{"id":"https://openalex.org/W2786921024","doi":"https://doi.org/10.1109/ssci.2017.8280842","title":"RDS3: Ransomware defense strategy by using stealthily spare space","display_name":"RDS3: Ransomware defense strategy by using stealthily spare space","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2786921024","doi":"https://doi.org/10.1109/ssci.2017.8280842","mag":"2786921024"},"language":"en","primary_location":{"id":"doi:10.1109/ssci.2017.8280842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci.2017.8280842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063143212","display_name":"Kul Prasad Subedi","orcid":null},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kul Prasad Subedi","raw_affiliation_strings":["Department of Computer Science, University of Memphis, Memphis, TN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Memphis, Memphis, TN, USA","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089961177","display_name":"Daya Ram Budhathoki","orcid":null},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daya Ram Budhathoki","raw_affiliation_strings":["Department of Computer Science, University of Memphis, Memphis, TN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Memphis, Memphis, TN, USA","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100427291","display_name":"Bo Chen","orcid":"https://orcid.org/0000-0001-9372-9607"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Chen","raw_affiliation_strings":["Department of Computer Science, Michigan Technological University, Houghton, Michigan, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Michigan Technological University, Houghton, Michigan, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048167872","display_name":"Dipankar Dasgupta","orcid":"https://orcid.org/0000-0002-3097-061X"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dipankar Dasgupta","raw_affiliation_strings":["Department of Computer Science, University of Memphis, Memphis, TN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Memphis, Memphis, TN, USA","institution_ids":["https://openalex.org/I94658018"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063143212"],"corresponding_institution_ids":["https://openalex.org/I94658018"],"apc_list":null,"apc_paid":null,"fwci":1.3084,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.82769462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spare-part","display_name":"Spare part","score":0.7386182546615601},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.620136022567749},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.563344419002533},{"id":"https://openalex.org/keywords/computational-biology","display_name":"Computational biology","score":0.3269147276878357},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29636961221694946},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.19805419445037842},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.1886698305606842},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1729898750782013},{"id":"https://openalex.org/keywords/operations-management","display_name":"Operations management","score":0.07657340168952942}],"concepts":[{"id":"https://openalex.org/C194648553","wikidata":"https://www.wikidata.org/wiki/Q1364774","display_name":"Spare part","level":2,"score":0.7386182546615601},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.620136022567749},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.563344419002533},{"id":"https://openalex.org/C70721500","wikidata":"https://www.wikidata.org/wiki/Q177005","display_name":"Computational biology","level":1,"score":0.3269147276878357},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29636961221694946},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.19805419445037842},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.1886698305606842},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1729898750782013},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.07657340168952942}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ssci.2017.8280842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci.2017.8280842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.mtu.edu:cs_fp-1009","is_oa":false,"landing_page_url":"https://digitalcommons.mtu.edu/cs_fp/9","pdf_url":null,"source":{"id":"https://openalex.org/S4377196391","display_name":"Digital Commons - Michigan Tech (Michigan Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11957088","host_organization_name":"Michigan Technological University","host_organization_lineage":["https://openalex.org/I11957088"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Department of Computer Science Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W173413620","https://openalex.org/W841409518","https://openalex.org/W1533145153","https://openalex.org/W1969773161","https://openalex.org/W1992291252","https://openalex.org/W2075174112","https://openalex.org/W2119359024","https://openalex.org/W2245015425","https://openalex.org/W2296335794","https://openalex.org/W2461373307","https://openalex.org/W2511701350","https://openalex.org/W2513529237","https://openalex.org/W2539082945","https://openalex.org/W2558619741","https://openalex.org/W2559964890","https://openalex.org/W2601591992","https://openalex.org/W2789145328","https://openalex.org/W4293742266","https://openalex.org/W6607078713","https://openalex.org/W6631841752","https://openalex.org/W6697144307","https://openalex.org/W6718890697","https://openalex.org/W6748537787"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794"],"abstract_inverted_index":{"Ransomware":[0,90],"attacks":[1,168],"are":[2,68],"becoming":[3],"prevalent":[4],"nowadays":[5],"with":[6,169],"the":[7,12,20,30,39,45,101,110,123,128,135,140,147],"flourishing":[8],"of":[9,16,38,44,58,104,151],"crypto-currencies.":[10],"As":[11],"most":[13],"harmful":[14],"variant":[15],"ransomware":[17,49,54,64,74,114,141,167],"crypto-ransomware":[18],"encrypts":[19],"victim's":[21],"valuable":[22],"data,":[23],"and":[24,159],"asks":[25],"for":[26,48],"ransom":[27,31],"money.":[28],"Paying":[29],"money,":[32],"however,":[33],"may":[34],"not":[35,69,143],"guarantee":[36],"recovery":[37,62],"data":[40,61,99,111,130,149],"being":[41],"encrypted.":[42],"Most":[43],"existing":[46],"work":[47],"defense":[50],"purely":[51],"focuses":[52],"on":[53],"detection.":[55],"A":[56],"few":[57],"them":[59],"consider":[60],"from":[63,134],"attacks,":[65],"but":[66],"they":[67],"able":[70,144],"to":[71,145],"defend":[72],"against":[73],"which":[75,94,126],"can":[76,115,155,165],"obtain":[77],"a":[78,88,105],"high":[79],"system":[80],"privilege.":[81],"In":[82,137],"this":[83,138],"work,":[84],"we":[85,95],"design":[86],"RDS3,":[87],"novel":[89],"Defense":[91],"Strategy,":[92],"in":[93,100],"Stealthily":[96],"back":[97],"up":[98],"Spare":[102],"space":[103,125],"computing":[106],"device,":[107],"such":[108],"that":[109,122,163],"encrypted":[112],"by":[113],"be":[116],"restored.":[117],"Our":[118],"key":[119],"idea":[120],"is":[121,131,142],"spare":[124],"stores":[127],"backup":[129,148],"fully":[132],"isolated":[133],"ransomware.":[136],"way,":[139],"\u201ctouch\u201d":[146],"regardless":[150],"what":[152],"privilege":[153],"it":[154],"obtain.":[156],"Security":[157],"analysis":[158],"experimental":[160],"evaluation":[161],"show":[162],"RDS3":[164],"mitigate":[166],"an":[170],"acceptable":[171],"overhead.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
