{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:10:43Z","timestamp":1764238243775,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,20]]},"DOI":"10.1109\/icca56443.2022.10039632","type":"proceedings-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T19:11:38Z","timestamp":1676401898000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["The Evolution of Cryptocurrency and Cyber Attacks"],"prefix":"10.1109","author":[{"given":"Hala Strohmier","family":"Berry","sequence":"first","affiliation":[{"name":"College of Sciences and Engineering, University of South Carolina Aiken,South Carolina,USA"}]}],"member":"263","reference":[{"journal-title":"High-impact ransomware attacks threaten u.s. businesses and organizations","year":"2019","author":"Announcement","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.20470\/jsi.v9i1.335"},{"key":"ref3","article-title":"The genesis files: how david chaums ecash spawned a cypherpunk dream","volume":"24","author":"Wirdum","year":"2018","journal-title":"Bitcoin magazine"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v1i2.474"},{"volume-title":"How money got free: bitcoin and the fight for the future of finance","year":"2017","author":"Eha","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4324\/9780429201479"},{"journal-title":"Palantirs surveillance empire: A story of american policing, patriotism, and profit","author":"Gutman","key":"ref7"},{"key":"ref8","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Business Review"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOTEH.2018.8345547"},{"key":"ref10","article-title":"Monero - privacy in the blockchain","author":"Alonso","year":"2018","journal-title":"Cryptology ePrint Archive, Paper 2018\/535"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1436"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461084"},{"issue":"37","key":"ref13","first-page":"2","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin","year":"2014","journal-title":"white paper"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00123-0"},{"key":"ref17","article-title":"Types of blockchain: Public, private, or something in between","author":"Wegrzyn","year":"2021","journal-title":"Foley&Lardner llp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100013"},{"key":"ref20","article-title":"Citadel trojan malware analysis","author":"Milletary","year":"2012","journal-title":"Dell SecureWorks"},{"key":"ref21","first-page":"2014","article-title":"Cryptolocker ransomware","volume":"20","author":"Jarvis","year":"2013","journal-title":"Viitattu"},{"volume-title":"The lifecycle of peer-to-peer (gameover) zeus","year":"2012","author":"Stone-Gross","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100233"},{"journal-title":"A brief history of ransomware","year":"2015","author":"Laffan","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"ref27","article-title":"Ransomware in windows and android platforms","author":"Alzahrani","year":"2020","journal-title":"arXiv preprint"}],"event":{"name":"2022 International Conference on Computer and Applications (ICCA)","start":{"date-parts":[[2022,12,20]]},"location":"Cairo, Egypt","end":{"date-parts":[[2022,12,22]]}},"container-title":["2022 International Conference on Computer and Applications (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10038978\/10039482\/10039632.pdf?arnumber=10039632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:38:48Z","timestamp":1707831528000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10039632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,20]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icca56443.2022.10039632","relation":{},"subject":[],"published":{"date-parts":[[2022,12,20]]}}}