{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:32:22Z","timestamp":1740115942090,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T00:00:00Z","timestamp":1737244800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T00:00:00Z","timestamp":1737244800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,19]]},"DOI":"10.1109\/iceic64972.2025.10879685","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:17:22Z","timestamp":1739902642000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Defense and Recovery Strategies for Flash-Based Storage Under Ransomware Attacks: A Survey"],"prefix":"10.1109","author":[{"given":"Junhong","family":"Yin","sequence":"first","affiliation":[{"name":"Major in. Bio Artificial Intelligence, Hanyang University,Dept. Computer Science and Engineering,Ansan,Korea"}]},{"given":"Kyungtae","family":"Kang","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept. Artificial Intelligence,Ansan,Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-119"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40554-4_10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3607505.3607510"},{"volume-title":"Statistics report","key":"ref5"},{"first-page":"757","volume-title":"{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware","author":"Kharaz","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS56967.2023.10142360"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507773"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2883431"},{"key":"ref12","first-page":"1","article-title":"RansomBlocker: A low-overhead ransomware-proof SSD","volume-title":"Proceedings of the 56th Annual Design Automation Conference","author":"Park","year":"2019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300041"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337206"},{"key":"ref15","article-title":"Design Tradeoffs for SSD Perfor-mance","author":"Agrawal","year":"2008","journal-title":"USENIX ATC"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9431-5"},{"key":"ref17","first-page":"375","article-title":"{FlashBlox}: Achieving Both Perfor-mance Isolation and Uniform Lifetime for Virtualized {SSDs}","volume-title":"15th USENIX Conference on File and Storage Technologies (FAST 17)","author":"Huang"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446733"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134035"},{"volume-title":"VirusTotal","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303983"}],"event":{"name":"2025 International Conference on Electronics, Information, and Communication (ICEIC)","start":{"date-parts":[[2025,1,19]]},"location":"Osaka, Japan","end":{"date-parts":[[2025,1,22]]}},"container-title":["2025 International Conference on Electronics, Information, and Communication (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10879455\/10879601\/10879685.pdf?arnumber=10879685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:00:59Z","timestamp":1740081659000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10879685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,19]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iceic64972.2025.10879685","relation":{},"subject":[],"published":{"date-parts":[[2025,1,19]]}}}