{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:30:48Z","timestamp":1771889448549,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03950-1","type":"journal-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T12:24:22Z","timestamp":1748953462000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Adaptive Hellinger Distance CS and GELU-RNN: Advanced Solutions for Feature Optimization and Cloud Threat Detection"],"prefix":"10.1007","volume":"6","author":[{"given":"Venkata Surya Teja","family":"Gollapalli","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Jadon","sequence":"additional","affiliation":[]},{"given":"Rajababu","family":"Budda","sequence":"additional","affiliation":[]},{"given":"Kannan","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"Guman Singh","family":"Chauhan","sequence":"additional","affiliation":[]},{"given":"Joseph Bamidele","family":"Awotunde","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,3]]},"reference":[{"key":"3950_CR1","doi-asserted-by":"publisher","first-page":"103099","DOI":"10.1016\/j.cose.2023.103099","volume":"127","author":"L Bekkers","year":"2023","unstructured":"Bekkers L, Van\u2019t Hoff-De Goede S, Misana-terHuurne E, van Houten Y, Spithoven R, Leukfeldt ER. Protecting your business against ransomware attacks Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model. Comput Secur. 2023;127:103099.","journal-title":"Comput Secur"},{"issue":"1","key":"3950_CR2","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s10207-023-00758-z","volume":"23","author":"MA Ayub","year":"2024","unstructured":"Ayub MA, Siraj A, Filar B, Gupta M. RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic Windows ransomware. Int J Inf Secur. 2024;23(1):533\u201356.","journal-title":"Int J Inf Secur"},{"key":"3950_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-024-00819-x","volume":"23","author":"CJW Chew","year":"2024","unstructured":"Chew CJW, Kumar V, Patros P, Malik R. Real-time system call-based ransomware detection. Int J Inf Secur. 2024;23:1\u201320.","journal-title":"Int J Inf Secur"},{"key":"3950_CR4","doi-asserted-by":"publisher","first-page":"40698","DOI":"10.1109\/ACCESS.2023.3268535","volume":"11","author":"S Razaulla","year":"2023","unstructured":"Razaulla S, Fachkha C, Markarian C, Gawanmeh A, Mansoor W, Fung BC, Assi C. The age of ransomware: a survey on the evolution, taxonomy, and research directions. IEEE Access. 2023;11:40698\u2013723.","journal-title":"IEEE Access"},{"issue":"5","key":"3950_CR5","doi-asserted-by":"publisher","first-page":"3393","DOI":"10.1007\/s10207-024-00892-2","volume":"23","author":"S Enomoto","year":"2024","unstructured":"Enomoto S, Kuzuno H, Yamada H, Shiraishi Y, Morii M. Early mitigation of CPU-optimized ransomware using monitoring encryption instructions. Int J Inf Secur. 2024;23(5):3393\u2013413.","journal-title":"Int J Inf Secur"},{"issue":"4","key":"3950_CR6","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11416-022-00425-2","volume":"18","author":"KS Prachi","year":"2022","unstructured":"Prachi KS. An effective ransomware detection approach in a cloud environment using volatile memory features. J Comput Virol Hack Tech. 2022;18(4):407\u201324.","journal-title":"J Comput Virol Hack Tech"},{"issue":"1","key":"3950_CR7","first-page":"8845833","volume":"2020","author":"F Ullah","year":"2020","unstructured":"Ullah F, Javaid Q, Salam A, Ahmad M, Sarwar N, Shah D, Abrar M. Modified decision tree technique for ransomware detection at runtime through API calls. Sci Program. 2020;2020(1):8845833.","journal-title":"Sci Program"},{"key":"3950_CR8","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.future.2019.06.005","volume":"101","author":"BAS Al-rimy","year":"2019","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM. Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Gener Comput Syst. 2019;101:476\u201391.","journal-title":"Future Gener Comput Syst"},{"key":"3950_CR9","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-5123680\/v1","author":"K Schmaltz","year":"2024","unstructured":"Schmaltz K, Thompson S, Mendes D, Carvalho J. Robust defence mechanisms against adversarial ransomware attacks: implementing a universal network-level detection filter. Res Square. 2024. https:\/\/doi.org\/10.21203\/rs.3.rs-5123680\/v1.","journal-title":"Res Square"},{"key":"3950_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3348451","author":"U Urooj","year":"2023","unstructured":"Urooj U, Al-Rimy BAS, Binti Zainal A, Saeed F, Abdelmaboud A, Nagmeldin W. Addressing behavioural drift in ransomware early detection through weighted generative adversarial networks. IEEE Access. 2023. https:\/\/doi.org\/10.1109\/ACCESS.2023.3348451.","journal-title":"IEEE Access"},{"key":"3950_CR11","volume":"55","author":"SH Kok","year":"2020","unstructured":"Kok SH, Azween A, Jhanjhi NZ. Evaluation metric for crypto-ransomware detection using machine learning. J Inf Secur Appl. 2020;55: 102646.","journal-title":"J Inf Secur Appl"},{"issue":"19","key":"3950_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7047","volume":"34","author":"G Nalinipriya","year":"2022","unstructured":"Nalinipriya G, Balajee M, Priya C, Rajan C. Ransomware recognition in blockchain network using water moth flame optimization-aware DRNN. Concurr Comput Pract Exp. 2022;34(19): e7047.","journal-title":"Concurr Comput Pract Exp"},{"key":"3950_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104167","volume":"148","author":"M Gaber","year":"2025","unstructured":"Gaber M, Ahmed M, Janicke H. Zero-day ransomware detection with pulse: function classification with transformer models and assembly language. Comput Secur. 2025;148: 104167.","journal-title":"Comput Secur"},{"key":"3950_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108601","volume":"106","author":"J Singh","year":"2023","unstructured":"Singh J, Sharma K, Wazid M, Das AK. SINN-RD: spline interpolation-envisioned neural network-based ransomware detection scheme. Comput Electr Eng. 2023;106: 108601.","journal-title":"Comput Electr Eng"},{"key":"3950_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107903","volume":"100","author":"U Ahmed","year":"2022","unstructured":"Ahmed U, Lin JCW, Srivastava G. Mitigating adversarial evasion attacks of ransomware using ensemble learning. Comput Electr Eng. 2022;100: 107903.","journal-title":"Comput Electr Eng"},{"key":"3950_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100076","volume":"3","author":"MA Hossain","year":"2025","unstructured":"Hossain MA, Hasan T, Ahmed F, Cheragee SH, Kanchan MH, Haque MA. Towards superior android ransomware detection: An ensemble machine learning perspective. Cyber Security Appl. 2025;3: 100076.","journal-title":"Cyber Security Appl"},{"issue":"3","key":"3950_CR17","doi-asserted-by":"publisher","first-page":"1634","DOI":"10.1109\/TCC.2020.3001017","volume":"10","author":"W Wang","year":"2020","unstructured":"Wang W, Du X, Shan D, Qin R, Wang N. Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Trans Cloud Comput. 2020;10(3):1634\u201346.","journal-title":"IEEE Trans Cloud Comput"},{"issue":"2","key":"3950_CR18","first-page":"2347","volume":"9","author":"SA Naga","year":"2021","unstructured":"Naga SA. Optimizing cloud data centre resource allocation with a new load-balancing approach. Int J Inf Technol Comput Eng. 2021;9(2):2347\u20133657.","journal-title":"Int J Inf Technol Comput Eng"},{"key":"3950_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301314","volume":"40","author":"M Hirano","year":"2022","unstructured":"Hirano M, Hodota R, Kobayashi R. RanSAP: an open dataset of ransomware storage access patterns for training machine learning models. Forensic Sci Int Digit Invest. 2022;40: 301314. https:\/\/doi.org\/10.1016\/j.fsidi.2021.301314.","journal-title":"Forensic Sci Int Digit Invest"},{"key":"3950_CR20","doi-asserted-by":"publisher","unstructured":"Koike S, Tanaka H, Maeda M. Federated learning-based ransomware detection via indicators of compromise. 2024, Research Square. https:\/\/doi.org\/10.21203\/rs.3.rs-4585988\/v1","DOI":"10.21203\/rs.3.rs-4585988\/v1"},{"key":"3950_CR21","doi-asserted-by":"publisher","unstructured":"Aftab MA, Shafi Q. Advanced ransomware detection: Unveiling anti-analysis tactics through enhanced temporal data correlation. 2024, Research Square. https:\/\/doi.org\/10.21203\/rs.3.rs-4019125\/v1","DOI":"10.21203\/rs.3.rs-4019125\/v1"},{"key":"3950_CR22","doi-asserted-by":"publisher","unstructured":"Arlowe M, Fitzpatrick D, Brannon C. Evolutionary generative adversarial networks for detecting novel polymorphic ransomware. 2024, Research Square. https:\/\/doi.org\/10.21203\/rs.3.rs-5044272\/v1","DOI":"10.21203\/rs.3.rs-5044272\/v1"},{"key":"3950_CR23","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2020.10.002","volume":"115","author":"BAS Al-Rimy","year":"2021","unstructured":"Al-Rimy BAS, Maarof MA, Alazab M, Shaid SZM, Ghaleb FA, Almalawi A, Al-Hadhrami T. Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection. Future Gener Comput Syst. 2021;115:641\u201358.","journal-title":"Future Gener Comput Syst"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03950-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03950-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03950-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T12:24:23Z","timestamp":1748953463000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03950-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,3]]},"references-count":23,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["3950"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03950-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,3]]},"assertion":[{"value":"30 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest between the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Yes, you can reproduce.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Permission to Reproduce Material from Other Sources"}},{"value":"We have not harmed any human person with our research data collection, which was gathered from an already-published article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Registration"}}],"article-number":"515"}}