attacks. InforSec J 22(6):25\u201326","journal-title":"InforSec J"},{"key":"80_CR57","doi-asserted-by":"publisher","unstructured":"Upadhyaya R, Jain A (2017) Cyber ethics and cyber crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In: Proceeding\u2014IEEE international conference on computing, communication and automation, ICCCA 2016, pp 143\u2013148. \n                    https:\/\/doi.org\/10.1109\/CCAA.2016.7813706","DOI":"10.1109\/CCAA.2016.7813706"},{"key":"80_CR58","doi-asserted-by":"publisher","unstructured":"Wecksten M, Frick J, Sjostrom A, Jarpe E (2017) A novel method for recovery from Crypto Ransomware infections. In: 2016 2nd ieee international conference on computer and communications, ICCC 2016\u2014Proceedings, pp 1354\u20131358. \n                    https:\/\/doi.org\/10.1109\/CompComm.2016.7924925","DOI":"10.1109\/CompComm.2016.7924925"},{"issue":"December","key":"80_CR59","first-page":"61","volume":"1","author":"J Wyke","year":"2015","unstructured":"Wyke J, Ajjan A (2015) The current state of ransomware 1(December):61","journal-title":"The current state of ransomware"},{"key":"80_CR60","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.comnet.2017.09.003","volume":"129","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob I, Ahmed E, Ur Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129:444\u2013458","journal-title":"Comput Netw"},{"key":"80_CR61","doi-asserted-by":"publisher","unstructured":"Yang T, Yang Y, Qian K, Lo DCT, Qian Y, Tao L (2015) Automated detection and analysis for android ransomware. In: Proceedings\u20142015 IEEE 17th international conference on high performance computing and communications. 2015 IEEE 7th international symposium on cyberspace safety and security and 2015 IEEE 12th international conference on embedded software and systems. H, (1), 1338\u20131343. \n                    https:\/\/doi.org\/10.1109\/HPCC-CSS-ICESS.2015.39","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"issue":"1","key":"80_CR62","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.icte.2017.12.007","volume":"4","author":"A Zimba","year":"2018","unstructured":"Zimba A, Wang Z, Chen H (2018) Multi-stage crypto ransomware attacks: a new emerging cyber threat to critical infrastructure and industrial control systems. ICT Express 4(1):14\u201318","journal-title":"ICT Express"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00080-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00080-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00080-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T23:29:21Z","timestamp":1588375761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00080-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,3]]},"references-count":62,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["80"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00080-3","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,3]]},"assertion":[{"value":"2 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}