{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:42:01Z","timestamp":1743151321695,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031774317"},{"type":"electronic","value":"9783031774324"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-77432-4_14","type":"book-chapter","created":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T08:24:10Z","timestamp":1735115050000},"page":"198-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Utility Function for\u00a0Assessing the\u00a0Cost of\u00a0Recovering from\u00a0Ransomware Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6054-9132","authenticated-orcid":false,"given":"Lu\u00eds","family":"Pinto","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1856-6101","authenticated-orcid":false,"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5583-5772","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,26]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/fi14040115","volume":"14","author":"M Al-Dwairi","year":"2022","unstructured":"Al-Dwairi, M., Shatnawi, A.S., Al-Khaleel, O., Al-Duwairi, B.: Ransomware-resilient self-healing xml documents. Future Internet 14, 115 (2022). https:\/\/doi.org\/10.3390\/fi14040115","journal-title":"Future Internet"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Brewer, R.: Ransomware attacks: detection, prevention and cure. Netw. Secur. 2016, 5\u20139 (2016). https:\/\/doi.org\/10.1016\/S1353-4858(16)30086-1","DOI":"10.1016\/S1353-4858(16)30086-1"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Cristea, L.: Current security threats in the national and international context. J. Account. Manag. Inf. Syst. (2020). https:\/\/doi.org\/10.24818\/jamis.2020.02007","DOI":"10.24818\/jamis.2020.02007"},{"key":"14_CR4","unstructured":"Fortinet: The 2023 global ransomware report (2023). https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/reports\/report-2023-ransomware-global-research.pdf. Accessed 9 Apr 2024"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Gav\u0117nait\u0117-Sirvydien\u0117, J., Mie\u010dinskien\u0117, A.: Forecasting costs of cyber attacks using the global cost of cyber risk calculator v 1.2. Contemp. Issues Bus. Manag. Econ. Eng. 2021 (2021). https:\/\/doi.org\/10.3846\/cibmee.2021.618","DOI":"10.3846\/cibmee.2021.618"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Guo, J., Liang, H., Long, J.: Leveraging file system characteristics for ransomware mitigation in linux operating system environments (2024). https:\/\/doi.org\/10.21203\/rs.3.rs-4308346\/v1","DOI":"10.21203\/rs.3.rs-4308346\/v1"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Pattnaik, N., et al.: It\u2019s more than just money: the real-world harms from ransomware attacks. ArXiv abs\/2307.02855 (2023). https:\/\/doi.org\/10.48550\/arXiv.2307.02855","DOI":"10.48550\/arXiv.2307.02855"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Reidys, B., Liu, P., Huang, J.: Rssd: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis. In: Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (2022). https:\/\/doi.org\/10.1145\/3503222.3507773","DOI":"10.1145\/3503222.3507773"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Sharma, S.K., Singh, T.: Ransomware: a severe cyber security threat in the digital era. Int. J. Sci. Res. Sci. Technol. 6, 211\u2013218 (2019). https:\/\/doi.org\/10.32628\/IJSRST196120","DOI":"10.32628\/IJSRST196120"},{"key":"14_CR10","unstructured":"Sophos: Ransomware recovery costs vs. the ransom demands (2024). https:\/\/www.ft.com\/partnercontent\/sophos\/ransomware-recovery-costs-vs-the-ransom-demands.html. Accessed 9 Apr 2024"}],"container-title":["Communications in Computer and Information Science","Optimization, Learning Algorithms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77432-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T09:02:32Z","timestamp":1735117352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77432-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031774317","9783031774324"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77432-4_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OL2A","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Optimization, Learning Algorithms and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tenerife","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ol2a2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ol2a.ipb.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}