{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:45:57Z","timestamp":1730267157134,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,3]]},"DOI":"10.1109\/imcom53663.2022.9721721","type":"proceedings-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T16:56:54Z","timestamp":1646067414000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Cybercriminals Strike Where It Hurts Most: SARS-Cov-2 Pandemic and its Influence on Critical Infrastructure Ransomware Attacks"],"prefix":"10.1109","author":[{"given":"Gatha","family":"Varma","sequence":"first","affiliation":[{"name":"Amity University,Amity Institute of Information Technology,Noida,India"}]},{"given":"Ritu","family":"Chauhan","sequence":"additional","affiliation":[{"name":"Amity University,Center of Computational Biology &#x0026; Bioinformatics,Noida,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICRITO48877.2020.9197989"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICGS3.2019.8688299"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3057039.3057076"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/S1361-3723(18)30065-4"},{"key":"ref14","first-page":"329","article-title":"RANSOMWARE IN INDUSTRIAL CONTROL SYSTEMS. WHAT COMES AFTER WANNACRY AND PETYA GLOBAL ATTACKS?","volume":"174","author":"branquinho","year":"2018","journal-title":"WIT Trans Built Environ"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1111\/risa.12844"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.3390\/computers8040079"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1201\/9781003148715"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/s20247068"},{"year":"2020","author":"khan","article-title":"Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ACCESS.2018.2817560"},{"year":"0","author":"rege","article-title":"Ransomware Attacks Against Critical Infrastructure","key":"ref3"},{"year":"0","article-title":"Critical Infrastructure Ransomware Attacks &#x2013; CARE Lab: Cybersecurity in Application, Research & Education Laboratory","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.18559\/ebr.2019.2.2"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/S1353-4858(20)30106-9"},{"year":"0","article-title":"Critical Infrastructure Ransomware Attacks &#x2013; CARE Lab: Cybersecurity in Application, Research & Education Laboratory","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.3390\/s21041527"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.2139\/ssrn.3565901"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-030-60618-3_5"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1093\/intqhc\/mzaa117"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CyberSA52016.2021.9478239"},{"key":"ref21","article-title":"INVESTIGATING THE RANSOMWARE INFECTION RATE OF K12 SCHOOL DISTRICTS DURING THE COVID PANDEMIC","author":"lopez","year":"2021","journal-title":"Electron Theses Proj Diss"},{"key":"ref24","first-page":"325","article-title":"The Rise in Popularity of Cryptocurrency and Associated Criminal Activity","volume":"30","author":"kethineni","year":"2019"},{"key":"ref23","first-page":"21","article-title":"Russia&#x2019;s Critical Infrastructure Policy: What do we Know About it?","volume":"6","author":"pursiainen","year":"0","journal-title":"Eur J Secur Res 2020 61"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/MITP.2017.3680961"}],"event":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","start":{"date-parts":[[2022,1,3]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,1,5]]}},"container-title":["2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9721625\/9721626\/09721721.pdf?arnumber=9721721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T17:10:41Z","timestamp":1655745041000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9721721\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/imcom53663.2022.9721721","relation":{},"subject":[],"published":{"date-parts":[[2022,1,3]]}}}