{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:34:22Z","timestamp":1725730462151},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10437039","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:45:36Z","timestamp":1708976736000},"page":"6037-6042","source":"Crossref","is-referenced-by-count":0,"title":["Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures"],"prefix":"10.1109","author":[{"given":"Amit Kumar","family":"Mishra","sequence":"first","affiliation":[{"name":"Graphic Era Hill University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[{"name":"King Abdullah II School of Information Technology, The University of Jordan,Amman,Jordan,11942"}]},{"given":"Harshit","family":"Bhajpai","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"Pranjal","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"Mohammad","family":"Wazid","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"D. P.","family":"Singh","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China),Qingdao,China,266555"}]},{"given":"Balqies","family":"Sadoun","sequence":"additional","affiliation":[{"name":"College of Engineering, Al- Balqa&#x0027; Applied University,Al-Salt,Jordan,19117"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2452897"},{"volume-title":"The NHS cyber attack","year":"2022","key":"ref2"},{"key":"ref3","first-page":"757","article-title":"UNVEIL: a large-scale, automated approach to detecting ransom ware","volume-title":"25th USENIX Conference on Security Symposium (SEC16)","author":"Kharraz"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2022.3208795"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2008.2002930"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s20051300"},{"article-title":"Electrum Bitcoin Wallet","volume-title":"Electrum","year":"2022","key":"ref9"},{"key":"ref10","article-title":"BitcoinHeist Ran-somware Address Dataset","volume-title":"BitcoinHeist Ransomware Address Dataset","author":"Akcora","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_32"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITECHN.2017.8281835"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907485"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","start":{"date-parts":[[2023,12,4]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10437039.pdf?arnumber=10437039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T01:02:12Z","timestamp":1709254932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10437039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10437039","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}