{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:03Z","timestamp":1773511083069,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1564097,2026945,2038029"],"award-info":[{"award-number":["1564097,2026945,2038029"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3452766","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:37Z","timestamp":1624036957000},"page":"2691-2695","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SRA: Smart Recovery Advisor for Cyber Attacks"],"prefix":"10.1145","author":[{"given":"Ka-Ho","family":"Chow","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Umesh","family":"Deshpande","sequence":"additional","affiliation":[{"name":"IBM Research - Almaden, San Jose, CA, USA"}]},{"given":"Sangeetha","family":"Seshadri","sequence":"additional","affiliation":[{"name":"IBM Research - Almaden, San Jose, CA, USA"}]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"e_1_3_2_2_2_1","first-page":"3","article-title":"STL: A Seasonal-trend Decomposition","volume":"6","author":"Cleveland Robert B","year":"1990","unstructured":"Robert B Cleveland , William S Cleveland , Jean E McRae , and Irma Terpenning . 1990 . STL: A Seasonal-trend Decomposition . Journal of Official Statistics , Vol. 6 , 1 (1990), 3 -- 73 . Robert B Cleveland, William S Cleveland, Jean E McRae, and Irma Terpenning. 1990. STL: A Seasonal-trend Decomposition. Journal of Official Statistics , Vol. 6, 1 (1990), 3--73.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_2_3_1","volume-title":"Ransomware-aware Filesystem. In Annual Conference on Computer Security Applications (ACSAC) .","author":"Continella Andrea","year":"2016","unstructured":"Andrea Continella , Alessandro Guagnelli , Giovanni Zingaro , Giulio De Pasquale , Alessandro Barenghi , Stefano Zanero , and Federico Maggi . 2016 . ShieldFS: A Self-healing , Ransomware-aware Filesystem. In Annual Conference on Computer Security Applications (ACSAC) . Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, and Federico Maggi. 2016. ShieldFS: A Self-healing, Ransomware-aware Filesystem. In Annual Conference on Computer Security Applications (ACSAC) ."},{"key":"e_1_3_2_2_4_1","unstructured":"Coveware. 2020. Q4 Ransomware Marketplace Report. https:\/\/www.coveware.com\/blog\/2020\/1\/22\/ransomware-costs-double-in-q4-as-ryuk-sodinokibi-proliferate .  Coveware. 2020. Q4 Ransomware Marketplace Report. https:\/\/www.coveware.com\/blog\/2020\/1\/22\/ransomware-costs-double-in-q4-as-ryuk-sodinokibi-proliferate ."},{"key":"e_1_3_2_2_5_1","unstructured":"EY. 2019. Surviving Extreme Digital Disruption. https:\/\/www.ey.com\/en_us\/consulting\/how-to-better-prepare-for-cyberattacks .  EY. 2019. Surviving Extreme Digital Disruption. https:\/\/www.ey.com\/en_us\/consulting\/how-to-better-prepare-for-cyberattacks ."},{"key":"e_1_3_2_2_6_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han Jiawei","year":"2011","unstructured":"Jiawei Han , Jian Pei , and Micheline Kamber . 2011 . Data Mining: Concepts and Techniques . Elsevier . Jiawei Han, Jian Pei, and Micheline Kamber. 2011. Data Mining: Concepts and Techniques .Elsevier."},{"key":"e_1_3_2_2_7_1","volume-title":"USENIX Security Symposium .","author":"Kharaz Amin","year":"2016","unstructured":"Amin Kharaz , Sajjad Arshad , Collin Mulliner , William Robertson , and Engin Kirda . 2016 . UNVEIL: A Large-scale, Automated Approach to Detecting Ransomware . In USENIX Security Symposium . Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. UNVEIL: A Large-scale, Automated Approach to Detecting Ransomware. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_8_1","volume-title":"Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment .","author":"Kharraz Amin","year":"2015","unstructured":"Amin Kharraz , William Robertson , Davide Balzarotti , Leyla Bilge , and Engin Kirda . 2015 . Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment . Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, and Engin Kirda. 2015. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment ."},{"key":"e_1_3_2_2_9_1","volume-title":"Architectures for Controller Based CDP. In USENIX Conference on File and Storage Technologies (FAST) .","author":"Laden Guy","year":"2007","unstructured":"Guy Laden , Paula Ta-Shma , Eitan Yaffe , Michael Factor , and Shachar Fienblit . 2007 . Architectures for Controller Based CDP. In USENIX Conference on File and Storage Technologies (FAST) . Guy Laden, Paula Ta-Shma, Eitan Yaffe, Michael Factor, and Shachar Fienblit. 2007. Architectures for Controller Based CDP. In USENIX Conference on File and Storage Technologies (FAST) ."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30096-4"},{"key":"e_1_3_2_2_11_1","unstructured":"NewsCred. 2018. 11 Ways Ransomware is Evolving. https:\/\/insights.samsung.com\/2018\/04\/11\/11-ways-ransomware-is-evolving\/.  NewsCred. 2018. 11 Ways Ransomware is Evolving. https:\/\/insights.samsung.com\/2018\/04\/11\/11-ways-ransomware-is-evolving\/."},{"key":"e_1_3_2_2_12_1","unstructured":"Nyotron. 2019. RIPlace Evasion Technique. https:\/\/www.zerto.com\/protect\/business-running-with-no-downtime\/.  Nyotron. 2019. RIPlace Evasion Technique. https:\/\/www.zerto.com\/protect\/business-running-with-no-downtime\/."},{"key":"e_1_3_2_2_13_1","unstructured":"Oracle. 2020. Database Cyber-Attack Protection with Zero Data Loss Recovery Appliance. https:\/\/blogs.oracle.com\/maa\/db-cyber-attack-protection-with-zdlra .  Oracle. 2020. Database Cyber-Attack Protection with Zero Data Loss Recovery Appliance. https:\/\/blogs.oracle.com\/maa\/db-cyber-attack-protection-with-zdlra ."},{"key":"e_1_3_2_2_14_1","volume-title":"SRCMap: Energy Proportional Storage Using Dynamic Consolidation. In USENIX Conference on File and Storage Technologies (FAST) .","author":"Verma Akshat","year":"2010","unstructured":"Akshat Verma , Ricardo Koller , Luis Useche , and Raju Rangaswami . 2010 . SRCMap: Energy Proportional Storage Using Dynamic Consolidation. In USENIX Conference on File and Storage Technologies (FAST) . Akshat Verma, Ricardo Koller, Luis Useche, and Raju Rangaswami. 2010. SRCMap: Energy Proportional Storage Using Dynamic Consolidation. In USENIX Conference on File and Storage Technologies (FAST) ."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.154"},{"key":"e_1_3_2_2_16_1","first-page":"753","article-title":"ST-CDP","volume":"61","author":"Yang Jing","year":"2011","unstructured":"Jing Yang , Qiang Cao , Xu Li , Changsheng Xie , and Qing Yang . 2011 . ST-CDP : Snapshots in TRAP for Continuous Data Protection. IEEE Trans. Comput. , Vol. 61 , 6 (2011), 753 -- 766 . Jing Yang, Qiang Cao, Xu Li, Changsheng Xie, and Qing Yang. 2011. ST-CDP: Snapshots in TRAP for Continuous Data Protection. IEEE Trans. Comput. , Vol. 61, 6 (2011), 753--766.","journal-title":"Snapshots in TRAP for Continuous Data Protection. IEEE Trans. Comput."},{"key":"e_1_3_2_2_17_1","unstructured":"ZDNet. 2020. Hacker Ransoms 23k MongoDB Databases and Threatens to Contact GDPR Authorities. https:\/\/www.zdnet.com\/article\/hacker-ransoms-23k-mongodb-databases-and-threatens-to-contact-gdpr-authorities .  ZDNet. 2020. Hacker Ransoms 23k MongoDB Databases and Threatens to Contact GDPR Authorities. https:\/\/www.zdnet.com\/article\/hacker-ransoms-23k-mongodb-databases-and-threatens-to-contact-gdpr-authorities ."},{"key":"e_1_3_2_2_18_1","unstructured":"Zerto. [n.d.]. Mitigate Downtime and Data Loss. https:\/\/www.zerto.com\/protect\/business-running-with-no-downtime\/.  Zerto. [n.d.]. Mitigate Downtime and Data Loss. https:\/\/www.zerto.com\/protect\/business-running-with-no-downtime\/."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3452766","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3452766","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3452766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:14Z","timestamp":1750193354000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3452766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":18,"alternative-id":["10.1145\/3448016.3452766","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3452766","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}