{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:57:33Z","timestamp":1775667453113,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679487","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"216-221","source":"Crossref","is-referenced-by-count":2,"title":["Empirical Analysis and Practical Assessment of Ransomware Attacks to Data in Motion"],"prefix":"10.1109","author":[{"given":"Ra\u00fal Reinosa","family":"Sim\u00f3n","sequence":"first","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia,Communications Department,Valencia,Spain,46022"}]},{"given":"Clara I.","family":"Valero","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia,Communications Department,Valencia,Spain,46022"}]},{"given":"Jos\u00e9 A.","family":"Mart\u00ednez Cadenas","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia,Communications Department,Valencia,Spain,46022"}]},{"given":"Elisa R.","family":"Heymann","sequence":"additional","affiliation":[{"name":"University of Wisconsin,Computer Sciences Department,Madison,WI,USA,53706\u20131685"}]},{"given":"Ignacio","family":"Lacalle","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia,Communications Department,Valencia,Spain,46022"}]},{"given":"Barton P.","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Wisconsin,Computer Sciences Department,Madison,WI,USA,53706\u20131685"}]},{"given":"Carlos E.","family":"Palau","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia,Communications Department,Valencia,Spain,46022"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS54253.2022.9759000"},{"key":"ref2","article-title":"2023 sonicwall cyber threat report","volume-title":"SonicWall, Tech. Rep.","year":"2023"},{"key":"ref3","article-title":"2023 sonicwall cyber threat report","volume-title":"Federal Bureau of Investigation, Tech. Rep.","year":"2023"},{"key":"ref4","article-title":"Trusted ci webinar: The technical landscape of ransomware: Threat models and defense models","author":"Miller","year":"2023","journal-title":"Trusted CI Webinar"},{"issue":"5","key":"ref5","first-page":"1938","article-title":"A brief study of wannacry threat: Ransomware attack 2017","volume":"8","author":"Mohurle","year":"2017","journal-title":"International journal of advanced research in computer science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30086-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2020919899"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102490"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/rs11101168"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101762"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE54285.2021.9719456"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11593980_18"},{"key":"ref15","article-title":"Arp spoofing detection on switched ethernet networks: A feasibility study","volume-title":"Proceedings of the 5th Simposio Seguranca em Informatica","author":"Carnut","year":"2003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2011.266"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.31979\/etd.fu2m-skmj"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-89"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-30r1"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679487.pdf?arnumber=10679487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:22:56Z","timestamp":1727241776000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679487","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}