{"id":"https://openalex.org/W4415744127","doi":"https://doi.org/10.1109/qrs-c65679.2025.00026","title":"Design and Implementation of a Security Assessment Tool towards Practical Ransomware Countermeasures","display_name":"Design and Implementation of a Security Assessment Tool towards Practical Ransomware Countermeasures","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415744127","doi":"https://doi.org/10.1109/qrs-c65679.2025.00026"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017675387","display_name":"Keisuke Tanaka","orcid":"https://orcid.org/0000-0003-1259-9949"},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Keisuke Tanaka","raw_affiliation_strings":["Ritsumeikan University,Graduate School of Information Science and Engineering,Osaka,Japan"],"affiliations":[{"raw_affiliation_string":"Ritsumeikan University,Graduate School of Information Science and Engineering,Osaka,Japan","institution_ids":["https://openalex.org/I135768898"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070057383","display_name":"Yu Tsuda","orcid":null},"institutions":[{"id":"https://openalex.org/I927439370","display_name":"NTN (Japan)","ror":"https://ror.org/01f10xn48","country_code":"JP","type":"company","lineage":["https://openalex.org/I927439370"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yu Tsuda","raw_affiliation_strings":["Turnt Up Technologies, Inc.,Osaka,Japan"],"affiliations":[{"raw_affiliation_string":"Turnt Up Technologies, Inc.,Osaka,Japan","institution_ids":["https://openalex.org/I927439370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057986691","display_name":"Tetsutaro Uehara","orcid":"https://orcid.org/0000-0002-8233-130X"},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tetsutaro Uehara","raw_affiliation_strings":["Ritsumeikan University,College of Information Science and Engineering,Osaka,Japan"],"affiliations":[{"raw_affiliation_string":"Ritsumeikan University,College of Information Science and Engineering,Osaka,Japan","institution_ids":["https://openalex.org/I135768898"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017675387"],"corresponding_institution_ids":["https://openalex.org/I135768898"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42743925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"127","last_page":"136"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7827000021934509,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7827000021934509,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.1590999960899353,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.008200000040233135,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8522999882698059},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.8133999705314636},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6391000151634216},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4984000027179718},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.39419999718666077},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.3603000044822693}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8522999882698059},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.8133999705314636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7232000231742859},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6391000151634216},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6140000224113464},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4984000027179718},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4535999894142151},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3603000044822693},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3531999886035919},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.33899998664855957},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.2994999885559082},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2540000081062317}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2081430061","https://openalex.org/W2989837596","https://openalex.org/W3114189379","https://openalex.org/W4316042120"],"related_works":[],"abstract_inverted_index":{"To":[0,117],"address":[1],"the":[2,56,78,83,85,107,115,119,140,145,161],"growing":[3],"threat":[4,47],"of":[5,58,77,139],"targeted":[6],"ransomware":[7,172],"attacks,":[8],"we":[9,122],"propose":[10],"a":[11,67,88,165],"practical":[12],"and":[13,27,45,92,110,128,148,167],"low-cost":[14],"security":[15,90],"assessment":[16,146],"tool":[17,32,86,163],"for":[18,75],"organizations":[19],"with":[20,144],"limited":[21],"cybersecurity":[22],"resources,":[23],"such":[24],"as":[25],"small":[26],"medium-sized":[28],"enterprises":[29],"(SMEs).":[30],"The":[31,134],"incorporates":[33],"14":[34,79],"actionable":[35,152],"countermeasures":[36,153],"against":[37],"ransomware,":[38],"identified":[39,151],"based":[40],"on":[41,82,98],"common":[42],"attack":[43],"techniques":[44],"public":[46],"intelligence":[48],"reports.":[49],"Each":[50],"countermeasure":[51],"is":[52],"weighted":[53],"according":[54],"to":[55,105,170],"number":[57],"MITRE":[59],"ATT&CK":[60],"Tactics":[61],"it":[62],"addresses.":[63],"Firstly,":[64],"users":[65,102],"complete":[66],"questionnaire":[68],"that":[69,137,160],"evaluates":[70],"their":[71],"current":[72],"implementation":[73],"status":[74],"each":[76],"countermeasures.":[80,100],"Based":[81],"responses,":[84],"calculates":[87],"composite":[89],"score":[91],"provides":[93],"personalized":[94],"feedback,":[95],"including":[96],"guidance":[97],"recommended":[99,108],"Secondly,":[101],"are":[103],"encouraged":[104],"implement":[106],"countermeasuress":[109],"submit":[111],"follow-up":[112,131],"feedback":[113],"via":[114],"tool.":[116],"evaluate":[118],"tool\u2019s":[120],"effectiveness,":[121],"collected":[123],"183":[124],"responses":[125],"from":[126],"participants":[127,141],"received":[129],"156":[130],"survey":[132],"results.":[133],"findings":[135],"show":[136],"90%":[138],"were":[142],"satisfied":[143],"results,":[147],"over":[149],"80%":[150],"they":[154],"could":[155],"implement.":[156],"These":[157],"results":[158],"suggest":[159],"proposed":[162],"offers":[164],"scalable":[166],"effective":[168],"approach":[169],"improving":[171],"resilience":[173],"in":[174],"resource-constrained":[175],"organizations.":[176]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-31T00:00:00"}
