{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:24:06Z","timestamp":1775471046626,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12652-020-02630-7","type":"journal-article","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T19:02:26Z","timestamp":1605121346000},"page":"8699-8717","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives"],"prefix":"10.1007","volume":"12","author":[{"given":"Ibrahim","family":"Bello","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3446-4316","authenticated-orcid":false,"given":"Haruna","family":"Chiroma","sequence":"additional","affiliation":[]},{"given":"Usman A.","family":"Abdullahi","sequence":"additional","affiliation":[]},{"given":"Abdulsalam Ya\u2019u","family":"Gital","sequence":"additional","affiliation":[]},{"given":"Fatsuma","family":"Jauro","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Julius O.","family":"Okesola","sequence":"additional","affiliation":[]},{"given":"Shafi\u2019i M.","family":"Abdulhamid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"2630_CR1","unstructured":"Digital Guardian (2019) A history of ransomware attacks: the biggest and worst ransomware attacks of all time. https:\/\/digitalguardian.com\/blog\/history-ransomware-attacks-biggest-and-worst-ransomware-attacks-all-time. Accessed 17 Dec 2019"},{"key":"2630_CR2","doi-asserted-by":"crossref","unstructured":"Abdullahi AU, Ahmad R, Zakaria NM (2016) Big data: performance profiling of meteorological and oceanographic data on hive. In: Paper presented at the 2016 3rd international conference on computer and information sciences (ICCOINS).","DOI":"10.1109\/ICCOINS.2016.7783215"},{"key":"2630_CR3","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.ins.2017.06.027","volume":"415","author":"UR Acharya","year":"2017","unstructured":"Acharya UR, Fujita H, Oh SL, Hagiwara Y, Tan JH, Adam M (2017) Application of deep convolutional neural network for automated detection of myocardial infarction using ECG signals. Inf Sci 415:190\u2013198","journal-title":"Inf Sci"},{"key":"2630_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal R, Stokes JW, Selvaraj K, Marinescu M (2019) Attention in recurrent neural networks for ransomware detection. In: Paper presented at the ICASSP 2019\u20132019 IEEE international conference on acoustics, speech and signal processing (ICASSP).","DOI":"10.1109\/ICASSP.2019.8682899"},{"key":"2630_CR5","doi-asserted-by":"crossref","unstructured":"Ahmadian MM, Shahriari HR (2016) 2entFOX: a framework for high survivable ransomwares detection. In: 2016 13th international iranian society of cryptology conference on information security and cryptology (ISCISC), 7-8 Sept 2016. IEEE, Tehran, Iran, pp 79\u201384","DOI":"10.1109\/ISCISC.2016.7736455"},{"key":"2630_CR6","doi-asserted-by":"crossref","unstructured":"Al-Hawawreh M, Sitnikova E (2019) Leveraging deep learning models for ransomware detection in the industrial internet of things environment. In: Paper presented at the 2019 military communications and information systems conference (MilCIS).","DOI":"10.1109\/MilCIS.2019.8930732"},{"key":"2630_CR7","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-73951-9_5","volume":"70","author":"OM Alhawi","year":"2018","unstructured":"Alhawi OM, Baldwin J, Dehghantanha A (2018) Leveraging machine learning techniques for windows ransomware network traffic detection. Cyber Threat Intell 70:93\u2013106","journal-title":"Cyber Threat Intell"},{"key":"2630_CR8","doi-asserted-by":"publisher","first-page":"47053","DOI":"10.1109\/ACCESS.2019.2907485","volume":"7","author":"AO Almashhadani","year":"2019","unstructured":"Almashhadani AO, Kaiiali M, Sezer S, O\u2019Kane P (2019) A multi-classifier network-based crypto ransomware detection system: a case study of locky ransomware. IEEE Access 7:47053\u201347067","journal-title":"IEEE Access"},{"key":"2630_CR9","doi-asserted-by":"crossref","unstructured":"Alrawashdeh K, Purdy C (2018) Ransomware detection using limited precision deep learning structure in fpga. In: Paper presented at the NAECON 2018-IEEE national aerospace and electronics conference.","DOI":"10.1109\/NAECON.2018.8556824"},{"key":"2630_CR10","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","volume":"74","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74:144\u2013166","journal-title":"Comput Secur"},{"key":"2630_CR11","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.future.2019.06.005","volume":"101","author":"BAS Al-rimy","year":"2019","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM (2019) Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Gener Comput Syst 101:476\u2013491","journal-title":"Future Gener Comput Syst"},{"key":"2630_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.016","author":"MA Amanullah","year":"2020","unstructured":"Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Nainar ASM, Imran M (2020) Deep learning and big data technologies for IoT security. Comput Commun. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.016","journal-title":"Comput Commun"},{"key":"2630_CR13","doi-asserted-by":"crossref","unstructured":"Andronio N, Zanero S, Maggi F (2015) Heldroid: dissecting and detecting mobile ransomware. In: Paper presented at the international symposium on recent advances in intrusion detection.","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"2630_CR14","unstructured":"Ashraf A, Aziz A, Zahoora U, Khan A (2019) Ransomware analysis using feature engineering and deep neural networks. arXiv preprint. http:\/\/arxiv.org\/abs\/1910.00286"},{"issue":"2","key":"2630_CR15","first-page":"48","volume":"6","author":"S Aurangzeb","year":"2017","unstructured":"Aurangzeb S, Aleem M, Iqbal MA, Islam MA (2017) Ransomware: a survey and trends. J Inf Assur Secur 6(2):48\u201358","journal-title":"J Inf Assur Secur"},{"key":"2630_CR16","doi-asserted-by":"crossref","first-page":"e5422","DOI":"10.1002\/cpe.5422","volume":"32","author":"SI Bae","year":"2019","unstructured":"Bae SI, Lee GB, Im EG (2019) Ransomware detection using machine learning algorithms. Concurr Comput Pract Exp 32:e5422","journal-title":"Concurr Comput Pract Exp"},{"key":"2630_CR17","doi-asserted-by":"publisher","first-page":"144925","DOI":"10.1109\/ACCESS.2019.2945839","volume":"7","author":"E Berrueta","year":"2019","unstructured":"Berrueta E, Morato D, Maga\u00f1a E, Izal M (2019) A survey on detection techniques for cryptographic ransomware. IEEE Access 7:144925\u2013144944","journal-title":"IEEE Access"},{"issue":"14","key":"2630_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i14\/82936","volume":"9","author":"A Bhardwaj","year":"2016","unstructured":"Bhardwaj A, Avasthi V, Sastry H, Subrahmanyam G (2016) Ransomware digital extortion: a rising new age threat. Indian J Sci Technol 9(14):1\u20135","journal-title":"Indian J Sci Technol"},{"key":"2630_CR19","doi-asserted-by":"crossref","unstructured":"Bibi I, Akhunzada A, Malik J, Ahmed G, Raza M (2019) An effective android ransomware detection through multi-factor feature filtration and recurrent neural network. In: Paper presented at the 2019 UK\/China Emerging Technologies (UCET).","DOI":"10.1109\/UCET.2019.8881884"},{"issue":"1","key":"2630_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"2630_CR21","doi-asserted-by":"publisher","first-page":"4897","DOI":"10.1109\/JIOT.2018.2878707","volume":"6","author":"R Chaudhary","year":"2018","unstructured":"Chaudhary R, Aujla GS, Kumar N, Zeadally S (2018) Lattice based public key cryptosystem for internet of things environment: challenges and solutions. IEEE Internet Things J 6:4897\u20134909","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"2630_CR22","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1109\/TIFS.2017.2787905","volume":"13","author":"J Chen","year":"2017","unstructured":"Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn G-J (2017a) Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans Inf Forensics Secur 13(5):1286\u20131300","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2630_CR23","doi-asserted-by":"crossref","unstructured":"Chen Y-C, Li Y-J, Tseng A, Lin T (2017b) Deep learning for malicious flow detection. In: Paper presented at the 2017 IEEE 28th annual international symposium on personal, indoor, and mobile radio communications (PIMRC).","DOI":"10.1109\/PIMRC.2017.8292316"},{"key":"2630_CR24","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.procs.2017.10.065","volume":"116","author":"H Chong","year":"2017","unstructured":"Chong H (2017) SeCBD: the application idea from study evaluation of ransomware attack method in big data architecture. Procedia Comput Sci 116:358\u2013364","journal-title":"Procedia Comput Sci"},{"key":"2630_CR25","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.eswa.2018.02.039","volume":"102","author":"A Cohen","year":"2018","unstructured":"Cohen A, Nissim N (2018) Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Syst Appl 102:158\u2013178","journal-title":"Expert Syst Appl"},{"key":"2630_CR26","doi-asserted-by":"publisher","first-page":"101568","DOI":"10.1016\/j.cose.2019.101568","volume":"87","author":"LY Connolly","year":"2019","unstructured":"Connolly LY, Wall DS (2019) The rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures. Comput Secur 87:101568","journal-title":"Comput Secur"},{"key":"2630_CR27","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.cose.2018.08.008","volume":"79","author":"M Conti","year":"2018","unstructured":"Conti M, Gangwal A, Ruj S (2018) On the economic significance of ransomware campaigns: a bitcoin transactions perspective. Comput Secur 79:162\u2013189","journal-title":"Comput Secur"},{"key":"2630_CR28","doi-asserted-by":"publisher","unstructured":"Cusack G, Michel O, Keller E (2018) Machine learning-based detection of ransomware using SDN, pp 1\u20136. https:\/\/doi.org\/10.1145\/3180465.3180467. Accessed 17 Dec 2019","DOI":"10.1145\/3180465.3180467"},{"key":"2630_CR29","doi-asserted-by":"crossref","unstructured":"Daku H, Zavarsky P, Malik Y (2018) Behavioral-based classification and identification of ransomware variants using machine learning. In: Paper presented at the 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE).","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00224"},{"issue":"4","key":"2630_CR30","first-page":"10","volume":"2","author":"M Damshenas","year":"2013","unstructured":"Damshenas M, Dehghantanha A, Mahmoud R (2013) A survey on malware propagation, analysis, and detection. Int J Cyber Secur Digit Forensics 2(4):10\u201330","journal-title":"Int J Cyber Secur Digit Forensics"},{"key":"2630_CR31","unstructured":"Druva (2017) Druva releases annual enterprise ransomware report. https:\/\/www.globenewswire.com\/news-release\/2017\/06\/28\/1217348\/0\/en\/Druva-Releases-Annual-Enterprise-Ransomware-Report.html. Accessed 17 Dec 2019"},{"key":"2630_CR32","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.diin.2015.02.001","volume":"13","author":"A Feizollah","year":"2015","unstructured":"Feizollah A, Anuar NB, Salleh R, Wahab AWA (2015) A review on feature selection in mobile malware detection. Digit Investig 13:22\u201337","journal-title":"Digit Investig"},{"issue":"5","key":"2630_CR33","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.3390\/s19051114","volume":"19","author":"L Fernandez Maimo","year":"2019","unstructured":"Fernandez Maimo L, Huertas Celdran A, Perales Gomez AL, Clemente G, F\u00e9lix J, Weimer J, Lee I (2019) Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments. Sensors 19(5):1114","journal-title":"Sensors"},{"key":"2630_CR81","unstructured":"Frank E, Hall MA, Witten IH (2016) The WEKA workbench. Morgan Kaufmann"},{"key":"2630_CR34","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.cose.2017.11.019","volume":"73","author":"J G\u00f3mez-Hern\u00e1ndez","year":"2018","unstructured":"G\u00f3mez-Hern\u00e1ndez J, \u00c1lvarez-Gonz\u00e1lez L, Garc\u00eda-Teodoro P (2018) R-Locker: thwarting ransomware action through a honeyfile-based approach. Comput Secur 73:389\u2013398","journal-title":"Comput Secur"},{"key":"2630_CR35","doi-asserted-by":"crossref","unstructured":"Hansen SS, Larsen TMT, Stevanovic M, Pedersen JM (2016) An approach for detection and family classification of malware based on behavioral analysis. In: Paper presented at the 2016 international conference on computing, networking and communications (ICNC).","DOI":"10.1109\/ICCNC.2016.7440587"},{"key":"2630_CR36","doi-asserted-by":"publisher","first-page":"100297","DOI":"10.1016\/j.imu.2020.100297","volume":"18","author":"IRI Haque","year":"2020","unstructured":"Haque IRI, Neubert J (2020) Deep learning approaches to biomedical image segmentation. Inform Med Unlocked 18:100297","journal-title":"Inform Med Unlocked"},{"key":"2630_CR37","doi-asserted-by":"crossref","unstructured":"Harikrishnan N, Soman K (2018) Detecting ransomware using GURLS. In: Paper presented at the 2018 second international conference on advances in electronics, computers and communications (ICAECC).","DOI":"10.1109\/ICAECC.2018.8479444"},{"key":"2630_CR38","doi-asserted-by":"publisher","first-page":"24411","DOI":"10.1109\/ACCESS.2018.2830661","volume":"6","author":"WG Hatcher","year":"2018","unstructured":"Hatcher WG, Yu W (2018) A survey of deep learning: platforms, applications and emerging research trends. IEEE Access 6:24411\u201324432","journal-title":"IEEE Access"},{"key":"2630_CR39","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.future.2018.07.045","volume":"90","author":"S Homayoun","year":"2019","unstructured":"Homayoun S, Dehghantanha A, Ahmadzadeh M, Hashemi S, Khayami R, Choo K-KR, Newton DE (2019) DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. Future Gener Comput Syst 90:94\u2013104. https:\/\/doi.org\/10.1016\/j.future.2018.07.045","journal-title":"Future Gener Comput Syst"},{"key":"2630_CR40","doi-asserted-by":"publisher","first-page":"78321","DOI":"10.1109\/ACCESS.2018.2884964","volume":"6","author":"D Javaheri","year":"2018","unstructured":"Javaheri D, Hosseinzadeh M, Rahmani AM (2018) Detection and elimination of spyware and ransomware by intercepting Kernel-Level system routines. IEEE Access 6:78321\u201378332","journal-title":"IEEE Access"},{"key":"2630_CR41","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-981-13-9282-5_48","volume-title":"Smart intelligent computing and applications","author":"DP Joseph","year":"2020","unstructured":"Joseph DP, Norman J (2020) A review and analysis of ransomware using memory forensics and its tools. Smart intelligent computing and applications. Springer, Berlin, pp 505\u2013514"},{"key":"2630_CR42","doi-asserted-by":"crossref","unstructured":"Kharraz A, Robertson W, Balzarotti D, Bilge L, Kirda E (2015) Cutting the gordian knot: a look under the hood of ransomware attacks. In: Paper presented at the international conference on detection of intrusions and malware, and vulnerability assessment.","DOI":"10.1007\/978-3-319-20550-2_1"},{"issue":"4","key":"2630_CR43","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1093\/itnow\/bwx136","volume":"59","author":"D King","year":"2017","unstructured":"King D (2017) Detect and protect. ITNOW 59(4):54\u201355","journal-title":"ITNOW"},{"issue":"2","key":"2630_CR44","first-page":"136","volume":"19","author":"S Kok","year":"2019","unstructured":"Kok S, Abdullah A, Jhanjhi N, Supramaniam M (2019) Ransomware, threat and detection techniques: a review. Int J Comput Sci Netw Secur 19(2):136","journal-title":"Int J Comput Sci Netw Secur"},{"key":"2630_CR45","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/LOCS.2019.2918091","volume":"2","author":"N Lachtar","year":"2019","unstructured":"Lachtar N, Ibdah D, Bacha A (2019) The case for native instructions in the detection of mobile ransomware. IEEE Lett Comput Soc 2:16\u2013196","journal-title":"IEEE Lett Comput Soc"},{"issue":"7553","key":"2630_CR46","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"2630_CR47","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.compeleceng.2019.07.014","volume":"78","author":"S Lee","year":"2019","unstructured":"Lee S, Kim HK, Kim K (2019) Ransomware protection using the moving target defense perspective. Comput Electr Eng 78:288\u2013299","journal-title":"Comput Electr Eng"},{"key":"2630_CR48","doi-asserted-by":"crossref","unstructured":"Lu T, Zhang L, Wang S, Gong Q (2017) Ransomware detection based on v-detector negative selection algorithm. In: Paper presented at the 2017 international conference on security, pattern analysis, and cybernetics (SPAC).","DOI":"10.1109\/SPAC.2017.8304335"},{"issue":"2","key":"2630_CR49","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s40860-019-00080-3","volume":"5","author":"AM Maigida","year":"2019","unstructured":"Maigida AM, Olalere M, Alhassan JK, Chiroma H, Dada EG (2019) Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms. J Reliab Intell Environ 5(2):67\u201389","journal-title":"J Reliab Intell Environ"},{"key":"2630_CR50","doi-asserted-by":"crossref","unstructured":"Maniath S, Ashok A, Poornachandran P, Sujadevi V, Sankar AP, Jan S (2017) Deep learning LSTM based ransomware detection. In: Paper presented at the 2017 recent developments in control, automation and power engineering (RDCAPE).","DOI":"10.1109\/RDCAPE.2017.8358312"},{"key":"2630_CR51","doi-asserted-by":"publisher","first-page":"57205","DOI":"10.1109\/ACCESS.2018.2873583","volume":"6","author":"A Mart\u00edn","year":"2018","unstructured":"Mart\u00edn A, Hernandez-Castro J, Camacho D (2018) An in-depth study of the Jisut family of android ransomware. IEEE Access 6:57205\u201357218","journal-title":"IEEE Access"},{"issue":"2","key":"2630_CR52","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/LCA.2018.2883431","volume":"17","author":"D Min","year":"2018","unstructured":"Min D, Park D, Ahn J, Walker R, Lee J, Park S, Kim Y (2018) Amoeba: an autonomous backup and recovery SSD for ransomware attack defense. IEEE Comput Archit Lett 17(2):245\u2013248","journal-title":"IEEE Comput Archit Lett"},{"issue":"4","key":"2630_CR53","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1109\/COMST.2018.2844341","volume":"20","author":"M Mohammadi","year":"2018","unstructured":"Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M (2018) Deep learning for IoT big data and streaming analytics: a survey. IEEE Commun Surv Tutor 20(4):2923\u20132960","journal-title":"IEEE Commun Surv Tutor"},{"key":"2630_CR54","doi-asserted-by":"publisher","first-page":"7137","DOI":"10.1109\/JIOT.2019.2914390","volume":"6","author":"A-H Muna","year":"2019","unstructured":"Muna A-H, den Hartog F, Sitnikova E (2019) Targeted ransomware: a new cyber threat to edge system of brownfield industrial internet of things. IEEE Internet Things J 6:7137\u20137151","journal-title":"IEEE Internet Things J"},{"key":"2630_CR55","unstructured":"National Vulnerability Databasa (2017) CVE-2017-0144 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0144. Accessed 17 Dec 2019"},{"issue":"5","key":"2630_CR56","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1049\/iet-net.2017.0207","volume":"7","author":"P O'Kane","year":"2018","unstructured":"O\u2019Kane P, Sezer S, Carlin D (2018) Evolution of ransomware. IET Networks 7(5):321\u2013327","journal-title":"IET Networks"},{"issue":"2","key":"2630_CR57","first-page":"371","volume":"5","author":"P Pathak","year":"2016","unstructured":"Pathak P, Nanded YM (2016) A dangerous trend of cybercrime: ransomware growing challenge. Int J Adv Res Comput Eng Technol 5(2):371\u2013373","journal-title":"Int J Adv Res Comput Eng Technol"},{"key":"2630_CR58","doi-asserted-by":"crossref","unstructured":"Pluskal O (2015) Behavioural malware detection using efficient SVM implementation. In: Paper presented at the proceedings of the 2015 conference on research in adaptive and convergent systems.","DOI":"10.1145\/2811411.2811516"},{"key":"2630_CR59","doi-asserted-by":"crossref","unstructured":"Poudyal S, Subedi KP, Dasgupta D (2018) A framework for analyzing ransomware using machine learning. In: Paper presented at the 2018 IEEE symposium series on computational intelligence (SSCI).","DOI":"10.1109\/SSCI.2018.8628743"},{"issue":"1","key":"2630_CR60","first-page":"10","volume":"13","author":"R Richardson","year":"2017","unstructured":"Richardson R, North MM (2017) Ransomware: evolution, mitigation and prevention. Int Manag Rev 13(1):10","journal-title":"Int Manag Rev"},{"key":"2630_CR61","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-981-13-7403-6_42","volume-title":"Emerging technology in modelling and graphics","author":"S Sabharwal","year":"2020","unstructured":"Sabharwal S, Sharma S (2020) Ransomware attack: India issues red alert. Emerging technology in modelling and graphics. Springer, Berlin, pp 471\u2013484"},{"key":"2630_CR62","volume-title":"The evolution of ransomware","author":"K Savage","year":"2015","unstructured":"Savage K, Coogan P, Lau H (2015) The evolution of ransomware. Symantec, Mountain View"},{"key":"2630_CR63","doi-asserted-by":"crossref","unstructured":"Scaife N, Carter H, Traynor P, Butler KR (2016) Cryptolock (and drop it): stopping ransomware attacks on user data. In: Paper presented at the 2016 IEEE 36th international conference on distributed computing systems (ICDCS).","DOI":"10.1109\/ICDCS.2016.46"},{"key":"2630_CR64","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.cose.2019.06.004","volume":"86","author":"M Scalas","year":"2019","unstructured":"Scalas M, Maiorca D, Mercaldo F, Visaggio CA, Martinelli F, Giacinto G (2019) On the effectiveness of system API-related information for android ransomware detection. Comput Secur 86:168\u2013182","journal-title":"Comput Secur"},{"key":"2630_CR65","unstructured":"Sgandurra D, Mu\u00f1oz-Gonz\u00e1lez L, Mohsen R, Lupu EC (2016) Automated dynamic analysis of ransomware: benefits, limitations and use for detection. arXiv preprint. http:\/\/arxiv.org\/abs\/1609.03020"},{"key":"2630_CR66","doi-asserted-by":"crossref","unstructured":"Shakir HA, Jaber AN (2017) A short review for ransomware: pros and cons. In: Paper presented at the international conference on P2P, parallel, grid, cloud and internet computing.","DOI":"10.1007\/978-3-319-69835-9_38"},{"key":"2630_CR67","doi-asserted-by":"publisher","first-page":"24522","DOI":"10.1109\/ACCESS.2020.2970466","volume":"8","author":"S Sharmeen","year":"2020","unstructured":"Sharmeen S, Ahmed YA, Huda S, Ko\u00e7er B, Hassan MM (2020) Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches. IEEE Access. 8:24522\u201324534","journal-title":"IEEE Access."},{"key":"2630_CR68","doi-asserted-by":"crossref","unstructured":"Shaukat SK, Ribeiro VJ (2018) RansomWall: a layered defense system against cryptographic ransomware attacks using machine learning. In: Paper presented at the 2018 10th international conference on communication systems and networks (COMSNETS).","DOI":"10.1109\/COMSNETS.2018.8328219"},{"key":"2630_CR69","doi-asserted-by":"crossref","unstructured":"Shukla M, Mondal S, Lodha S (2016) Poster: locally virtualized environment for mitigating ransomware threat. In: Paper presented at the proceedings of the 2016 ACM SIGSAC conference on computer and communications security.","DOI":"10.1145\/2976749.2989051"},{"key":"2630_CR70","first-page":"9","volume":"2016","author":"S Song","year":"2016","unstructured":"Song S, Kim B, Lee S (2016) The effective ransomware prevention technique using process monitoring on android platform. Mobile Inf Syst 2016:9","journal-title":"Mobile Inf Syst"},{"key":"2630_CR71","doi-asserted-by":"publisher","first-page":"20381","DOI":"10.1109\/ACCESS.2018.2888568","volume":"7","author":"D Su","year":"2018","unstructured":"Su D, Liu J, Wang X, Wang W (2018) Detecting android locker-ransomware on chinese social networks. IEEE Access 7:20381\u201320393","journal-title":"IEEE Access"},{"key":"2630_CR72","unstructured":"Symantec (2019) 2019 internet security threat report. https:\/\/www.symantec.com\/en\/uk\/security-center\/threat-report. Accessed 17 Dec 2019"},{"key":"2630_CR73","doi-asserted-by":"crossref","unstructured":"Verma M, Kumarguru P, Deb SB, Gupta A (2018) Analysing indicator of compromises for ransomware: leveraging IOCs with machine learning techniques. In: Paper presented at the 2018 IEEE international conference on intelligence and security informatics (ISI).","DOI":"10.1109\/ISI.2018.8587409"},{"key":"2630_CR74","doi-asserted-by":"publisher","first-page":"55043","DOI":"10.1109\/ACCESS.2018.2868885","volume":"6","author":"LJG Villalba","year":"2018","unstructured":"Villalba LJG, Orozco ALS, Vivar AL, Vega EAA, Kim T-H (2018) Ransomware automatic data acquisition tool. IEEE Access 6:55043\u201355052","journal-title":"IEEE Access"},{"key":"2630_CR75","doi-asserted-by":"crossref","unstructured":"Vinayakumar R, Soman K, Velan KS, Ganorkar S (2017) Evaluating shallow and deep networks for ransomware detection and classification. In: Paper presented at the 2017 international conference on advances in computing, communications and informatics (ICACCI).","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"2630_CR76","unstructured":"Vinayakumar R, Alazab M, Jolfaei A, Soman K, Poornachandran P (2019) Ransomware triage using deep learning: twitter as a case study. In: Paper presented at the 2019 cybersecurity and cyberforensics conference (CCC)."},{"key":"2630_CR77","doi-asserted-by":"crossref","unstructured":"Wan Y-L, Chang J-C, Chen R-J, Wang S-J (2018) Feature-selection-based ransomware detection with machine learning of data analysis. In: Paper presented at the 2018 3rd international conference on computer and communication systems (ICCCS).","DOI":"10.1109\/CCOMS.2018.8463300"},{"key":"2630_CR78","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.comnet.2017.09.003","volume":"129","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob I, Ahmed E, Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the internet of things. Comput Netw 129:444\u2013458","journal-title":"Comput Netw"},{"key":"2630_CR79","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.future.2019.09.025","volume":"110","author":"B Zhang","year":"2019","unstructured":"Zhang B, Xiao W, Xiao X, Sangaiah AK, Zhang W, Zhang J (2019) Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes. Future Gener Comput Syst 110:708\u2013720","journal-title":"Future Gener Comput Syst"},{"key":"2630_CR80","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang H, Xiao X, Mercaldo F, Ni S, Martinelli F, Sangaiah AK (2019) Classification of ransomware families with machine learning based on N-gram of opcodes. Future Gener Comput Syst 90:211\u2013221. https:\/\/doi.org\/10.1016\/j.future.2018.07.052","journal-title":"Future Gener Comput Syst"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02630-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02630-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02630-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T02:56:23Z","timestamp":1697079383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02630-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,11]]},"references-count":81,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["2630"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02630-7","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,11]]},"assertion":[{"value":"20 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}