{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T02:09:20Z","timestamp":1774922960993,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/ecrime51433.2020.9493256","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:07:41Z","timestamp":1627420061000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["Averages don\u2019t characterise the heavy tails of ransoms"],"prefix":"10.1109","author":[{"given":"Eireann","family":"Leverett","sequence":"first","affiliation":[]},{"given":"Eric","family":"Jardine","sequence":"additional","affiliation":[]},{"given":"Erin","family":"Burns","sequence":"additional","affiliation":[]},{"given":"Ankit","family":"Gangwal","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Geer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Statistics of deadly quarrels","author":"richardson","year":"1960","journal-title":"Boxwood Pr"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2012.04.012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2010-00120-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_3"},{"key":"ref12","article-title":"Sometimes three rights really do make a wrong: Measuring cybersecurity and Simpson&#x2019;s paradox","author":"jardine","year":"2017","journal-title":"Workshop on the Economics of Information Security"},{"key":"ref13","article-title":"The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices","author":"woods","year":"2019","journal-title":"Workshop on the Economics of Information Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2336051"},{"key":"ref16","article-title":"Hype and heavy tails: A closer look at data breaches","volume":"2","author":"edwards","year":"2016","journal-title":"Cybersecurity"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/9781119162315"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.03.052"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1257\/jep.30.1.185"},{"key":"ref28","article-title":"Malware and market share","volume":"4","author":"arce","year":"2018","journal-title":"Cybersecurity"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600110NM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4324\/9780429499821-9"},{"key":"ref3","article-title":"Automated dynamic analysis of ransomware: Benefits, limitations and use for detection","author":"sgandurra","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMET.2018.8346329"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(00)00464-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(16)30036-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0085777"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_5"},{"key":"ref9","article-title":"PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond","author":"prandl","year":"2017"},{"key":"ref1","article-title":"Ransomware payments in the bitcoin ecosystem","volume":"5","author":"paquet-clouston","year":"2019","journal-title":"Cybersecurity"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1126\/science.287.5461.2115a"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316229"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of Scaling in Random Networks","volume":"286","author":"barabasi","year":"1999","journal-title":"Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500052444"},{"key":"ref26","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1057\/gpp.2012.14"}],"event":{"name":"2020 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2020,11,16]]},"end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9493214\/9493247\/09493256.pdf?arnumber=9493256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:55:45Z","timestamp":1656345345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9493256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ecrime51433.2020.9493256","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}