{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T22:35:27Z","timestamp":1772318127628,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/eit.2018.8500161","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T23:48:00Z","timestamp":1542325680000},"page":"0892-0897","source":"Crossref","is-referenced-by-count":28,"title":["RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform"],"prefix":"10.1109","author":[{"given":"Abdulrahman","family":"Alzahrani","sequence":"first","affiliation":[]},{"given":"Ali","family":"Alshehri","sequence":"additional","affiliation":[]},{"given":"Hani","family":"Alshahrani","sequence":"additional","affiliation":[]},{"given":"Raed","family":"Alharthi","sequence":"additional","affiliation":[]},{"given":"Huirong","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Anyi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/978-3-319-64701-2_14","article-title":"Dna-droid: A real-time android ransomware detection framework","author":"gharib","year":"2017","journal-title":"International Conference on Network and System Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2946735"},{"key":"ref30","author":"play","year":"2018","journal-title":"Google Play Store"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1007\/978-3-319-48965-0_32","article-title":"An efficient approach to detect torrentlocker ransomware in computer systems","author":"mbol","year":"2016","journal-title":"Conference on Cryptology and Network Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1825-5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3089293"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019793"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","article-title":"Cutting the gordian knot: A look under the hood of ransomware attacks","author":"kharraz","year":"2015","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref11","article-title":"Army of botnets","author":"vogt","year":"2007","journal-title":"NDSS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"ref14","first-page":"58","article-title":"Securing android: a survey, taxonomy, and challenges","volume":"47","author":"tan","year":"2015","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2996358"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046622"},{"key":"ref19","author":"developer","year":"2018","journal-title":"Trusty tee"},{"key":"ref28","year":"2017","journal-title":"Malware dump"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref27","year":"2016","journal-title":"Encrypting programs-extortionists"},{"key":"ref3","article-title":"A view on current malware behaviors","author":"bayer","year":"2009","journal-title":"LEET"},{"key":"ref6","first-page":"757","article-title":"Unveil: A large-scale, automated approach to detecting ransomware","author":"kharraz","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref29","author":"nativ","year":"2017","journal-title":"theZoo aka Malware DB"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref8","author":"wyke","year":"2015","journal-title":"The current state of ransomware"},{"key":"ref7","article-title":"Advance 2000","year":"2015","journal-title":"Security alert-ransomware"},{"key":"ref2","year":"2017","journal-title":"Understanding Crypto-Ransomware"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref1","year":"2017","journal-title":"Smartphone OS Market Share"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970312"},{"key":"ref22","first-page":"23","article-title":"Droidbot: a lightweight ui-guided test input generator for android","author":"li","year":"2017","journal-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"key":"ref21","year":"2012","journal-title":"Android&#x2013;apktool A tool for reverse engineering android apk files"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref23","author":"foundation","year":"2018","journal-title":"Pytesser 0 0 1"},{"key":"ref26","author":"developer","year":"2018","journal-title":"Dashboards"},{"key":"ref25","author":"terrace","year":"2018","journal-title":"pyssim"}],"event":{"name":"2018 IEEE International Conference on Electro\/Information Technology (EIT)","location":"Rochester, MI","start":{"date-parts":[[2018,5,3]]},"end":{"date-parts":[[2018,5,5]]}},"container-title":["2018 IEEE International Conference on Electro\/Information Technology (EIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8482102\/8500077\/08500161.pdf?arnumber=8500161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:34:28Z","timestamp":1598225668000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8500161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/eit.2018.8500161","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}