<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:48:21.504Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:5415" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:5415</identifier>
                <datestamp>2017-07-13T09:49:27Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">An Implementation of Ransomware Malicious Software in Python</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2017</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/5415</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://sinteza.singidunum.ac.rs/</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:19937" confidence="-1">B. Vujanić</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:19938" confidence="-1">N. Maček</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-2875-685X" confidence="-1">S. Adamović</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">This paper presents an approach to developing ransomware in Python programming
language. Malicious code exploits vulnerabilities resulting from the
weak passwords on Linux servers. Ransomware employs Nmap to determine
if SSH port is open, and if it is, it enters the victim via SSH protocol. Files are
encrypted using stream cypher based on pseudorandom number generator.
Analysis of existing ransomware is also given in this paper.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">19</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">24</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">10.15308/Sinteza-2017-19-24</dim:field>
                    <dim:field mdschema="dc" element="source">Sinteza 2017 - International Scientific Conference on Information Technology and Data Related Research</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
