{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:47:50Z","timestamp":1769827670503,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00501-1","type":"journal-article","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T13:03:11Z","timestamp":1695819791000},"page":"317-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Explainable Ransomware Detection with Deep Learning Techniques"],"prefix":"10.1007","volume":"20","author":[{"given":"Giovanni","family":"Ciaramella","sequence":"first","affiliation":[]},{"given":"Giacomo","family":"Iadarola","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,27]]},"reference":[{"key":"501_CR1","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: Effective and explainable detection of android malware in your pocket. In: Ndss, vol.\u00a014, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"18","key":"501_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5422","volume":"32","author":"SI Bae","year":"2020","unstructured":"Bae, S.I., Lee, G.B., Im, E.G.: Ransomware detection using machine learning algorithms. Concurr. Comput. Pract. Exper. 32(18), e5422 (2020)","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"501_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Z.G., Kang, H.S., Yin, S.N., Kim, S.R.: Automatic ransomware detection and analysis based on dynamic api calls flow graph. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, pp. 196\u2013201 (2017)","DOI":"10.1145\/3129676.3129704"},{"key":"501_CR4","doi-asserted-by":"crossref","unstructured":"Cimitile, A., Martinelli, F., Mercaldo, F.: Machine learning meets ios malware: identifying malicious applications on apple environment. In: ICISSP, pp. 487\u2013492 (2017)","DOI":"10.5220\/0006217304870492"},{"key":"501_CR5","doi-asserted-by":"crossref","unstructured":"Cimitile, A., Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Formal methods meet mobile code obfuscation identification of code reordering technique. In: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 263\u2013268. IEEE (2017)","DOI":"10.1109\/WETICE.2017.23"},{"key":"501_CR6","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.907","volume":"8","author":"WF Elsersy","year":"2022","unstructured":"Elsersy, W.F., Feizollah, A., Anuar, N.B.: The rise of obfuscated android malware and impacts on detection methods. PeerJ Comput. Sci. 8, e907 (2022)","journal-title":"PeerJ Comput. Sci."},{"key":"501_CR7","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TIFS.2020.3021924","volume":"16","author":"M Fan","year":"2020","unstructured":"Fan, M., Wei, W., Xie, X., Liu, Y., Guan, X., Liu, T.: Can we trust your explanations? sanity checks for interpreters in android malware analysis. IEEE Trans. Inf. Forensics Secur. 16, 838\u2013853 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"501_CR8","doi-asserted-by":"crossref","unstructured":"Ferrante, A., Malek, M., Martinelli, F., Mercaldo, F., Milosevic, J.: Extinguishing ransomware-a hybrid approach to android ransomware detection. In: International Symposium on Foundations and Practice of Security, pp. 242\u2013258. Springer (2017)","DOI":"10.1007\/978-3-319-75650-9_16"},{"key":"501_CR9","doi-asserted-by":"crossref","unstructured":"Gharib, A., Ghorbani, A.: Dna-droid: A real-time android ransomware detection framework. In: International Conference on Network and System Security, pp. 184\u2013198. Springer (2017)","DOI":"10.1007\/978-3-319-64701-2_14"},{"key":"501_CR10","doi-asserted-by":"crossref","unstructured":"Gong, W., Zhang, X., Deng, B., Xu, X.: Palmprint recognition based on convolutional neural network-alexnet. In: 2019 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 313\u2013316. IEEE (2019)","DOI":"10.15439\/2019F248"},{"key":"501_CR11","doi-asserted-by":"crossref","unstructured":"Iadarola, G., Mercaldo, F., Martinelli, F., Santone, A.: Assessing deep learning predictions in image-based malware detection with activation maps. In: Security and Trust Management: 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings, pp. 104\u2013114. Springer (2023)","DOI":"10.1007\/978-3-031-29504-1_6"},{"key":"501_CR12","doi-asserted-by":"crossref","unstructured":"Jeng, T.H., Chang, Y.C., Yang, H.H., Chen, L.K., Chen, Y.M.: A novel deep learning based attention mechanism for android malware detection and explanation. In: Proceedings of the 10th International Conference on Computer and Communications Management, pp. 226\u2013232 (2022)","DOI":"10.1145\/3556223.3556257"},{"key":"501_CR13","doi-asserted-by":"crossref","unstructured":"Kamil, S., Norul, H.S.A.S., Firdaus, A., Usman, O.L.: The rise of ransomware: A review of attacks, detection techniques, and future challenges. In: 2022 International Conference on Business Analytics for Technology and Security (ICBATS), pp. 1\u20137. IEEE (2022)","DOI":"10.1109\/ICBATS54253.2022.9759000"},{"issue":"1","key":"501_CR14","first-page":"1","volume":"8","author":"S Khan","year":"2018","unstructured":"Khan, S., Rahmani, H., Shah, S.A.A., Bennamoun, M.: A guide to convolutional neural networks for computer vision. Comput. Vis. 8(1), 1\u2013207 (2018)","journal-title":"Comput. Vis."},{"key":"501_CR15","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.procs.2021.03.118","volume":"184","author":"M Kinkead","year":"2021","unstructured":"Kinkead, M., Millar, S., McLaughlin, N., OKane, P.: Towards explainable cnns for android malware detection. Procedia Comput. Sci. 184, 959\u2013965 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"501_CR16","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Adv. Neural. Inf. Process. Syst. 25, 1097\u20131105 (2012)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"501_CR17","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","DOI":"10.1109\/5.726791"},{"key":"501_CR18","doi-asserted-by":"crossref","unstructured":"Liao, K., Zhao, Z., Doup\u00e9, A., Ahn, G.J.: Behind closed doors: measurement and analysis of cryptolocker ransoms in bitcoin. In: 2016 APWG symposium on electronic crime research (eCrime), pp. 1\u201313. IEEE (2016)","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"501_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tantithamthavorn, C., Li, L., Liu, Y.: Explainable ai for android malware detection: Towards understanding why the models perform so well? In: 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE), pp. 169\u2013180. IEEE (2022)","DOI":"10.1109\/ISSRE55969.2022.00026"},{"issue":"1","key":"501_CR20","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3390\/s23010075","volume":"23","author":"F Martinelli","year":"2023","unstructured":"Martinelli, F., Mercaldo, F., Santone, A.: Water meter reading for smart grid monitoring. Sensors 23(1), 75 (2023)","journal-title":"Sensors"},{"key":"501_CR21","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Hey malware, i can find you! In: 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 261\u2013262. IEEE (2016)","DOI":"10.1109\/WETICE.2016.67"},{"issue":"7","key":"501_CR22","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.1093\/jamia\/ocab052","volume":"28","author":"F Mercaldo","year":"2021","unstructured":"Mercaldo, F., Santone, A.: Transfer learning for mobile real-time face mask detection and localization. J. Am. Med. Inform. Assoc. 28(7), 1548\u20131554 (2021)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"3","key":"501_CR23","doi-asserted-by":"publisher","first-page":"68","DOI":"10.5539\/mas.v14n3p68","volume":"14","author":"AH Mohammad","year":"2020","unstructured":"Mohammad, A.H.: Ransomware evolution, growth and recommendation for detection. Mod. Appl. Sci. 14(3), 68 (2020)","journal-title":"Mod. Appl. Sci."},{"key":"501_CR24","doi-asserted-by":"crossref","unstructured":"Ribeiro, M., Singh, S., Guestrin, C.: Why should i trust you?: explaining the predictions of any classifier. arxiv:1602.04938 cs stat. 2016 (2019)","DOI":"10.1145\/2939672.2939778"},{"key":"501_CR25","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"501_CR26","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"501_CR27","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K., Velan, K.S., Ganorkar, S.: Evaluating shallow and deep networks for ransomware detection and classification. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), pp. 259\u2013265. IEEE (2017)","DOI":"10.1109\/ICACCI.2017.8125850"},{"issue":"2","key":"501_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3423096","volume":"30","author":"B Wu","year":"2021","unstructured":"Wu, B., Chen, S., Gao, C., Fan, L., Liu, Y., Wen, W., Lyu, M.R.: Why an android app is classified as malware: toward malware classification interpretation. ACM Trans. Softw. Eng. Methodol. 30(2), 1\u201329 (2021)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"501_CR29","doi-asserted-by":"crossref","unstructured":"Xing, X., Jin, X., Elahi, H., Jiang, H., Wang, G.: A malware detection approach using autoencoder in deep learning. IEEE Access 10, 25696\u201325706 (2022)","DOI":"10.1109\/ACCESS.2022.3155695"},{"key":"501_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A.: Learning deep features for discriminative localization. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2921\u20132929 (2016)","DOI":"10.1109\/CVPR.2016.319"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00501-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00501-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00501-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:12:36Z","timestamp":1713463956000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00501-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,27]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["501"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00501-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,27]]},"assertion":[{"value":"31 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors confirm that there are not potential conflicts of interest include employment, consultancies, stock ownership, honoraria, paid expert testimony, patent applications\/registrations, and grants or other funding.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}