{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:23:01Z","timestamp":1767979381555,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/iconac.2017.8082013","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T21:36:33Z","timestamp":1509658593000},"page":"1-6","source":"Crossref","is-referenced-by-count":33,"title":["IoT based ransomware growth rate evaluation and detection using command and control blacklisting"],"prefix":"10.23919","author":[{"given":"Asma","family":"Zahra","sequence":"first","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","author":"burgess","year":"2014","journal-title":"Telstra Cyber Security Report"},{"key":"ref10","article-title":"Meet Ransomware for the Rest of Us-McAfee","author":"labs","year":"0","journal-title":"Blogs Mcafee Com"},{"key":"ref11","author":"great","year":"2015","journal-title":"Kaspersky Security Bulletin"},{"key":"ref12","year":"2016","journal-title":"Hospitals Nationwide Are Under Attack from Ransomware"},{"key":"ref13","first-page":"51","article-title":"Scalable, Behavior-Based Malware Clustering","volume":"272","author":"bayer","year":"2009","journal-title":"Sophia"},{"key":"ref14","author":"michael","year":"2007","journal-title":"Automated Classification and Analysis of Internet Malware"},{"key":"ref15","first-page":"139","article-title":"BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"SS'08 Proc 17th Conf Secur Symp"},{"key":"ref16","year":"0","journal-title":"The USENIX Association Computing Systems"},{"key":"ref17","first-page":"29","article-title":"JACKSTRAWS: picking command and control connections from bot traffic","author":"jacob","year":"2011","journal-title":"Proc of the 20th USENIX Conf on Security SEC'11"},{"key":"ref18","first-page":"757","article-title":"UNVEIL: A Large-Scale Automated Approach to Detecting Ransomware","author":"kharaz","year":"2016","journal-title":"Usenix Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2016.26.3.645"},{"key":"ref28","year":"2017","journal-title":"CTB-Locker encryption\/decryption scheme in details &#x201D; 2015"},{"key":"ref4","author":"symantec","year":"2015","journal-title":"The Evolution of Ransomware"},{"key":"ref27","author":"nieuwenhuizen","year":"0","journal-title":"A behavioural-based approach to r ansomware detection"},{"key":"ref3","author":"cabaj","year":"2015","journal-title":"Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics"},{"key":"ref6","author":"zunnurhain","year":"0","journal-title":"Vulnerabilities with Internet of Things"},{"key":"ref29","first-page":"16","year":"0","journal-title":"Ransomware Statistics A Scary Trend in Cyberattacks | Dale Shulmistra | Pulse | Linked Inransomware-statistics-20-scary-trend-dale-shulmistra"},{"key":"ref5","first-page":"1","article-title":"Influences on ransomwares evolution and predictions for the future challenges the future challenges","volume":"0","author":"kalaimannan","year":"2016","journal-title":"Technical cyber security"},{"key":"ref8","volume":"20","author":"corporation","year":"2015","journal-title":"2015 Internet security threat report"},{"key":"ref7","article-title":"Cloud-assisted Industrial Internet of Things (IIoT)-Enabled framework for health monitoring","author":"hossain","year":"2015","journal-title":"Computer Networks"},{"key":"ref2","author":"sgandurra","year":"2016","journal-title":"Automated Dynamic Analysis of Ransomware Benefits Limitations and use for Detection"},{"key":"ref9","first-page":"9","author":"europol","year":"2014","journal-title":"The Internet Organised Crime Threat Assessment"},{"key":"ref1","author":"jeyanthi","year":"0","journal-title":"Security breaches and threat prevention in the internet of things"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/1550147716662947"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600110NM"},{"key":"ref21","first-page":"26","article-title":"Behavioral clustering of HTTP-based malware and signature generation using malicious network traces","author":"perdisci","year":"2010","journal-title":"Proc 7th USENIX Conf Netw Syst Des Implement"},{"key":"ref24","first-page":"47","article-title":"Ransomware: Emergence of the cyber-extortion menace","volume":"2015","author":"hampton","year":"2015","journal-title":"Proc Austral Inf Secur Manage Conf"},{"key":"ref23","article-title":"Louis Lanet, Risks and Security of Internet and Systems 11th","author":"fr\u00e9d\u00e9ric","year":"2017","journal-title":"International Conference &#x2026;-Google Books Springer international publishing AG"},{"key":"ref26","year":"2017","journal-title":"Fortinet Blog-cerber ransomware"},{"key":"ref25","year":"0","journal-title":"Locky Ransomware-ENISA"}],"event":{"name":"2017 23rd International Conference on Automation and Computing (ICAC)","location":"Huddersfield, United Kingdom","start":{"date-parts":[[2017,9,7]]},"end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 23rd International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067274\/8081956\/08082013.pdf?arnumber=8082013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T20:44:03Z","timestamp":1512074643000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8082013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/iconac.2017.8082013","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}