{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:42:53Z","timestamp":1730274173097,"version":"3.28.0"},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/isi.2017.8004894","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T20:42:42Z","timestamp":1502397762000},"page":"149-151","source":"Crossref","is-referenced-by-count":12,"title":["Reasoning crypto ransomware infection vectors with Bayesian networks"],"prefix":"10.1109","author":[{"given":"Aaron","family":"Zimba","sequence":"first","affiliation":[]},{"given":"Zhaoshun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongsong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection","volume":"3020","author":"sgandurra","year":"2016","journal-title":"arXiv preprint arXiv 1609 09861"},{"journal-title":"Special Report Ransomware and Businesses","year":"0","key":"ref3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544924"},{"key":"ref2","first-page":"303","article-title":"Cryptolock (and drop it): stopping ransomware attacks on user data","author":"nolen","year":"2016","journal-title":"Distributed Computing Systems (ICDCS) 2016 IEEE 36th International Conference"},{"journal-title":"Crimeware Understanding New Attacks and Defenses","year":"2008","author":"markus","key":"ref1"}],"event":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2017,7,22]]},"location":"Beijing, China","end":{"date-parts":[[2017,7,24]]}},"container-title":["2017 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999198\/8004858\/08004894.pdf?arnumber=8004894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T04:26:00Z","timestamp":1504067160000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8004894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/isi.2017.8004894","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}