{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:19:58Z","timestamp":1778948398846,"version":"3.51.4"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,22]]},"DOI":"10.1109\/idaacs53288.2021.9660913","type":"proceedings-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T15:41:22Z","timestamp":1641397282000},"page":"284-287","source":"Crossref","is-referenced-by-count":7,"title":["Ransomware Prevention System Design based on File Symbolic Linking Honeypots"],"prefix":"10.1109","author":[{"given":"Danyil","family":"Zhuravchak","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taras","family":"Ustyianovych","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Valery","family":"Dudykevych","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bogdan","family":"Venny","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khrystyna","family":"Ruda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"An IoT honeynet based on multi-port honeypots for capturing IoT attacks","author":"zhang","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref11","first-page":"5","article-title":"Ransomware attacks: detection, prevention and cure","author":"ross","year":"2016","journal-title":"Network Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.15587\/1729-4061.2019.166349"},{"key":"ref13","first-page":"242","article-title":"Analysis of the use of software baits as a means of ensuring information security","volume":"2","author":"vasylyshyn","year":"0","journal-title":"Proceedings of the 2020 IEEE 15th International Scientific and Technical Conference on Computer Sciences and Information Technologies CSIT 2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2017.12.05"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00384-0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308387"},{"key":"ref19","article-title":"Efficient and effective ransomware detection in databases","author":"hagen","year":"0","journal-title":"Proceedings of the Annu Comput Secur Appl Conf(ACSAC)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.10.07"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-030-22038-9_11","article-title":"On deception-based protection against cryptographic ransomware","author":"gen\u00e7","year":"2019","journal-title":"Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment"},{"key":"ref6","first-page":"116","article-title":"A comprehensive survey: ransomware attacks prevention, monitoring and damage control","volume":"4","author":"tailor","year":"2017","journal-title":"International Journal of Innovative Research in Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890056"},{"key":"ref8","author":"adler","year":"2020","journal-title":"Incident of the Week Garmin Pays $10 Million To Ransomware Hackers who Rendered Systems Useless"},{"key":"ref7","author":"kwan","year":"2021","journal-title":"Acer reportedly targeted with $50 million ransomware attack"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040668"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023764"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.461"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.14"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CITSM47753.2019.8965419"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888409"},{"key":"ref24","author":"drakatos","year":"2017","journal-title":"JavaRansomware [Source code]"},{"key":"ref23","article-title":"GonnaCry Rasomware [Source code]","year":"2020","journal-title":"Tarcisio-Marinho"},{"key":"ref25","article-title":"leonv024","author":"voerman","year":"2020","journal-title":"RAASNet [Source code]"}],"event":{"name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","location":"Cracow, Poland","start":{"date-parts":[[2021,9,22]]},"end":{"date-parts":[[2021,9,25]]}},"container-title":["2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9660827\/9660390\/09660913.pdf?arnumber=9660913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:56:50Z","timestamp":1652187410000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/idaacs53288.2021.9660913","relation":{},"subject":[],"published":{"date-parts":[[2021,9,22]]}}}