{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:30:52Z","timestamp":1771065052062,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009532","name":"Ministry of the Interior of the Czech Republic","doi-asserted-by":"publisher","award":["VK01030030"],"award-info":[{"award-number":["VK01030030"]}],"id":[{"id":"10.13039\/100009532","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/icumt61075.2023.10333283","type":"proceedings-article","created":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T18:18:37Z","timestamp":1701800317000},"page":"107-110","source":"Crossref","is-referenced-by-count":2,"title":["Ransomware File Detection Using Hashes and Machine Learning"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5488-2190","authenticated-orcid":false,"given":"Pavel","family":"Novak","sequence":"first","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czech Republic"}]},{"given":"Patrik","family":"Kaura","sequence":"additional","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7629-6299","authenticated-orcid":false,"given":"Vaclav","family":"Oujezsky","sequence":"additional","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8659-8645","authenticated-orcid":false,"given":"Tomas","family":"Horvath","sequence":"additional","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czech Republic"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3099084"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3112056"},{"key":"ref15","year":"2023","journal-title":"Circ"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.13164\/eeict.2022.194"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671434"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3207757"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0207"},{"key":"ref1","author":"jegou","year":"2018","journal-title":"Faiss A Library for Efficient Similarity Search"},{"key":"ref17","article-title":"Billion-scale similarity search with gpus","volume":"abs 1702 8734","author":"johnson","year":"2017","journal-title":"CoRR"},{"key":"ref16","year":"2023","journal-title":"Nist gov - computer security division - computer security resource center"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INCET51464.2021.9456440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CRC50527.2021.9392548"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3099084"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON54665.2022.9965664"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2022.3157208"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTA57148.2022.9990424"}],"event":{"name":"2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","location":"Ghent, Belgium","start":{"date-parts":[[2023,10,30]]},"end":{"date-parts":[[2023,11,1]]}},"container-title":["2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10333257\/10333092\/10333283.pdf?arnumber=10333283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T22:42:50Z","timestamp":1702420970000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10333283\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icumt61075.2023.10333283","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}