{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:32:29Z","timestamp":1759332749121,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ccst.2018.8585650","type":"proceedings-article","created":{"date-parts":[[2018,12,24]],"date-time":"2018-12-24T23:55:13Z","timestamp":1545695713000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["Why Ransomware Needs A Human Touch"],"prefix":"10.1109","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249052"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004894"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280842"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129704"},{"key":"ref14","article-title":"Talos: no more ransomware victims with formalmethods","author":"cimitile","year":"2017","journal-title":"International Journal of Information Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3168390.3168399"},{"key":"ref16","first-page":"144","volume":"74","author":"al-rimy","year":"2018","journal-title":"Ransomware threat success factors taxonomy and countermeasures A survey and research directions Computers & Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"ref18","first-page":"115","volume":"115","author":"mohan","year":"2017","journal-title":"International Journal of Pure and Applied Mathematics - Special Issue"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2017.8276158"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.58"},{"journal-title":"Bitcoin a favourite of ransomwares - cyber extortion to shoot up if govts don't act soon","year":"2017","key":"ref3"},{"key":"ref6","first-page":"617","article-title":"GreatEatlon: fast, static detection of mobile ransomware","volume":"198","author":"zheng","year":"2017","journal-title":"SecureComm 2016 Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736455"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICAMMAET.2017.8186691"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/978-3-319-26362-5_18","article-title":"HelDroid: Dissecting and detecting mobile ransomware","volume":"9404","author":"andronio","year":"2015","journal-title":"Proceedings of the 18th International Symposium on Research in Attacks Intrusions and Defenses"},{"key":"ref2","first-page":"11","volume":"19","author":"kshetri","year":"2017","journal-title":"Do crypto-currencies fuel ransomware? IT professional"},{"journal-title":"Digital Guardian","year":"2017","key":"ref1"},{"key":"ref9","first-page":"184","article-title":"DNA-Droid: a real-time android ransomware detection framework","volume":"10394","author":"gharib","year":"2017","journal-title":"Network and System Security NSS 2017 Lecture Notes in Computer Science"},{"journal-title":"Capital Business Systems Inc","first-page":"218","year":"2017","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5220\/0006552602250232"},{"key":"ref21","first-page":"461","author":"salln\u00e4s","year":"2000","journal-title":"2000 Supporting presence in collaborative environments by haptic force feedback ACM Trans Comput -Hum Interact 7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"}],"event":{"name":"2018 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2018,10,22]]},"location":"Montreal, QC","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8573569\/8585426\/08585650.pdf?arnumber=8585650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:33:01Z","timestamp":1643239981000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8585650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ccst.2018.8585650","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}