{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T17:39:42Z","timestamp":1769103582945,"version":"3.49.0"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Alice Wallenberg Foundation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tdsc.2025.3532324","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T13:30:50Z","timestamp":1737466250000},"page":"3449-3464","source":"Crossref","is-referenced-by-count":4,"title":["Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations"],"prefix":"10.1109","volume":"22","author":[{"given":"Marco","family":"Venturini","sequence":"first","affiliation":[{"name":"Department of Mathematics, University of Padova, Padova, Italy"}]},{"given":"Francesco","family":"Freda","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padova, Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6327-6637","authenticated-orcid":false,"given":"Emanuele","family":"Miotto","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padova, Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padova, Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9293-7711","authenticated-orcid":false,"given":"Alberto","family":"Giaretta","sequence":"additional","affiliation":[{"name":"Department of Computer Science, &#x00D6;rebro University, &#x00D6;rebro, Sweden"}]}],"member":"263","reference":[{"key":"ref1","article-title":"2022 sonicwall cyber threat report","year":"2022"},{"key":"ref2","article-title":"Number of newly discovered ransomware families worldwide from 2015 to 2020","year":"2021"},{"key":"ref3","article-title":"Number of newly discovered ransomware families worldwide from 2015 to 2020","year":"2021"},{"key":"ref4","article-title":"Dax-c\u00f4te d\u2019argent hospital in france hit by ransomware attack","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102377"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102691"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939214"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491637"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2011.41"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411617080041"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3257-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931136"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3114148"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36802-9_20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62974-8_12"},{"key":"ref22","volume-title":"An introduction to numerical analysis","author":"Atkinson","year":"2008"},{"key":"ref23","article-title":"Gomitolof\/daa-for-ransomware-detection: Ransomware detection using shannon entropy and differential area analysis of the files","year":"2024"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11077775\/10848306.pdf?arnumber=10848306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T22:48:57Z","timestamp":1752274137000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10848306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":23,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3532324","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}