{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T15:58:25Z","timestamp":1769529505738,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11252600","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"913-918","source":"Crossref","is-referenced-by-count":1,"title":["Design and Implementation of a Controlled Ransomware Framework for Educational Purposes Using Flutter Cryptographic APIs on Desktop PCs and Android Devices"],"prefix":"10.1109","author":[{"given":"James","family":"Gu","sequence":"first","affiliation":[{"name":"Algoma University,School of Computer Science &amp; Technology,Canada"}]},{"given":"Ahmed","family":"Sartaj","sequence":"additional","affiliation":[{"name":"Algoma University,School of Computer Science &amp; Technology,Canada"}]},{"given":"Mohammed Akram Taher","family":"Khan","sequence":"additional","affiliation":[{"name":"Algoma University,School of Computer Science &amp; Technology,Canada"}]},{"given":"Rashid Hussain","family":"Khokhar","sequence":"additional","affiliation":[{"name":"Algoma University,School of Computer Science &amp; Technology,Canada"}]}],"member":"263","reference":[{"key":"ref1","first-page":"102490","article-title":"Ransomware: Recent advances, analysis, challenges and future research directions","volume-title":"Computers Security","volume":"111","author":"Beaman","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323682"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-019-0161-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502676"},{"key":"ref5","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref6","volume-title":"Ransomware: Defending against digital extortion.","author":"Liska","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC57344.2023.10099114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77028-4_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3688351.3689163"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3708514"},{"key":"ref11","first-page":"100078","article-title":"A comprehensive literature review on ransomware detection using deep learning","volume-title":"Cyber Security and Applications","volume":"3","author":"Kritika","year":"2025"},{"key":"ref12","article-title":"Android privacy and storage","year":"2025"},{"key":"ref13","article-title":"Access documents and other files from shared storage: App data and files","year":"2025"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","location":"Busan, Korea, Republic of","start":{"date-parts":[[2025,6,25]]},"end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11252600.pdf?arnumber=11252600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T18:23:16Z","timestamp":1764613396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11252600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11252600","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}