{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T05:05:15Z","timestamp":1746594315185,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819605699"},{"type":"electronic","value":"9789819605705"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0570-5_31","type":"book-chapter","created":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:47:13Z","timestamp":1732927633000},"page":"426-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Ransomware Using System Calls Through Transfer Learning on\u00a0a\u00a0Limited Feature Set"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0413-9013","authenticated-orcid":false,"given":"Harpreet","family":"Kaur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4955-3058","authenticated-orcid":false,"given":"Vimal","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9575-2752","authenticated-orcid":false,"given":"Atthapan","family":"Daramas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"31_CR1","unstructured":"Kidd, C.: Ransomware families & raas groups. Splunk (2023)"},{"key":"31_CR2","unstructured":"Cybercrime to cost the world \\$9.5 trillion usd annually in 2024. Cybersecurity Venture (2023)"},{"issue":"4","key":"31_CR3","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1049\/iet-ifs.2018.5268","volume":"13","author":"M Tang","year":"2019","unstructured":"Tang, M., Qian, Q.: Dynamic api call sequence visualisation for malware classification. IET Inf. Secur. 13(4), 367\u2013377 (2019)","journal-title":"IET Inf. Secur."},{"key":"31_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102753","volume":"167","author":"YA Ahmed","year":"2020","unstructured":"Ahmed, Y.A., Ko\u00e7er, B., Huda, S., Saleh Al-rimy, B.A., Hassan, M.M.: A system call refinement-based enhanced minimum redundancy maximum relevance method for ransomware early detection. J. Netw. Comput. Appli. 167, 102753 (2020)","journal-title":"J. Netw. Comput. Appli."},{"key":"31_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103277","volume":"130","author":"P Bhat","year":"2023","unstructured":"Bhat, P., Behal, S., Dutta, K.: A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning. Comput. Sec. 130, 103277 (2023)","journal-title":"Comput. Sec."},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Vy\u0161ni\u016bnas, T., \u010ceponis, D., Goranin, N., \u010cenys, A.: Risk-based system-call sequence grouping method for malware intrusion detection. Electronics 13 (2024)","DOI":"10.3390\/electronics13010206"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jpdc.2022.10.001","volume":"172","author":"F Rustam","year":"2023","unstructured":"Rustam, F., Ashraf, I., Jurcut, A.D., Bashir, A.K., Zikria, Y.B.: Malware detection using image representation of malware data and transfer learning. J. Parallel Distribut. Comput. 172, 32\u201350 (2023)","journal-title":"J. Parallel Distribut. Comput."},{"issue":"2","key":"31_CR8","first-page":"262","volume":"30","author":"TQ Dam","year":"2024","unstructured":"Dam, T.Q., Nguyen, N.T., Le, T.V., Tran, D.L., Uwizeyemungu, S., Le-Dinh, T.: Visualizing portable executable headers for ransomware detection: a deep learning-based approach. J. Univ. Comput. Sci. 30(2), 262\u2013286 (2024)","journal-title":"J. Univ. Comput. Sci."},{"key":"31_CR9","doi-asserted-by":"publisher","unstructured":"Chew, C.J.-W., Kumar, V., Patros, P., Malik, R.: ESCAPADE: encryption-type-ransomware: system call based pattern detection. In: Network and System Security, pp.\u00a0388\u2013407. Springer International Publishing (2020). https:\/\/doi.org\/10.1007\/978-3-030-65745-1_23","DOI":"10.1007\/978-3-030-65745-1_23"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Oz, H., Aris, A., Levi, A., Uluagac, A.S.: A survey on ransomware: Evolution, taxonomy, and defense solutions, vol.\u00a054(11sP) (2022)","DOI":"10.1145\/3514229"},{"issue":"3","key":"31_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3073559","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (CSUR) 50(3), 1\u201340 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Jyothish, A., Mathew, A., Vinod, P.: Effectiveness of machine learning based android malware detectors against adversarial attacks. Cluster Comput., 1\u201321 (2023)","DOI":"10.1007\/s10586-023-04086-8"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath,B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp.\u00a01\u20137, 2011","DOI":"10.1145\/2016904.2016908"},{"key":"31_CR14","unstructured":"DjPasco, \u201cAwsctd.\u201d GitHub repository"},{"key":"31_CR15","unstructured":"ImageNet, ImageNet: A Large-Scale Hierarchical Image Database (2021)"},{"key":"31_CR16","first-page":"1","volume":"22","author":"CJW Chew","year":"2024","unstructured":"Chew, C.J.W., Kumar, V., Patros, P., Malik, R.: Real-time system call-based ransomware detection. Inter. J. Inform. Sec. 22, 1\u201320 (2024)","journal-title":"Inter. J. Inform. Sec."},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.\u00a0770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"31_CR18","unstructured":"Yosinski, J., Clune, J., Bengio, Y., Lipson, H.: How transferable are features in deep neural networks?. In: Proceedings of the 27th International Conference on Neural Information Processing Systems, NIPS 2014, Cambridge, MA, USA, vol. 2, pp.\u00a03320-3328. MIT Press (2014)"},{"key":"31_CR19","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization, arXiv preprint arXiv:1412.6980 (2014)"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Liu, L., Qi, H.: Learning effective binary descriptors via cross entropy. In: 2017 IEEE Winter Conference on Applications of Computer Vision (WACV), pp.\u00a01251\u20131258 (2017)","DOI":"10.1109\/WACV.2017.144"},{"key":"31_CR21","doi-asserted-by":"publisher","unstructured":"Corrick, T., Kumar, V.: Design and architecture of progger 3: a low-overhead, tamper-proof provenance system. In: International Conference on Ubiquitous Security, pp.\u00a0189\u2013202. Springer (2021) https:\/\/doi.org\/10.1007\/978-981-19-0468-4_14","DOI":"10.1007\/978-981-19-0468-4_14"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0570-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T01:08:32Z","timestamp":1732928912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0570-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9789819605699","9789819605705"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0570-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}