{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:14:41Z","timestamp":1766733281431},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/acit52158.2021.9548507","type":"proceedings-article","created":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T03:29:27Z","timestamp":1633145367000},"page":"473-478","source":"Crossref","is-referenced-by-count":11,"title":["Ransomware Attacks: Risks, Protection and Prevention Measures"],"prefix":"10.1109","author":[{"given":"Antonina","family":"Farion-Melnyk","sequence":"first","affiliation":[]},{"given":"Viktoria","family":"Rozheliuk","sequence":"additional","affiliation":[]},{"given":"Tetiana","family":"Slipchenko","sequence":"additional","affiliation":[]},{"given":"Serhiy","family":"Banakh","sequence":"additional","affiliation":[]},{"given":"Mykhailyna","family":"Farion","sequence":"additional","affiliation":[]},{"given":"Oksana","family":"Bilan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"National Cyber Security Alliance","year":"2017","key":"ref10"},{"journal-title":"Wikipedia","year":"0","key":"ref11"},{"journal-title":"10 Ransomware Attacks You Should Know About in 2019","year":"0","author":"fuks","key":"ref12"},{"journal-title":"Signal","article-title":"12 of the biggest ransomware attacks of 2020","year":"0","key":"ref13"},{"journal-title":"The Statisticain","article-title":"Annual number of ransomware attacks worldwide from 2014 to 2019 (in millions)","year":"0","key":"ref14"},{"journal-title":"Purplesec","article-title":"2021 Ransomware Statistics, Data, & Trends","year":"0","key":"ref15"},{"journal-title":"What is ransomware? Terranova","year":"0","key":"ref16"},{"journal-title":"How to Protect Against Ransomware 7 Ways to Stop the Worst Cyberthreat","year":"0","key":"ref17"},{"key":"ref4","article-title":"Ransomware can interfere with elections and fuel disinformation &#x2013; basic cybersecurity precautions are key to minimizing the damage","author":"forno","year":"0","journal-title":"The conversation Academic rigour journalistic flair"},{"journal-title":"Meharchandani Dhwani Cybercrime Expected to Rise At an Unprecedented Rate in 2021","year":"2020","key":"ref3"},{"journal-title":"IBM study Businesses more likely to pay ransomware than consumers","year":"2016","key":"ref6"},{"key":"ref5","article-title":"What is ransomware? Everything you need to know about one of the biggest menaces on the web","author":"palmer","year":"2020","journal-title":"ZDNet"},{"journal-title":"Netsecurity","article-title":"56% of organizations faced a ransomware attack, many paid the ransom","year":"2020","key":"ref8"},{"journal-title":"Executive Summary - 2018 Internet Security Threat Report","year":"2018","key":"ref7"},{"journal-title":"WSJ PRO Cybersecurity ESI THOUGHTLAB","year":"0","key":"ref2"},{"key":"ref1","article-title":"10 essential facts about cybercrime in 2020","author":"lancaster","year":"0","journal-title":"IDagent"},{"journal-title":"CALYPTIX&#x201D;","article-title":"Biggest Cyber Attacks 2017: How They Happened","year":"2017","key":"ref9"}],"event":{"name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2021,9,15]]},"location":"Deggendorf, Germany","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 11th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9548321\/9548113\/09548507.pdf?arnumber=9548507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:46:33Z","timestamp":1652197593000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/acit52158.2021.9548507","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}