{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:24:06Z","timestamp":1775471046633,"version":"3.50.1"},"reference-count":63,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:00:00Z","timestamp":1557964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012511","name":"Escuela Polit\u00e9cnica Nacional","doi-asserted-by":"publisher","award":["PII-17-14"],"award-info":[{"award-number":["PII-17-14"]}],"id":[{"id":"10.13039\/501100012511","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>In recent years, cybercrime activities have grown significantly, compromising device security and jeopardizing the normal activities of enterprises. The profits obtained through intimidation and the limitations for tracking down the illegal transactions have created a lucrative business based on the hijacking of users\u2019 files. In this context, ransomware takes advantage of cryptography to compromise the user information or deny access to the operating system. Then, the attacker extorts the victim to pay a ransom in order to regain access, recover the data, or keep the information private. Nowadays, the adoption of Situational Awareness (SA) and cognitive approaches can facilitate the rapid identification of ransomware threats. SA allows knowing what is happening in compromised devices and network communications through monitoring, aggregation, correlation, and analysis tasks. The current literature provides some parameters that are monitored and analyzed in order to prevent these kinds of attacks at an early stage. However, there is no complete list of them. To the best of our knowledge, this paper is the first proposal that summarizes the parameters evaluated in this research field and considers the SA concept. Furthermore, there are several articles that tackle ransomware problems. However, there are few surveys that summarize the current situation in the area, not only regarding its evolution but also its issues and future challenges. This survey also provides a classification of ransomware articles based on detection and prevention approaches.<\/jats:p>","DOI":"10.3390\/rs11101168","type":"journal-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T11:21:22Z","timestamp":1558005682000},"page":"1168","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["A Survey on Situational Awareness of Ransomware Attacks\u2014Detection and Prevention Parameters"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4337-6908","authenticated-orcid":false,"given":"Juan A.","family":"Herrera Silva","sequence":"first","affiliation":[{"name":"Departamento de Inform\u00e1tica y Ciencias de la Computaci\u00f3n (DICC), Escuela Polit\u00e9cnica Nacional, Ladr\u00f3n de Guevara E11-25 y Andaluc\u00eda, Edificio de Sistemas, Quito 170525, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5184-3759","authenticated-orcid":false,"given":"Lorena Isabel","family":"Barona L\u00f3pez","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica y Ciencias de la Computaci\u00f3n (DICC), Escuela Polit\u00e9cnica Nacional, Ladr\u00f3n de Guevara E11-25 y Andaluc\u00eda, Edificio de Sistemas, Quito 170525, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3502-020X","authenticated-orcid":false,"given":"\u00c1ngel Leonardo","family":"Valdivieso Caraguay","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica y Ciencias de la Computaci\u00f3n (DICC), Escuela Polit\u00e9cnica Nacional, Ladr\u00f3n de Guevara E11-25 y Andaluc\u00eda, Edificio de Sistemas, Quito 170525, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4718-0400","authenticated-orcid":false,"given":"Myriam","family":"Hern\u00e1ndez-\u00c1lvarez","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica y Ciencias de la Computaci\u00f3n (DICC), Escuela Polit\u00e9cnica Nacional, Ladr\u00f3n de Guevara E11-25 y Andaluc\u00eda, Edificio de Sistemas, Quito 170525, Ecuador"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,16]]},"reference":[{"key":"ref_1","first-page":"80","article-title":"ISTR 2018","volume":"23","author":"Cleary","year":"2018","journal-title":"Internet Secur. Threat Rep.-Symantec"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","article-title":"Detecting Crypto-ransomware in IoT Networks based on Energy Consumption Footprint","volume":"9","author":"Azmoodeh","year":"2017","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"ref_3","unstructured":"Eset, E. (2018). ESET Security 2018, ESET. Technical Report."},{"key":"ref_4","unstructured":"O\u2019Brien, D. (2019, April 05). Ransomware 2017, An ISTR Special Report. Symantec. Available online: https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/white-papers\/istr-ransomware-2017-en.pdf."},{"key":"ref_5","unstructured":"Kumar, M.S., Ben-Othman, J., and Srinivasagan, K. (2018, January 25\u201328). An Investigation on Wannacry Ransomware and its Detection. Proceedings of the 2018 IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil."},{"key":"ref_6","unstructured":"Sgandurra, D., Mu\u00f1oz-Gonz\u00e1lez, L., Mohsen, R., and Lupu, E.C. (2016). Automated Dynamic Analysis of Ransomware: Benefits, Limitations and Use for Detection. arXiv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.procs.2016.08.072","article-title":"Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Caracterization","volume":"94","author":"Monika","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Bajpai, P., Sood, A.K., and Enbody, R. (2018, January 15\u201317). A Key-management-based Taxonomy for Ransomware. Proceedings of the 2018 APWG Symposium on Electronic Crime Research (eCrime), San Diego, CA, USA.","DOI":"10.1109\/ECRIME.2018.8376213"},{"key":"ref_9","unstructured":"Kelley, D. (2016). Cybesecurity in the Cognitive Era: Priming your Digital Immune System, IBM. Technical Report."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1177\/154193128803200221","article-title":"Design and Evaluation for Situation Awareness Enhancement","volume":"32","author":"Endsley","year":"1988","journal-title":"Proc. Hum. Factors Soc. Annu. Meet."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Conti, M., Gangwal, A., and Ruj, S. (2018). On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective. Comput. Secur.","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hernandez-Castro, J., Cartwright, E., and Stepanova, A. (2017). Economic Analysis of Ransomware. arXiv.","DOI":"10.2139\/ssrn.2937641"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Gangwar, K., Mohanty, S., and Mohapatra, A. (2017, January 13\u201314). Analysis and Detection of Ransomware Through Its Delivery Methods. Proceedings of the International Conference on Recent Developments in Science, Engineering and Technology, Gurgaon, India.","DOI":"10.1007\/978-981-10-8527-7_29"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Moore, C. (2016, January 2\u20134). Detecting Ransomware with Honeypot Techniques. Proceedings of the 2016 Cybersecurity and Cyberforensics Conference (CCC), Amman, Jordan.","DOI":"10.1109\/CCC.2016.14"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zahra, A., and Shah, M.A. (2017, January 7\u20138). IoT based Ransomware Growth Rate Evaluation and Detection using Command and Control Blacklisting. Proceedings of the 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, UK.","DOI":"10.23919\/IConAC.2017.8082013"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Alhawi, O.M., Baldwin, J., and Dehghantanha, A. (2018). Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection. Cyber Threat Intelligence, Springer.","DOI":"10.1007\/978-3-319-73951-9_5"},{"key":"ref_17","first-page":"44","article-title":"Ransomware Behavioural Analysis on Windows Platforms","volume":"40","author":"Hampton","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lu, T., Zhang, L., Wang, S., and Gong, Q. (2017, January 15\u201317). Ransomware Detection based on V-detector Negative Selection Algorithm. Proceedings of the 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), Shenzhen, China.","DOI":"10.1109\/SPAC.2017.8304335"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Jung, S., and Won, Y. (2018). Ransomware Detection Method based on Context-aware Entropy Analysis. Soft Computing, Springer.","DOI":"10.1007\/s00500-018-3257-z"},{"key":"ref_20","first-page":"82","article-title":"Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection","volume":"10","author":"Maarof","year":"2018","journal-title":"Int. J. Integr. Eng."},{"key":"ref_21","unstructured":"Alam, M., Bhattacharya, S., Mukhopadhyay, D., and Chattopadhyay, A. (2018). RAPPER: Ransomware Prevention via Performance Counters. arXiv."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.cose.2017.11.019","article-title":"R-Locker: Thwarting Ransomware Action through a Honeyfile-based Approach","volume":"73","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.compeleceng.2017.10.012","article-title":"Software-defined Networking-based Crypto Ransomware Detection using HTTP Traffic Characteristics","volume":"66","author":"Cabaj","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_24","unstructured":"Kharraz, A., Arshad, S., Mulliner, C., Robertson, W.K., and Kirda, E. (2016, January 10\u201312). UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. Proceedings of the USENIX Security Symposium, Austin, TX, USA."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chen, Z.G., Kang, H.S., Yin, S.N., and Kim, S.R. (2017, January 20\u201323). Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph. Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland.","DOI":"10.1145\/3129676.3129704"},{"key":"ref_26","unstructured":"Kardile, A.B. (2017). Crypto Ransomware Analysis and Detection Using Process Monitor. [Ph.D. Thesis, UT-Arlington]."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Maniath, S., Ashok, A., Poornachandran, P., Sujadevi, V., Sankar, A.P., and Jan, S. (2017, January 26\u201327). Deep Learning LSTM based Ransomware Detection. Proceedings of the 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE), Noida, India.","DOI":"10.1109\/RDCAPE.2017.8358312"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Kolodenker, E., Koch, W., Stringhini, G., and Egele, M. (2017, January 2\u20136). PayBreak: Defense against Cryptographic Ransomware. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, UAE.","DOI":"10.1145\/3052973.3053035"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Takeuchi, Y., Sakai, K., and Fukumoto, S. (2018, January 13\u201316). Detecting Ransomware using Support Vector Machines. Proceedings of the 47th International Conference on Parallel Processing Companion, Eugene, OR, USA.","DOI":"10.1145\/3229710.3229726"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Thomas, J., and Galligher, G. (2018). Improving Backup System Evaluations in Information Security Risk Assessments to Combat Ransomware. Computer and Information Science, CCSE.","DOI":"10.5539\/cis.v11n1p14"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K., Velan, K.S., and Ganorkar, S. (2017, January 13\u201316). Evaluating shallow and deep networks for ransomware detection and classification. Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India.","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kwon, I., and Im, E.G. (2017, January 20\u201323). Extracting the Representative API Call Patterns of Malware Families Using Recurrent Neural Network. Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland.","DOI":"10.1145\/3129676.3129712"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1049\/iet-net.2017.0207","article-title":"Evolution of Ransomware","volume":"7","author":"Sezer","year":"2018","journal-title":"IET Netw."},{"key":"ref_34","first-page":"80","article-title":"Ransomware: Evolution, Target and Safety Measures","volume":"6","author":"Mauraya","year":"2017","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_35","unstructured":"Sotelo, M., Maestre, J., and Garc\u00eda, L. (2018, January 27\u201330). A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Al-rimy, B.A.S., Maarof, M.A., and Shaid, S.Z.M. (2017, January 23\u201324). A 0-day aware Crypto-ransomware early Behavioral Detection Framework. Proceedings of the International Conference of Reliable Information and Communication Technology, Johor Bahru, Malaysia.","DOI":"10.1007\/978-3-319-59427-9_78"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","article-title":"Classification of Ransomware Families with Machine Learning based on N-gram of Opcodes","volume":"90","author":"Zhang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1007\/s10207-017-0398-5","article-title":"Talos: No more Ransomware Victims with Formal Methods","volume":"17","author":"Cimitile","year":"2018","journal-title":"Int. J. Inf. Secur."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., Aliapoulios, M.M., Li, V.G., Invernizzi, L., Bursztein, E., McRoberts, K., Levin, J., Levchenko, K., Snoeren, A.C., and McCoy, D. (2018, January 20\u201324). Tracking Ransomware End-to-end. Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2018.00047"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.eswa.2018.02.039","article-title":"Trusted Detection of Ransomware in a Private Cloud using Machine Learning Methods leveraging Meta-features from Volatile Memory","volume":"102","author":"Cohen","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.future.2018.07.045","article-title":"DRTHIS: Deep Ransomware Threat Hunting and Intelligence System at the Fog Layer","volume":"90","author":"Homayoun","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Wang, Z., Liu, C., Qiu, J., Tian, Z., Cui, X., and Su, S. (2018). Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wirel. Commun. Mob. Comput., 2018.","DOI":"10.1155\/2018\/7943586"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","article-title":"Ransomware threat Success Factors, Taxonomy, and Countermeasures: A Survey and Research Directions","volume":"74","author":"Maarof","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"El-Kosairy, A., and Azer, M.A. (2018, January 4\u20136). Intrusion and Ransomware Detection System. Proceedings of the 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia.","DOI":"10.1109\/CAIS.2018.8471688"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Kim, D.Y., Choi, G.Y., and Lee, J.H. (2018, January 12\u201314). White list-based Ransomware Real-time Detection and Prevention for User Device Protection. Proceedings of the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2018.8326119"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Honda, T., Mukaiyama, K., Shirai, T., Ohki, T., and Nishigaki, M. (2018, January 16\u201318). Ransomware Detection Considering User\u2019s Document Editing. Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Pedagogical University of Cracow, Cracow, Poland.","DOI":"10.1109\/AINA.2018.00133"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Saleem, J., Adebisi, B., Ande, R., and Hammoudeh, M. (2017, January 19\u201320). A State of the Art Survey-impact of Cyber Attacks on SME\u2019s. Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS), Cambridge, UK. Art. No. 52.","DOI":"10.1145\/3102304.3109812"},{"key":"ref_48","unstructured":"RAMSES (2019, January 05). RAMSES: Internet Forensic Platform for Tracking the Money Flow of Financially-motivated Malware. Available online: https:\/\/ramses2020.eu."},{"key":"ref_49","unstructured":"CYBECO (2019, January 09). Supporting Cyberinsurance from a Behavioural Choice Perspective. Available online: https:\/\/www.cybeco.eu\/."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Pillai, A., Kadikar, R., Vasanthi, M., and Amutha, B. (2018, January 3\u20135). Analysis of AES-CBC Encryption for Interpreting Crypto-Wall Ransomware. Proceedings of the 2018 International Conference on Communication and Signal Processing, Chennai, India.","DOI":"10.1109\/ICCSP.2018.8524494"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Gonzalez, D., and Hayajneh, T. (2017, January 19\u201321). Detection and Prevention of Crypto-Ransomware. Proceedings of the 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, New York, NY, USA.","DOI":"10.1109\/UEMCON.2017.8249052"},{"key":"ref_52","first-page":"10","article-title":"Ransomware: Evolution, Mitigation and Prevention","volume":"13","author":"Richardson","year":"2017","journal-title":"Int. Manag. Rev."},{"key":"ref_53","unstructured":"Mehmood, S. (2018, October 24). Enterprise Survival Guide for Ransomware Attacks. SANS Information Security Training| Cyber Certifications|Research. Available online: www.sans.org."},{"key":"ref_54","unstructured":"TechNet, M. (2019, January 30). Microsoft Protection Center: Security Tips to Protect Against Ransomware. Available online: https:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/29787.microsoft-protection-center-security-tips-to-protect-against-ransomware.aspx."},{"key":"ref_55","unstructured":"Frenz, C., and Diaz, C. (2019, January 30). Anti-Ransomware Guide. Available online: https:\/\/www.owasp.org\/index.php\/OWASP_Anti-Ransomware_ Guide_Project."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Ahmadian, M.M., Shahriari, H.R., and Ghaffarian, S.M. (2015, January 8\u201310). Connection-Monitor & Connection-Breaker: A Novel Approach for Prevention and Detection of High Survivable Ransomwares. Proceedings of the 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology, Iran, Rasht.","DOI":"10.1109\/ISCISC.2015.7387902"},{"key":"ref_57","unstructured":"cuckoosandbox (2018, December 12). Automated Malware Analysis. Available online: https:\/\/cuckoosandbox.org\/."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MNET.2016.1600110NM","article-title":"Using Software-defined Networking for Ransomware Mitigation: The Case of Cryptowall","volume":"30","author":"Cabaj","year":"2016","journal-title":"IEEE Netw."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Pletinckx, S., Trap, C., and Doerr, C. (June, January 30). Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware. Proceedings of the 2018 IEEE Conference on Communications and Network Security, Beijing, China.","DOI":"10.1109\/CNS.2018.8433199"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., and Kirda, E. (2015, January 9\u201310). Cutting the Gordian Knot: A Look under the Hood of Ransomware Attacks. Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Milan, Italy.","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/COMST.2014.2326417","article-title":"A Survey on Software-defined Network and Openflow: From Concept to Implementation","volume":"16","author":"Hu","year":"2014","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/COMST.2015.2477041","article-title":"Network Function Virtualization: State-of-the-art and Research Challenges","volume":"18","author":"Mijumbi","year":"2016","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MNET.2014.6963801","article-title":"Challenges in 5G: How to Empower SON with Big Data for enabling 5G","volume":"28","author":"Imran","year":"2014","journal-title":"IEEE Netw."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/11\/10\/1168\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:52:18Z","timestamp":1760187138000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/11\/10\/1168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,16]]},"references-count":63,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["rs11101168"],"URL":"https:\/\/doi.org\/10.3390\/rs11101168","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,16]]}}}