{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:37:32Z","timestamp":1770140252746,"version":"3.49.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"19","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972048"],"award-info":[{"award-number":["61972048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976024"],"award-info":[{"award-number":["61976024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072051"],"award-info":[{"award-number":["62072051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/jiot.2022.3156571","type":"journal-article","created":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T20:25:13Z","timestamp":1646425513000},"page":"18251-18266","source":"Crossref","is-referenced-by-count":11,"title":["KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys"],"prefix":"10.1109","volume":"9","author":[{"given":"Senmiao","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6405-6711","authenticated-orcid":false,"given":"Sujuan","family":"Qin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1546-4364","authenticated-orcid":false,"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Tengfei","family":"Tu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Ana","family":"Shen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Wentao","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13050861"},{"key":"ref2","volume-title":"Overview of China\u2019s Internet network security situation in 2019","year":"2020"},{"key":"ref3","volume-title":"Inventory: Blackmail virus disaster in 2019","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-020-00987-8"},{"key":"ref5","volume-title":"Spam and Criminal Activity: Trends and Issues in Crime and Criminal Justice (Australian Institute of Criminology) 2016, no. 52, RegNet Research Paper No. 2014\/44","author":"Alazab","year":"2015"},{"key":"ref6","volume-title":"Mass Mikrotik Router Infection\u2014First We Cryptojack Brazil, Then We Take the World?","author":"Kenin","year":"2018"},{"key":"ref7","volume-title":"200,000+ Mikrotik Routers Worldwide Have Been Compromised to Inject Cryptojacking Malware","author":"Mursch","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407044"},{"key":"ref9","volume-title":"Fake Super Mario Run App Steals Credit Card Information","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(19)30004-1"},{"key":"ref11","volume-title":"Avast Highlights the Threat Landscape for 2019","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2981693"},{"key":"ref13","volume-title":"Fake Alexa Setup App Is Topping Apple\u2019s App Store Charts","year":"2018"},{"key":"ref14","volume-title":"Scam iOS Apps Promise Fitness, Steal Money Instead","year":"2018"},{"key":"ref15","volume-title":"Gartner Says 8.4 Billion Connected \u2018Things\u2019 Will be in Use in 2017, Up 31 Percent From 2016","year":"2017"},{"key":"ref16","volume-title":"Research on privacy protection methods on Android platform","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3027568"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899578"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3084753"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2946735"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787905"},{"key":"ref23","volume-title":"Android ransomware detection method based on evidence chain","year":"2021"},{"key":"ref24","volume-title":"Statistical results of Android root devices","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"ref26","volume-title":"Koodous","year":"2020"},{"key":"ref27","volume-title":"Virustotal","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app11146557"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080868"},{"key":"ref31","volume-title":"SDGuard: Detection for privacy disclosure and encryption ransomware based on log analysis","year":"2019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12146-4_18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75650-9_16"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36802-9_20"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3257-z"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.14"},{"key":"ref39","volume-title":"Freebuf","year":"2021"},{"key":"ref40","volume-title":"52pojie","year":"2021"},{"key":"ref41","volume-title":"Trendmicro","year":"2021"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtcvs.2020.01.011"},{"key":"ref44","volume-title":"New Android Trojan \u2018Xbot\u2019 Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom [EB\/OL]","author":"Zheng","year":"2021"},{"key":"ref45","volume-title":"Mobile Threat Response Team. Slocker Mobile Ransomware Starts Mimicking Wannacry [EB\/OL]","year":"2020"},{"key":"ref46","volume-title":"The introduction of DoubleLocker","year":"2020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT50332.2020.9300108"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CCET52649.2021.9544366"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65745-1_23"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108011"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57077-4_1"},{"key":"ref53","volume-title":"Application and development of Linux in DVR system","year":"2021"},{"key":"ref54","volume-title":"Uncover investment opportunities of Xiaomi IOT ecological chain","year":"2021"},{"key":"ref55","volume-title":"The market share of TP-LINK","year":"2021"},{"key":"ref56","volume-title":"Ranking of router market share in March 2021","year":"2021"},{"key":"ref57","volume-title":"The introduction of inotifywait","year":"2021"},{"key":"ref58","volume-title":"Ranking of camera market share in 2020","year":"2021"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_11"},{"key":"ref60","volume-title":"The sales volume of Xiaomi outdoor cameras","year":"2021"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9899827\/09728750.pdf?arnumber=9728750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:02:50Z","timestamp":1705532570000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":59,"journal-issue":{"issue":"19"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3156571","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}