{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T10:38:41Z","timestamp":1773398321181,"version":"3.50.1"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3218779","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:36:13Z","timestamp":1667525773000},"page":"117597-117610","source":"Crossref","is-referenced-by-count":28,"title":["Machine Learning Algorithms and Frameworks in Ransomware Detection"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6382-278X","authenticated-orcid":false,"given":"Daryle","family":"Smith","sequence":"first","affiliation":[{"name":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0649-9247","authenticated-orcid":false,"given":"Sajad","family":"Khorsandroo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9026-5322","authenticated-orcid":false,"given":"Kaushik","family":"Roy","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180467"},{"key":"ref38","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2018.8328219"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740837"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.02.008"},{"key":"ref30","article-title":"RANDS: A machine learning-based anti-ransomware tool for Windows platforms","volume":"318","author":"zuhair","year":"2019","journal-title":"Advancing Technology Industrialization Through Intelligent Software Methodologies Tools and Techniques"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"ref36","article-title":"Automated dynamic analysis of ransomware: Benefits, limitations and use for detection","author":"sgandurra","year":"2016","journal-title":"arXiv 1609 03020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129704"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/info9090231"},{"key":"ref60","year":"2017","journal-title":"WannaCry Ransom ware&#x2014;LogRhythm"},{"key":"ref62","author":"nimbalkar","year":"2021","journal-title":"Decision Tree Algorithms-Machine Learning"},{"key":"ref61","author":"kujawa","year":"2019","journal-title":"Ryuk Ransomware Attacks Businesses Over the Holidays"},{"key":"ref63","author":"india","year":"2020","journal-title":"Hands-on Training With Machine Learning Algorithms Decision Tree and Random Forest"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003785"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09838-1"},{"key":"ref27","first-page":"2236","article-title":"Automated analysis approach for the detection of high survivable ransomware","volume":"14","author":"ahmed","year":"2020","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/su14010008"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.037"},{"key":"ref29","first-page":"1","article-title":"Blast your way through malware analysis assisted by bioinformatics tools","author":"pedersen","year":"2012","journal-title":"Proc Int Conf Secur Manage"},{"key":"ref2","year":"2020","journal-title":"Northumbria University Hit by Cyber Attack"},{"key":"ref1","author":"abrams","year":"2020","journal-title":"SunCrypt Ransomware Shuts Down North Carolina School District"},{"key":"ref20","author":"mbaabu","year":"2020","journal-title":"Introduction to random forest in machine learning"},{"key":"ref22","author":"saxena","year":"2021","journal-title":"Introduction to Long Short Term Memory (LSTM)"},{"key":"ref21","author":"brownlee","year":"2021","journal-title":"A Gentle Introduction to Long Short-Term Memory Networks by the Experts"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007413511361"},{"key":"ref23","author":"ray","year":"2017","journal-title":"6 Easy Steps to Learn Naive Bayes Algorithm with codes in Python and R"},{"key":"ref26","author":"gandhi","year":"2018","journal-title":"Support Vector Machine&#x2014;Introduction to Machine Learning Algorithms"},{"key":"ref25","author":"li","year":"2016","journal-title":"A gentle introduction to gradient boosting"},{"key":"ref50","author":"liy","year":"2017","journal-title":"Putin Culpa a Los Servicios Secretos de EE UU Por el Virus &#x2019;WannaCry&#x2019; Que Desencaden? el Ciberataque Mundial"},{"key":"ref51","first-page":"5","article-title":"A study of wannacry ransomware attack","volume":"4","author":"sahi","year":"2017","journal-title":"International Journal of Engineering Research in Computer Science and Engineering"},{"key":"ref59","year":"2021","journal-title":"What is Ransomware"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3444370.3444620"},{"key":"ref57","year":"2019","journal-title":"Fall 2019 Threat of the Quarter Ryuk Ransomware"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3479393"},{"key":"ref54","author":"gerend","year":"2021","journal-title":"Wscript"},{"key":"ref53","year":"2022","journal-title":"JavaScript Language Resour ces&#x2014;JavaScript MDN"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1503\/cmaj.1095434"},{"key":"ref10","year":"2021","journal-title":"Ransom32 Ransomware-as-a-Service"},{"key":"ref11","author":"sjouwerman","year":"2019","journal-title":"First Javascript-Only Ransomware as a Service Poses New Threat"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.045"},{"key":"ref12","author":"schwartz","year":"2016","journal-title":"Latest Ransomware Relies on JavaScript"},{"key":"ref13","year":"2016","journal-title":"New RAA Ransomware Uses Only JavaScript to Infect Computers"},{"key":"ref14","author":"tolbert","year":"2020","journal-title":"Malicious Actors Exploiting Coronavirus Fears"},{"key":"ref15","year":"2020","journal-title":"Apps Designed to Track COVID-19 Might be Full of Ransomware Report Says"},{"key":"ref16","year":"2020","journal-title":"Digital CoronaVirus Yet Another Ransomware Combined With Infostealer"},{"key":"ref17","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref18","author":"chauhan","year":"2020","journal-title":"Decision Tree Algorithm Explained"},{"key":"ref19","author":"donges","year":"2021","journal-title":"A complete guide to the random forest algorithm"},{"key":"ref4","author":"freedman","year":"2020","journal-title":"Ransomware Attacks Predicted to Occur Every 11 Seconds in 202 With a Cost of $20 Billion"},{"key":"ref3","author":"fraga","year":"2013","journal-title":"Swansea Police Pay $750 &#x2018;Ransom&#x2019; After Computer Virus Strikes"},{"key":"ref6","first-page":"169","article-title":"Ransomware: Current trend, challenges, and research directions","author":"segun","year":"2017","journal-title":"Proc World Congr Eng Comput Sci"},{"key":"ref5","author":"savage","year":"2015","journal-title":"The Evolution of Ransomware"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"ref7","first-page":"757","article-title":"UNVEIL: A large-scale, automated approach to detecting ransomware","author":"kharaz","year":"2016","journal-title":"Proc 25th USENIX Secur Symp"},{"key":"ref49","author":"jones","year":"2017","journal-title":"Global Alert to Prepare for Fresh Cyber Attacks"},{"key":"ref9","author":"abrams","year":"2016","journal-title":"Ransom32 is the First Ransomware Written in Javascript"},{"key":"ref46","year":"2017","journal-title":"Wannacry ransomware campaign exploiting smb vulnerability"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-119"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3238293"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2019.130218"},{"key":"ref42","author":"golden","year":"2021","journal-title":"Defending Against Ransomware in an Age of Emerging Technology"},{"key":"ref41","year":"2022","journal-title":"Ransomware is Here to Stay and Other Cybersecurity Predictions for 2022"},{"key":"ref44","year":"2020","journal-title":"Phishing Activity Trends Report in Q1 of 2020"},{"key":"ref43","author":"simonovich","year":"2020","journal-title":"Are Utilities Doing Enough to Protect Themselves From Cyberattack?"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09934917.pdf?arnumber=9934917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T20:04:48Z","timestamp":1670875488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9934917\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3218779","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}