{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T18:40:06Z","timestamp":1754073606715,"version":"3.41.2"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersecpods.2018.8560667","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T20:24:46Z","timestamp":1544127886000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Opcode Analysis of Ransomware"],"prefix":"10.1109","author":[{"given":"Domhnall","family":"Carlin","sequence":"first","affiliation":[{"name":"Centre for Secure Information Technologies, Queen&#x0027;s University, Belfast, Northern Ireland"}]},{"given":"Philip","family":"O'Kane","sequence":"additional","affiliation":[{"name":"Centre for Secure Information Technologies, Queen&#x0027;s University, Belfast, Northern Ireland"}]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[{"name":"Centre for Secure Information Technologies, Queen&#x0027;s University, Belfast, Northern Ireland"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.procs.2016.08.072","article-title":"Experimental analysis of ransomware on windows and android platforms: Evolution and characterization","volume":"94","author":"zavarsky","year":"2016","journal-title":"Procedia Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.15199\/48.2015.11.48"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"981","DOI":"10.15439\/2016F490","article-title":"Developing malware evaluation infrastructure","volume":"8","author":"cabaj","year":"2016","journal-title":"ser Annals of Computer Science and Information Systems"},{"key":"ref13","first-page":"303","author":"scaife","year":"2016","journal-title":"CryptoLock (and Drop It) Stopping Ransomware Attacks on User Data"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1007\/978-3-319-48965-0_32","article-title":"An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems","volume":"10052","author":"mbol","year":"2016","journal-title":"ser Lecture Notes in Computer Science"},{"journal-title":"Virusshare com","year":"2014","author":"roberts","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"journal-title":"Symantec Tech Rep","article-title":"An ISTR Special Report: Ransomware and Businesses 2016","year":"2016","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0092-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0160-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0180"},{"key":"ref8","first-page":"99","author":"carlin","year":"2017","journal-title":"Dynamic Analysis of Malware Using Run-Time Opcodes ser Data Analytics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2242890"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0207"},{"journal-title":"McAfee Labs Threats Report December 2017","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2015.7387902"}],"event":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2018,6,11]]},"location":"Glasgow, UK","end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537418\/8560662\/08560667.pdf?arnumber=8560667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T18:10:41Z","timestamp":1754071841000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8560667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cybersecpods.2018.8560667","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}