{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:07:43Z","timestamp":1767262063633,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031667046"},{"type":"electronic","value":"9783031667053"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-66705-3_7","type":"book-chapter","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T11:23:00Z","timestamp":1724325780000},"page":"95-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Empowering Cybersecurity: CyberShield AI Advanced Integration of\u00a0Machine Learning and\u00a0Deep Learning for\u00a0Dynamic Ransomware Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9141-8837","authenticated-orcid":false,"given":"Sijjad","family":"Ali","sequence":"first","affiliation":[]},{"given":"Asad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Uzair","sequence":"additional","affiliation":[]},{"given":"Hamza","family":"Amir","sequence":"additional","affiliation":[]},{"given":"Rana Zaki Abdul","family":"Bari","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Sharif","sequence":"additional","affiliation":[]},{"given":"Maryam","family":"Jamil","sequence":"additional","affiliation":[]},{"given":"M.","family":"Hunza","sequence":"additional","affiliation":[]},{"given":"Nabel","family":"Akram","sequence":"additional","affiliation":[]},{"given":"Sharofiddin","family":"Allaberdiev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,21]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Ali, S., Wang, J., Leung, V., Ali, A.: Decentralized ransomware recovery network: enhancing resilience and security through secret sharing schemes. In: Proceedings of the 9th International Conference on Internet of Things, Big Data and Security - IoTBDS, pp. 294\u2013301. SciTePress (2024). ISBN 978-989-758-699-6; ISSN 2184\u20134976. https:\/\/doi.org\/10.5220\/0012713500003705.","DOI":"10.5220\/0012713500003705."},{"issue":"9","key":"7_CR2","volume":"35","author":"S Ali","year":"2023","unstructured":"Ali, S., Wang, J., Leung, V.C.M.: Defensive strategies against PCC attacks based on ideal (t, n)-secret sharing scheme. J. King Saud Univ.-Comput. Inf. Sci. 35(9), 101784 (2023)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Alhawi, O.M., Baldwin, J., Dehghantanha, A.: Leveraging machine learning techniques for windows ransomware network traffic detection. In: Cyber Threat Intelligence, pp. 93\u2013106 (2018)","DOI":"10.1007\/978-3-319-73951-9_5"},{"issue":"2","key":"7_CR4","first-page":"136","volume":"19","author":"S Kok","year":"2019","unstructured":"Kok, S., Abdullah, A., Jhanjhi, N., Supramaniam, M.: Ransomware, threat and detection techniques: a review. Int. J. Comput. Sci. Netw. Secur 19(2), 136 (2019)","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"issue":"2","key":"7_CR5","first-page":"106","volume":"15","author":"M Tahmasebi","year":"2024","unstructured":"Tahmasebi, M.: Beyond defense: proactive approaches to disaster recovery and threat intelligence in modern enterprises. J. Inf. Secur. 15(2), 106\u2013133 (2024)","journal-title":"J. Inf. Secur."},{"issue":"3","key":"7_CR6","first-page":"3166","volume":"10","author":"A Wani","year":"2020","unstructured":"Wani, A., Revathi, S.: Ransomware protection in lot using software defined networking. Int. J. Electr. Comput. Eng 10(3), 3166\u20133175 (2020)","journal-title":"Int. J. Electr. Comput. Eng"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Alam, M. N., Sarma, D., Lima, F. F., Saha, I., Hossain, S., et al.: Phishing attacks detection using machine learning approach. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1173\u20131179. IEEE (2020)","DOI":"10.1109\/ICSSIT48917.2020.9214225"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"189","DOI":"10.3390\/s24010189","volume":"24","author":"A Albin Ahmed","year":"2023","unstructured":"Albin Ahmed, A., Shaahid, A., Alnasser, F., Alfaddagh, S., Binagag, S., Alqahtani, D.: Android ransomware detection using supervised machine learning techniques based on traffic analysis. Sensors 24(1), 189 (2023)","journal-title":"Sensors"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Rizvi, M.: Enhancing cybersecurity: the power of artificial intelligence in threat detection and prevention. Int. J. Adv. Eng. Res. Sci. 10(5) (2023)","DOI":"10.22161\/ijaers.105.8"},{"key":"7_CR10","unstructured":"Tiwari, D., Nagarkoti, G., Banda, L., et al.: Identifying ransomware attack patterns and constructing decrypting tool. J. Appl. Optics 232\u2013246 (2024)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Jemal, M., Lo, D.C.-T.: Detection of ransomware attack using deep learning. In: 2023 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20139. IEEE (2023)","DOI":"10.1109\/DSC61021.2023.10354186"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Devarakonda, A., Sharma, N., Saha, P., Ramya, S.: Network intrusion detection: a comparative study of four classifiers using the NSL-KDD and KDD\u201999 datasets. In: Journal of Physics: Conference Series, vol. 2161, p. 012043. IOP Publishing (2022)","DOI":"10.1088\/1742-6596\/2161\/1\/012043"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"63283","DOI":"10.1109\/ACCESS.2021.3074319","volume":"9","author":"AA Ahmed","year":"2021","unstructured":"Ahmed, A.A., Echi, M.: Hawk-eye: an aipowered threat detector for intelligent surveillance cameras. IEEE Access 9, 63283\u201363293 (2021)","journal-title":"IEEE Access"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Myung, J., Ko, Y., Kwon, T., Lee, J., Kim, K., Song, J.: Intrusion detection systems based on machine learning using feature expansion methods. In: 2023 18th Asia Joint Conference on Information Security (AsiaJCIS), pp. 32\u201338. IEEE (2023)","DOI":"10.1109\/AsiaJCIS60284.2023.00016"},{"issue":"15","key":"7_CR15","doi-asserted-by":"publisher","first-page":"5883","DOI":"10.3390\/s22155883","volume":"22","author":"F Ullah","year":"2022","unstructured":"Ullah, F., Ullah, S., Naeem, M.R., Mostarda, L., Rho, S., Cheng, X.: Cyber-threat detection system using a hybrid approach of transfer learning and multimodel image representation. Sensors 22(15), 5883 (2022)","journal-title":"Sensors"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"34613","DOI":"10.1109\/ACCESS.2022.3162588","volume":"10","author":"H Suryotrisongko","year":"2022","unstructured":"Suryotrisongko, H., Musashi, Y., Tsuneda, A., Sugitani, K.: Robust botnet DGA detection: blending XAI and OSINT for cyber threat intelligence sharing. IEEE Access 10, 34613\u201334624 (2022)","journal-title":"IEEE Access"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Cusack, G., Michel, O., Keller, E.: Machine learning-based detection of ransomware using SDN. In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 1\u20136 (2018)","DOI":"10.1145\/3180465.3180467"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Ullah, F., et al.: Modified decision tree technique for ransomware detection at runtime through API calls. Sci. Program. 2020 (2020)","DOI":"10.1155\/2020\/8845833"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"S13","key":"7_CR21","doi-asserted-by":"publisher","first-page":"407","DOI":"10.59670\/ml.v20iS13.6472","volume":"20","author":"DM Rajan","year":"2023","unstructured":"Rajan, D.M., Aravindhar, D.J.: Detection and mitigation of DDOS attack in SDN environment using hybrid CNN-LSTM. Migrat. Lett. 20(S13), 407\u2013419 (2023)","journal-title":"Migrat. Lett."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Cahyani, N.D.W., Nuha, H.H., et al.: Ransomware detection on bitcoin transactions using artificial neural network methods. In: 2021 9th International Conference on Information and Communication Technology (ICoICT), pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/ICoICT52021.2021.9527414"},{"key":"7_CR24","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. Adv. Neural Inf. Process. Syst. 30 (2017)"}],"container-title":["Communications in Computer and Information Science","Deep Learning Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-66705-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T02:25:33Z","timestamp":1732674333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-66705-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031667046","9783031667053"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-66705-3_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DeLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Deep Learning Theory and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dijon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"delta2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/delta.scitevents.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}