{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:34:01Z","timestamp":1763141641253,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527943","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T17:35:06Z","timestamp":1630949706000},"page":"47-54","source":"Crossref","is-referenced-by-count":6,"title":["Rapid Ransomware Detection through Side Channel Exploitation"],"prefix":"10.1109","author":[{"given":"Michael A.","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Eric C.","family":"Larson","sequence":"additional","affiliation":[]},{"given":"Mitchell A.","family":"Thornton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.16"},{"key":"ref11","first-page":"794","article-title":"Sensor-based Ransomware Detection","author":"taylor","year":"2017","journal-title":"Future Technology Conference"},{"year":"2021","key":"ref12","article-title":"Ransomware Detection Techniques: Which One Is The Best?"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"article-title":"CryPy Ransomware Slithers Onto PCs With Unique, Python-Based Encryption","year":"2016","author":"bonderud","key":"ref14"},{"article-title":"Hardware Monitor: Reference Manual","year":"2017","author":"bresink","key":"ref15"},{"key":"ref16","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1075\/cilt.292.10cha"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/1610075.1610162"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"article-title":"First Death Reported Following a Ransomware Attack on a German Hospital","year":"2002","author":"cimpanu","key":"ref4"},{"year":"2020","key":"ref3","article-title":"Ransomware Activity Targeting the Healthcare and Public Health Sector"},{"article-title":"Cost of Downtime from Ransomware Nearly Doubles this Year","year":"2020","author":"gately","key":"ref6"},{"article-title":"Ransomware Did Not Kill a German Hospital Patient","year":"2020","author":"o\u2019neill","key":"ref5"},{"article-title":"Here&#x2019;s What We Know About the Colonial Pipeline Ransomware Attack","year":"2021","author":"cohen","key":"ref8"},{"article-title":"Ransomware froze more cities in 2019. next year is a toss-up","year":"2019","author":"ng","key":"ref7"},{"article-title":"What&#x2019;s Next for Ransomware in 2021?","year":"2020","author":"bracken","key":"ref2"},{"year":"0","key":"ref1","article-title":"22 Shocking Ransomware Statistics for Cybersecurity in 2021"},{"article-title":"Cyber-security emergency: Weaponized ransomware attack spreading like wildfire","year":"2017","author":"fuller","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref22","first-page":"155","article-title":"Support vector regression machines","author":"drucker","year":"1997","journal-title":"Advances in neural information processing systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2021,7,26]]},"location":"Rhodes, Greece","end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527943.pdf?arnumber=9527943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:45:45Z","timestamp":1652183145000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527943","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}