{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T22:35:30Z","timestamp":1772318130502,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031284502","type":"print"},{"value":"9783031284519","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28451-9_36","type":"book-chapter","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T15:03:50Z","timestamp":1678806230000},"page":"417-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Early-Stage Ransomware Detection Based on\u00a0Pre-attack Internal API Calls"],"prefix":"10.1007","author":[{"given":"Filippo","family":"Coglio","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Lekssays","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"issue":"6","key":"36_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3365001","volume":"52","author":"A Afianian","year":"2019","unstructured":"Afianian, A., Niksefat, S., Sadeghiyan, B., Baptiste, D.: Malware dynamic analysis evasion techniques: a survey. ACM Comput. Surv. 52(6), 1\u201328 (2019)","journal-title":"ACM Comput. Surv."},{"issue":"18","key":"36_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5422","volume":"32","author":"SI Bae","year":"2020","unstructured":"Bae, S.I., Lee, G.B., Im, E.G.: Ransomware detection using machine learning algorithms. Concurr. Comput. Pract. Exp. 32(18), e5422 (2020)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Barabosch, T., Gerhards-Padilla, E.: Host-based code injection attacks: a popular technique used by malware. In: 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), pp. 8\u201317. IEEE (2014)","DOI":"10.1109\/MALWARE.2014.6999410"},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2019.01.002","volume":"32","author":"SS Chakkaravarthy","year":"2019","unstructured":"Chakkaravarthy, S.S., Sangeetha, D., Vaidehi, V.: A survey on malware analysis and mitigation techniques. Comput. Sci. Rev. 32, 1\u201323 (2019)","journal-title":"Comput. Sci. Rev."},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Coogan, K., Debray, S., Kaochar, T., Townsend, G.: Automatic static unpacking of malware binaries. In: 2009 16th Working Conference on Reverse Engineering, pp. 167\u2013176. IEEE (2009)","DOI":"10.1109\/WCRE.2009.24"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Daku, H., Zavarsky, P., Malik, Y.: Behavioral-based classification and identification of ransomware variants using machine learning. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 1560\u20131564. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00224"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-1-4842-4255-1_3","volume-title":"Ransomware Revealed","author":"NA Hassan","year":"2019","unstructured":"Hassan, N.A.: Ransomware families. In: Ransomware Revealed, pp. 47\u201368. Apress, Berkeley, CA (2019). https:\/\/doi.org\/10.1007\/978-1-4842-4255-1_3"},{"issue":"4","key":"36_CR8","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.1007\/s11277-020-07166-9","volume":"112","author":"J Hwang","year":"2020","unstructured":"Hwang, J., Kim, J., Lee, S., Kim, K.: Two-stage ransomware detection using dynamic analysis and machine learning techniques. Wirel. Pers. Commun. 112(4), 2597\u20132609 (2020). https:\/\/doi.org\/10.1007\/s11277-020-07166-9","journal-title":"Wirel. Pers. Commun."},{"key":"36_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Kharraz","year":"2015","unstructured":"Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the Gordian knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3\u201324. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20550-2_1"},{"issue":"1","key":"36_CR10","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/TNSM.2021.3112056","volume":"19","author":"RMA Molina","year":"2021","unstructured":"Molina, R.M.A., Torabi, S., Sarieddine, K., Bou-Harb, E., Bouguila, N., Assi, C.: On ransomware family attribution using pre-attack paranoia activities. IEEE Trans. Netw. Serv. Manag. 19(1), 19\u201336 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"36_CR11","unstructured":"O\u2019Shea, K., Nash, R.: An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015)"},{"issue":"8","key":"36_CR12","first-page":"74","volume":"12","author":"BB Rad","year":"2012","unstructured":"Rad, B.B., Masrom, M., Ibrahim, S.: Camouflage in malware: from encryption to metamorphism. Int. J. Comput. Sci. Netw. Secur. 12(8), 74\u201383 (2012)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"12","key":"36_CR13","first-page":"310","volume":"6","author":"S Sharma","year":"2017","unstructured":"Sharma, S., Sharma, S., Athaiya, A.: Activation functions in neural networks. Towards Data Sci. 6(12), 310\u2013316 (2017)","journal-title":"Towards Data Sci."},{"key":"36_CR14","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.future.2019.09.025","volume":"110","author":"B Zhang","year":"2020","unstructured":"Zhang, B., et al.: Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes. Futur. Gener. Comput. Syst. 110, 708\u2013720 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"36_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang, H., et al.: Classification of ransomware families with machine learning based on N-gram of opcodes. Futur. Gener. Comput. Syst. 90, 211\u2013221 (2019)","journal-title":"Futur. Gener. Comput. Syst."}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28451-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T06:31:38Z","timestamp":1681885898000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28451-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031284502","9783031284519"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28451-9_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Juiz de Fora","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}