{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:48:57Z","timestamp":1778168937490,"version":"3.51.4"},"reference-count":230,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Young and Middle-Aged Academic Leader Qing Lan Project of Jiangsu Province"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3556187","type":"journal-article","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T21:58:37Z","timestamp":1743544717000},"page":"57943-57982","source":"Crossref","is-referenced-by-count":20,"title":["A Survey of Ransomware Detection Methods"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8380-2487","authenticated-orcid":false,"given":"Saleh","family":"Alzahrani","sequence":"first","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8549-6794","authenticated-orcid":false,"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7405-7646","authenticated-orcid":false,"given":"Sultan","family":"Asiri","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Applied College, King Khalid University, Muhayil, Saudi Arabia"}]},{"given":"Jianying","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Intelligent Manufacturing and Smart Transportation, Suzhou City University, Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0474-953X","authenticated-orcid":false,"given":"Tieshan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.117233"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3687487"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736455"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.115440"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502676"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0092-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"ref9","volume-title":"The Emergence of Ransomware","author":"Giri","year":"2006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3564746.3587004"},{"key":"ref11","volume-title":"Mcafee Labs Threats Report","author":"Cruz","year":"2014"},{"key":"ref12","volume-title":"Ransomware on the Rise","year":"2015"},{"key":"ref13","volume-title":"Protecting Against the Top Cybersecurity Threats in 2023 Requires a Balanced Approach","author":"Wrozek","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/1401102"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2022.120270"},{"key":"ref16","volume-title":"Conti Ransomware","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3461965"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app14083520"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-024-00539-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6272"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-10059-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.53106\/160792642022122307010"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103349"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE54285.2021.9719456"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6890-6_13"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3453153"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CRC50527.2021.9392529"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/app12010172"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s22051837"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3181278"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc7030143"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3268535"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33309-5_15"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2024.136697"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3397921"},{"key":"ref37","volume-title":"Held to Ransom","year":"2021"},{"key":"ref38","volume-title":"Ransomware hit 66 \u2018State of Ransomware 2022\u2019","year":"2022"},{"key":"ref39","volume-title":"\u2018All We Have Had is Losses\u2019: Royal Mail Dismisses \u2018Absurd\u2019 $80m Ransom Demand","author":"Davies","year":"2023"},{"key":"ref40","volume-title":"US Marshals Unveil Fully Reconstituted System Following Ransomware Attack.","year":"2023"},{"key":"ref41","volume-title":"Mcna Dental Data Breach Impacts 89 Million People After Ransomware Attack","year":"2023"},{"key":"ref42","volume-title":"Schools Ransomware Data Breach","year":"2023"},{"key":"ref43","volume-title":"Capita Says Responding to Ransomware Attack Will Cost up to $20 Million","year":"2023"},{"key":"ref44","volume-title":"Lehigh Valley Health Network Sued After Ransomware Gang Publishes Nude Patient Images","year":"2023"},{"key":"ref45","volume-title":"What We Know About the Moveit Exploit and Ransomware Attacks","year":"2023"},{"key":"ref46","volume-title":"Dallas: 26,000 People Impacted Ransomware Attack","year":"2023"},{"key":"ref47","volume-title":"UK Battles Hacking Wave as Ransomware Gang Claims \u2018Biggest Ever\u2019 NHS Breach","year":"2023"},{"key":"ref48","volume-title":"Illinois Hospital Closure Showcases Ransomware\u2019s Existential Threat","year":"2023"},{"key":"ref49","volume-title":"Big Four Bank Data Lost in HWL Ebsworth Cyber-Attack","year":"2023"},{"key":"ref50","volume-title":"Tsmc Denies Lockbit Hack As Ransomware Gang Demands $70 Million","year":"2023"},{"key":"ref51","volume-title":"Tampa General Hospital Attracts a Class Action Lawsuit Over July Data Breach","year":"2023"},{"key":"ref52","volume-title":"Cloudnordic, Azerocloud Lose All Data in Huge Ransomware Attack","year":"2023"},{"key":"ref53","volume-title":"Prospect Medical Holdings Said Cyber Attack Impacted Multiple Hospital Networks","year":"2023"},{"key":"ref54","volume-title":"Caesars Entertainment Reportedly Paid Ransomware Demand","author":"Murphy","year":"2023"},{"key":"ref55","volume-title":"Ransomware Attack on Mgm Resorts","author":"Kelleher","year":"2023"},{"key":"ref56","volume-title":"Building Automation Giant Johnson Controls Hit By Ransomware Attack","year":"2023"},{"key":"ref57","volume-title":"Uk Logistics Firm Blames Ransomware Attack for Insolvency, 730 Redundancies","author":"Martin","year":"2023"},{"key":"ref58","volume-title":"Ardent Health Services Grapples With Ransomware Disruption","author":"Mascellino","year":"2023"},{"key":"ref59","volume-title":"Report Details Aftermath of ICBC Lockbit Ransomware Attack","author":"Riotta","year":"2023"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE60595.2023.10469536"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3109812"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.072"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICEARS53579.2022.9751949"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3433-6_62"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3546334"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323680"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107635"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01854-6_48"},{"key":"ref69","article-title":"Malware classification using static disassembly and machine learning","author":"Chen","year":"2021","journal-title":"arXiv:2201.07649"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.40"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ichis.2004.75"},{"key":"ref72","first-page":"53","article-title":"Anti-virus techniques","volume-title":"Computer Viruses and Malware","author":"Aycock","year":"2006"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2008.28"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2012.54"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487940"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2014.975557"},{"key":"ref78","volume-title":"Most Common Malware Obfuscation Techniques","author":"Jeyashankar","year":"2022"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323682"},{"key":"ref80","first-page":"267","article-title":"A novel concept of network incident analysis based on multi-layer observations of malware activities","volume-title":"Proc. 2nd Joint Workshop Inf. Secur. (JWIS)","author":"Nakao"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.19"},{"key":"ref82","first-page":"64","article-title":"Fileprints: Identifying file types by n-gram analysis","volume-title":"Proc. 6th Annu. IEEE Syst., Man Cybern. (SMC) Inf. Assurance Workshop","author":"Li"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0250-0"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.09.006"},{"key":"ref85","volume-title":"Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software","author":"Sikorski","year":"2012"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3207757"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13183689"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123652"},{"key":"ref89","article-title":"New risks in ransomware: Supply chain attacks and cryptocurrency","author":"Robinson","year":"2022"},{"key":"ref90","volume-title":"What is Ransomware-as-a-Service (RaaS)? | Goanywhere MFT","author":"Kath","year":"2021"},{"key":"ref91","volume-title":"What is Ransomware As a Service (RaaS)? The Dangerous Threat to World Security | Upguard","author":"Kost","year":"2023"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3237798"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00040"},{"key":"ref95","volume-title":"CVE-2021-34527","year":"2021"},{"key":"ref96","volume-title":"CVE-2021-44228","year":"2021"},{"key":"ref97","volume-title":"CVE-2020-1472","year":"2020"},{"key":"ref98","volume-title":"CVE-2019-1182","year":"2019"},{"key":"ref99","volume-title":"CVE-2018-13379","year":"2019"},{"key":"ref100","volume-title":"CVE-2017-0144","year":"2017"},{"key":"ref101","volume-title":"CVE-2019-11510","year":"2019"},{"key":"ref102","volume-title":"CVE-2020-0688","year":"2020"},{"key":"ref103","volume-title":"CVE-2022-22954","year":"2022"},{"key":"ref104","volume-title":"CVE-2022-22965","year":"2022"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8300039"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12942-2_20"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101762"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169451"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108601"},{"key":"ref110","article-title":"Open repository for the evaluation of ransomware detection tools","author":"Berrueta","year":"2023","journal-title":"IEEE DataPort"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04043-5"},{"key":"ref112","volume-title":"Virusshare Malware Samples","year":"2023"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad005"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3608484"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103265"},{"key":"ref116","article-title":"Ransomware PE header feature dataset","author":"Moreira","year":"2024"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00758-z"},{"key":"ref118","volume-title":"Free Malware Reports","year":"2024"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3390\/app13085167"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.036802"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12183899"},{"key":"ref122","volume-title":"Ransomware Attacks","year":"2024"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3279819"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3480889"},{"key":"ref125","volume-title":"Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments","year":"2024"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/info15050262"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.3390\/app14114579"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103849"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104167"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104293"},{"key":"ref131","article-title":"Automated dynamic analysis of ransomware: Benefits, limitations and use for detection","author":"Sgandurra","year":"2016","journal-title":"arXiv:1609.03020"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970466"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907485"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.3390\/su14031231"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308387"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3395491"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CSICC52343.2021.9420580"},{"issue":"2","key":"ref139","first-page":"181","article-title":"Ransomware detection based on PE header using convolutional neural networks","volume":"14","author":"Manavi","year":"2022","journal-title":"ISeCure"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00414-x"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2023.135840"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.3390\/app12199513"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.11.001"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3233775"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2023.133249"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13061030"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3688396"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3390\/info15040194"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.3390\/fi16080291"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2024.301756"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109509"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3364209"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13479"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00495-w"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.3390\/s23094467"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-024-10301-4"},{"key":"ref157","volume-title":"A Dataset of Android Applications for Ransomware Detection","year":"2023"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-70544-x"},{"key":"ref159","first-page":"468","article-title":"AndroZoo: Collecting millions of Android apps for the research community","volume-title":"Proc. IEEE\/ACM 13th Work. Conf. Mining Softw. Repositories (MSR)","author":"Allix"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103950"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.3390\/s24092679"},{"key":"ref162","volume-title":"SK3PTRE\/Androidmalware_2020","year":"2024"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103819"},{"key":"ref164","volume-title":"Andmal","year":"2020"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100076"},{"key":"ref166","volume-title":"Android Ransomware Detection","year":"2024"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071450"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00966-1"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME57830.2023.10252341"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108346"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.58346\/JISIS.2023.I3.012"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3477631"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.3390\/app14209548"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.3390\/s23104728"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/18.61115"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.47"},{"key":"ref177","volume-title":"Knapsack Problems: Algorithms and Computer Implementations","author":"Martello","year":"1990"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44254-9_5"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2025.3529119"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13112212"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.3390\/info15080484"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3410511"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"ref184","volume-title":"ShieLDFS: A Self-healing, Ransomware-Aware Filesystem","author":"Continella","year":"2023"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787905"},{"key":"ref186","article-title":"Ransomware API calls","author":"Bhagwat","year":"2022","journal-title":"IEEE DataPort"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.3390\/s23031053"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301314"},{"key":"ref189","volume-title":"IO_5Events_7Rounds\u20145_Events_7_Rounds","author":"Thummapudi","year":"2022"},{"key":"ref190","volume-title":"HPC_5Events_ 7Rounds\u20145_Events_7_Rounds","author":"Thummapudi","year":"2022"},{"key":"ref191","volume-title":"IO_5Events_ 7Rounds\u20145_Events_7_Rounds","author":"Thummapudi","year":"2022"},{"key":"ref192","volume-title":"IO_41Events_ 5Rounds\u201441_Events_5_Rounds","author":"Thummapudi","year":"2022"},{"key":"ref193","article-title":"PE entropy","author":"Singh","year":"2023","journal-title":"IEEE DataPort"},{"key":"ref194","article-title":"Android crypto ransomware system call dataset","author":"Chew","year":"2024","journal-title":"IEEE DataPort"},{"key":"ref195","article-title":"Ransomware combined structural feature dataset","author":"Moreira","year":"2024"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103716"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104202"},{"key":"ref198","article-title":"MalwSpecSys: A dataset containing syscalls of an IoT spectrum sensor affected by heterogeneous malware","author":"de Zaldivar","year":"2022","journal-title":"IEEE DataPort"},{"key":"ref199","volume-title":"Thezoo - a Live Malware Repository","year":"2023"},{"key":"ref200","volume-title":"Hybrid Analysis File Collections","year":"2023"},{"key":"ref201","volume-title":"Virustotal\u2019s","year":"2023"},{"key":"ref202","volume-title":"Malwarebazaarr","year":"2024"},{"key":"ref203","volume-title":"Free Malware Feeds - Virussign","year":"2024"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40467-2_3"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS50664.2020.9225141"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2024.3408257"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1002\/9781394214068.ch15"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10299-x"},{"key":"ref209","first-page":"1","article-title":"Trustworthy reinforcement learning: Opportunities and challenges","volume-title":"Proc. 23rd Int. Conf. Auto. Agents Multiagent Syst.","author":"Now\u00e9"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.15348"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/3603287.3651193"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3417467"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3401547"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11366-y"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.006"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.082"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8863617"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3067658"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-023-00094-x"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3384415"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107903"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ECICE59523.2023.10383052"},{"key":"ref223","volume-title":"Navigating the Vast Ocean of Sandbox Evasions","author":"Idrizovic","year":"2022"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/3691340"},{"key":"ref225","article-title":"Unveiling zero-space detection: A novel framework for autonomous ransomware identification in high-velocity environments","author":"Svet","year":"2025","journal-title":"arXiv:2501.12811"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-66850-0_22"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-7603-0_7"},{"key":"ref228","article-title":"Towards resilient machine learning for ransomware detection","author":"Chen","year":"2018","journal-title":"arXiv:1812.09400"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690269"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1007\/s42454-024-00055-7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10945868.pdf?arnumber=10945868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T18:01:28Z","timestamp":1744135288000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10945868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":230,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3556187","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}