{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:09:31Z","timestamp":1730203771254,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,6]]},"DOI":"10.1109\/ccece59415.2024.10667339","type":"proceedings-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T17:42:46Z","timestamp":1726162966000},"page":"740-745","source":"Crossref","is-referenced-by-count":0,"title":["VR Headset Ransomware Attack Vulnerability"],"prefix":"10.1109","author":[{"given":"Majd Z.","family":"Tahat","sequence":"first","affiliation":[{"name":"Louisiana Tech University,Cyberspace Engineering,Ruston,USA"}]},{"given":"William B.","family":"Glisson","sequence":"additional","affiliation":[{"name":"Louisiana Tech University,Computer Science Department,Ruston,USA"}]},{"given":"Baker","family":"Al Smadi","sequence":"additional","affiliation":[{"name":"Grambling State University,Computer Science &amp; Digital Technologies,Grambling,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Virtual reality headset unit sales worldwide from 2019 to 2024","volume-title":"Statista.","author":"Alsop","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s20154063"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4339054"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/120152"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1743-0003-8-30"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s12938-020-00762-7"},{"key":"ref7","article-title":"The next generation of all-in-one VR","volume-title":"Introducing Oculus Quest","volume":"2","author":"Quest","year":"2023"},{"article-title":"Operating System Market Share Worldwide","volume-title":"statcounter.","year":"2024","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100372"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401189"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3020-3_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3479393"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v14n3p68"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00033"},{"key":"ref15","article-title":"Ransomware: An insurance market perspective","author":"Pain","year":"2022","journal-title":"Geneva Assoc."},{"volume-title":"Insurers Reassessing Cyber Risk Due to Ransomware, Aggregation Risks","year":"2023","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA49311.2020.9139703"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2023.445"},{"journal-title":"Compromising a medical mannequin","year":"2015","author":"Glisson","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2017.735"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-171060"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.813"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953741"},{"key":"ref26","first-page":"49","article-title":"Virtual reality based user authentication system","volume":"4","author":"Jain","year":"2017","journal-title":"International Journal of Science Technology Engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102923"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/spw.2018.00034"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/cns.2019.8802674"},{"article-title":"Detecting framerate-oriented cyber attacks on user experience in virtual reality","year":"2021","author":"Odeleye","key":"ref30"},{"article-title":"Safety and Security Challenges for Collaborative Robotics in VR","volume-title":"Proc. of the 1st International Workshop on Security for XR and XR for Security","author":"Mortezapoor","key":"ref31"},{"key":"ref32","article-title":"upgrade your experience valve corporation. Retrieved","volume-title":"valvesoftware","author":"Index","year":"2023"},{"volume-title":"FlashBack: Immersive Virtual Reality on Weak Mobile Devices via Rendering Memoization","year":"2016","author":"Boos","key":"ref33"},{"year":"2023","key":"ref34","article-title":"What is a standalone system. Retrieved"},{"volume-title":"Exploring Ransomware on The Oculus Quest 2","year":"2022","author":"Mahan","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92300-6_47"},{"key":"ref37","first-page":"6","article-title":"Android Ransomware: From Android Defender to Doublelocker","author":"Lipovsk\u00fd","year":"2018","journal-title":"ESET Technology"},{"article-title":"NJCCIC Threat Profile Koler","volume-title":"new jersey cybersecurity & communications integration cell","year":"2023","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6272"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.732"},{"article-title":"NJCCIC Threat Profile WannaLocker","volume-title":"new jersey cybersecurity & communications integration cell","year":"2023","key":"ref41"},{"article-title":"Termuxhackers-id, SARA","volume-title":"iqbalmh18","year":"2023","key":"ref42"}],"event":{"name":"2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2024,8,6]]},"location":"Kingston, ON, Canada","end":{"date-parts":[[2024,8,9]]}},"container-title":["2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10667055\/10667056\/10667339.pdf?arnumber=10667339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:00:06Z","timestamp":1726203606000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10667339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,6]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ccece59415.2024.10667339","relation":{},"subject":[],"published":{"date-parts":[[2024,8,6]]}}}