{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:52:52Z","timestamp":1760709172092,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2989051","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1784-1786","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Manish","family":"Shukla","sequence":"first","affiliation":[{"name":"TCS Research, Pune, India"}]},{"given":"Sutapa","family":"Mondal","sequence":"additional","affiliation":[{"name":"TCS Research, Pune, India"}]},{"given":"Sachin","family":"Lodha","sequence":"additional","affiliation":[{"name":"TCS Research, Pune, India"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"volume-title":"An ISTR Special Report: Ransomware and Businesses","year":"2016","key":"e_1_3_2_1_1_1","unstructured":"Symantec. An ISTR Special Report: Ransomware and Businesses 2016 . http:\/\/goo.gl\/CjH90k, 2016. Symantec. An ISTR Special Report: Ransomware and Businesses 2016. http:\/\/goo.gl\/CjH90k, 2016."},{"key":"e_1_3_2_1_2_1","volume-title":"LA Hospital Pays Hackers After Ransomware Attack. https:\/\/goo.gl\/IVx60L","author":"Post Washington","year":"2016","unstructured":"Washington Post . LA Hospital Pays Hackers After Ransomware Attack. https:\/\/goo.gl\/IVx60L , 2016 . Washington Post. LA Hospital Pays Hackers After Ransomware Attack. https:\/\/goo.gl\/IVx60L, 2016."},{"key":"e_1_3_2_1_3_1","first-page":"129","volume-title":"Symposium on Security and Privacy","author":"Cryptovirology Young","year":"1996","unstructured":"Young et.al. Cryptovirology : Extortion-based security threats and countermeasures . In Symposium on Security and Privacy , pages 129 -- 140 . IEEE, 1996 . Young et.al. Cryptovirology: Extortion-based security threats and countermeasures. In Symposium on Security and Privacy, pages 129--140. IEEE, 1996."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Distributed Computing Systems. IEEE","author":"Scaife","year":"2016","unstructured":"Scaife et.al. Cryptolock (and drop it):stopping ransomware attacks on user data . In International Conference on Distributed Computing Systems. IEEE , 2016 . Scaife et.al. Cryptolock (and drop it):stopping ransomware attacks on user data. In International Conference on Distributed Computing Systems. IEEE, 2016."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium","author":"Unveil Kharraz","year":"2016","unstructured":"Kharraz et.al. Unveil : A large-scale, automated approach to detecting ransomware . USENIX Security Symposium , 2016 . Kharraz et.al. Unveil: A large-scale, automated approach to detecting ransomware. USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0157-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2810131"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2989051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:54Z","timestamp":1750218594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989051"}},"subtitle":["Locally Virtualized Environment for Mitigating Ransomware Threat"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":8,"alternative-id":["10.1145\/2976749.2989051","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2989051","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}