{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:20:41Z","timestamp":1775470841374,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811557873","type":"print"},{"value":"9789811557880","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_56","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"583-597","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Machine Learning and Feature Selection Based Ransomware Detection Using Hexacodes"],"prefix":"10.1007","author":[{"given":"Bheemidi Vikram","family":"Reddy","sequence":"first","affiliation":[]},{"given":"Gutha Jaya","family":"Krishna","sequence":"additional","affiliation":[]},{"given":"Vadlamani","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"Dipankar","family":"Dasgupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"56_CR1","unstructured":"Agarwal, P., Bansal, K.: Malware Classification Challenge. Technical report"},{"key":"56_CR2","first-page":"93","volume-title":"Advances in Information Security","author":"OM Alhawi","year":"2018","unstructured":"Alhawi, O.M., Baldwin, J., Dehghantanha, A.: Leveraging machine learning techniques for windows ransomware network traffic detection. In: Dehghantanha, A., Conti, M., Dargahi, T. (eds.) Advances in Information Security, vol. 70, pp. 93\u2013106. Springer, New York (2018)"},{"key":"56_CR3","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)"},{"issue":"1","key":"56_CR4","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF00048682","volume":"44","author":"D Bohning","year":"1992","unstructured":"Bohning, D.: Multinomial logistic regression algorithm. Ann. Inst. Stat. Math. 44(1), 197\u2013200 (1992)","journal-title":"Ann. Inst. Stat. Math."},{"issue":"1","key":"56_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"56_CR6","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Wadsworth International Group, Monterey, CA (1984)"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining\u2014KDD \u201916, San Francisco, CA, USA, pp. 785\u2013794. ACM Press (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Cohen, A., Nissim, N.: Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Syst. Appl. 102(C), 158\u2013178 (2018)","DOI":"10.1016\/j.eswa.2018.02.039"},{"issue":"1","key":"56_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"TM Cover","year":"1967","unstructured":"Cover, T.M., Hart, P.E.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13(1), 21\u201327 (1967)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Cusack, G., Michel, O., Keller, E.: Machine learning-based detection of ransomware using SDN. In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFVSec 2018), Co-located with CODASPY 2018, Tempe, AZ, USA, pp. 1\u20136. Association for Computing Machinery, Inc. (2018)","DOI":"10.1145\/3180465.3180467"},{"key":"56_CR11","unstructured":"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\n                \n               : Cybercrime Damages \\$6 Trillion by 2021"},{"key":"56_CR12","unstructured":"https:\/\/www.avast.com\/c-cryptolocker\n                \n               : CryptoLocker Ransomware"},{"key":"56_CR13","unstructured":"https:\/\/www.avast.com\/c-locky\n                \n               : Locky Ransomware"},{"key":"56_CR14","unstructured":"https:\/\/www.cisco.com\/c\/m\/en_au\/products\/security\/offers\/annual-cybersecurity-report-2017.html\n                \n               : Cisco 2017 Annual Cybersecurity Report"},{"key":"56_CR15","unstructured":"https:\/\/www.malwarebytes.com\/business\/\n                \n              : Malwarebytes"},{"key":"56_CR16","unstructured":"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Ransom:Win32\/LockScreen.AO\n                \n               : WinLock Ransomware"},{"key":"56_CR17","unstructured":"https:\/\/www.secalliance.com\/blog\/ransomware-ctb-locker\/\n                \n               : CTB-Locker Ransomware"},{"key":"56_CR18","unstructured":"https:\/\/www.secureworks.com\/research\/cryptowall-ransomware\n                \n               : Cryptowall Ransomware"},{"key":"56_CR19","unstructured":"https:\/\/www.us-cert.gov\/ncas\/alerts\/AA18-337A\n                \n               : SamSam Ransomware"},{"key":"56_CR20","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., Aliapoulios, M.M., Li, V.G., Invernizzi, L., Bursztein, E., McRoberts, K., Levin, J., Levchenko, K., Snoeren, A.C., McCoy, D.: Tracking ransomware end-to-end. In: IEEE Symposium on Security and Privacy, San Francisco, CA, USA, pp. 618\u2013631. Institute of Electrical and Electronics Engineers Inc. (2018)","DOI":"10.1109\/SP.2018.00047"},{"key":"56_CR21","series-title":"Milan","first-page":"3","volume-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"A Kharraz","year":"2015","unstructured":"Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Milan, vol. 9148, pp. 3\u201324. Springer, Italy (2015)"},{"key":"56_CR22","doi-asserted-by":"crossref","unstructured":"Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware (keynote). In: IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), Klagenfurt, Austria, pp. 1-1. Institute of Electrical and Electronics Engineers (IEEE) (2017)","DOI":"10.1109\/SANER.2017.7884603"},{"issue":"6","key":"56_CR23","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/TPAMI.2005.127","volume":"27","author":"B Krishnapuram","year":"2005","unstructured":"Krishnapuram, B., Carin, L., Figueiredo, M., Hartemink, A.: Sparse multinomial logistic regression: fast algorithms and generalization bounds. IEEE Trans. Pattern Anal. Mach. Intell. 27(6), 957\u2013968 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"56_CR24","doi-asserted-by":"crossref","unstructured":"Poudyal, S., Subedi, K.P., Dasgupta, D.: A framework for analyzing ransomware using machine learning. In: Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence, SSCI 2018, Bangalore, India, pp. 1692\u20131699. Institute of Electrical and Electronics Engineers Inc. (2019)","DOI":"10.1109\/SSCI.2018.8628743"},{"issue":"1","key":"56_CR25","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"56_CR26","unstructured":"Rish, I.: An empirical study of the naive Bayes classifier. In: IJCAI\u2014Workshop on Empirical Methods in Artificial Intelligence, Seattle, Washington, USA,pp. 41\u201346 (2001)"},{"issue":"6088","key":"56_CR27","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986)","journal-title":"Nature"},{"key":"56_CR28","unstructured":"Sgandurra, D., Mu\u00f1oz-Gonz\u00e1lez, L., Mohsen, R., Lupu, E.C.: Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection (2016)"},{"issue":"3","key":"56_CR29","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/S0167-9473(03)00064-1","volume":"45","author":"YS Shih","year":"2004","unstructured":"Shih, Y.S.: A note on split selection bias in classification trees. Comput. Stat. Data Anal. 45(3), 457\u2013466 (2004)","journal-title":"Comput. Stat. Data Anal."},{"issue":"1","key":"56_CR30","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0893-6080(90)90049-Q","volume":"3","author":"DF Specht","year":"1990","unstructured":"Specht, D.F.: Probabilistic neural networks. Neural Netw. 3(1), 109\u2013118 (1990)","journal-title":"Neural Netw."},{"key":"56_CR31","doi-asserted-by":"crossref","unstructured":"Subedi, K.P., Budhathoki, D.R., Dasgupta, D.: Forensic analysis of ransomware families using static and dynamic analysis. In: IEEE Symposium on Security and Privacy Workshops, SPW 2018, San Francisco, CA, USA, pp. 180\u2013185. Institute of Electrical and Electronics Engineers Inc. (2018)","DOI":"10.1109\/SPW.2018.00033"},{"key":"56_CR32","unstructured":"Takeuchi, Y., Sakai, K., Fukumoto, S.: Detecting ransomware using support vector machines. In: ACM International Conference Proceeding Series, Eugene, OR, USA. Association for Computing Machinery (2018). Article No. 1"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T17:48:08Z","timestamp":1599760088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_56","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}