{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T16:27:18Z","timestamp":1761841638645,"version":"3.28.0"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006298","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"4701-4707","source":"Crossref","is-referenced-by-count":7,"title":["Volenti non fit injuria: Ransomware and its Victims"],"prefix":"10.1109","author":[{"given":"Amir","family":"Atapour-Abarghouei","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Bonner","sequence":"additional","affiliation":[]},{"given":"Andrew Stephen","family":"McGough","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"McAfee LLC","article-title":"Threats predictions","year":"2017","key":"ref39"},{"key":"ref38","article-title":"Ransomware and businesses","author":"j -p p","year":"2016","journal-title":"An ISTR Special Report Symantec Corporation"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875477"},{"key":"ref32","first-page":"371","article-title":"A dangerous trend of cybercrime: Ransomware growing challenge","volume":"5","author":"pathak","year":"2016","journal-title":"Int J Advanced Research in Computer Engineering & Technology"},{"key":"ref31","article-title":"Extortion on the internet: the rise of crypto-ransomware","author":"richet","year":"2016","journal-title":"Harvard"},{"key":"ref30","article-title":"The evolution of ransomware","author":"savage","year":"2015","journal-title":"Security Response Symantec Corporation"},{"key":"ref37","article-title":"Petya ransomware goes low level","author":"benchea","year":"2016","journal-title":"Bitdefender"},{"key":"ref36","article-title":"Ransomware: A victim&#x2019;s perspective","author":"arsene","year":"2016","journal-title":"Bitdefender"},{"journal-title":"Say cheese ransomware-ing a DSLR camera","year":"0","key":"ref35"},{"journal-title":"Internet Security Threat Report","year":"2019","key":"ref34"},{"journal-title":"Hackers prey on human resources using ransomware","year":"0","author":"zurkus","key":"ref60"},{"journal-title":"Internet Security Threat Report","year":"2017","author":"nahorney","key":"ref62"},{"key":"ref61","article-title":"Out of control: Ransomware for industrial control systems","author":"formby","year":"2017","journal-title":"RSA Conference"},{"journal-title":"The human factor 2019 report","year":"0","key":"ref63"},{"key":"ref28","article-title":"The ZeroAccess Botnet--Mining and fraud for massive financial gain","author":"wyke","year":"2012","journal-title":"Sophos Technical Papers"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"624","DOI":"10.4338\/ACI-2016-04-SOA-0064","article-title":"A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks","volume":"7","author":"sittig","year":"2016","journal-title":"Applied Clinical Informatics"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSec.2015.7435501"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CHILECON.2017.8229528"},{"key":"ref66","first-page":"10","article-title":"Ransomware: Evolution, mitigation and prevention","volume":"13","author":"richardson","year":"2017","journal-title":"Management International Review"},{"article-title":"CoinDesk on Citrix survey, BTC stocks in UK businesses","year":"0","author":"higgins","key":"ref29"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0064-y"},{"journal-title":"No More Ransomware Project","year":"0","key":"ref68"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.14"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"},{"key":"ref20","first-page":"242","article-title":"Extinguishing ransomware-A hybrid approach to Android ransomware detection","author":"ferrante","year":"2017","journal-title":"The 10th Int Symp on Foundations Practice of Security"},{"key":"ref22","first-page":"1","article-title":"A king&#x2019;s ransom for encryption: Ransomware classification using augmented oneshot learning and bayesian approximation","author":"atapour-abarghouei","year":"2019","journal-title":"IEEE Intl Conf on Big Data"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-855-0.ch001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701576412"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2015.7387902"},{"key":"ref50","first-page":"1","article-title":"Understanding ransomware and strategies to defeat it","author":"leong","year":"2016","journal-title":"White Paper (McAfee Labs)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1561\/1500000006"},{"journal-title":"Atlanta was not prepared to respond to a ransomware attack","year":"0","author":"freed","key":"ref59"},{"journal-title":"University College London hit by ransomware attack","year":"0","author":"hern","key":"ref58"},{"journal-title":"Who is a target for ransomware attacks?","year":"0","author":"martin","key":"ref57"},{"journal-title":"The rising face of cybercrime Ransomware","year":"0","author":"simon","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70472-5"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3097347"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.wneu.2017.06.104"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"journal-title":"Heldroid Fast and Efficient Linguistic-Based Ran-somware Detection","year":"2015","author":"andronio","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref13","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv preprint arXiv 1409 1556"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00296"},{"key":"ref15","first-page":"91","article-title":"Faster R-CNN: Towards realtime object detection with region proposal networks","author":"ren","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref16","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622636"},{"key":"ref19","article-title":"Au-tomated dynamic analysis of ransomware: Benefits, limitations and use for detection","author":"sgandurra","year":"2016","journal-title":"arXiv preprint arXiv 1609 03020"},{"key":"ref4","first-page":"136","article-title":"Ransomware, threat and detection techniques: A review","volume":"19","author":"kok","year":"2019","journal-title":"Int J Computer Science and Network Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_21"},{"key":"ref6","article-title":"Botminer: Clustering analysis of network traffic for protocol and structure independent Botnet detection","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"},{"journal-title":"High-impact ransomware attacks threaten U S businesses and organisations","year":"0","key":"ref5"},{"key":"ref8","first-page":"8","article-title":"Scalable, behavior-based malware clustering","volume":"9","author":"bayer","year":"2009","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.10.012"},{"key":"ref49","first-page":"1","article-title":"Ransonware-practical and legal considerations for confronting the new economic engine of the dark web","volume":"23","author":"sherer","year":"2016","journal-title":"Rich JL & Tech"},{"key":"ref9","article-title":"JACKSTRAWS: Picking command and control connections from Bot traffic","author":"jacob","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref46","article-title":"Half of American ransomware victims have paid the ransom","author":"bisson","year":"2017","journal-title":"Tripwire"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741630"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMET.2018.8346329"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_4"},{"journal-title":"KSN report Ransomware","year":"2016","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0162627"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1145\/1772690.1772720","article-title":"Detection and analysis of driveby-download attacks and malicious JavaScript code","author":"cova","year":"2010","journal-title":"ACM International Conference on World Wide Web"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.002"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006298.pdf?arnumber=9006298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:13Z","timestamp":1658080393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006298","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}