{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:02:13Z","timestamp":1774630933231,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8125850","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T17:26:11Z","timestamp":1512408371000},"page":"259-265","source":"Crossref","is-referenced-by-count":88,"title":["Evaluating shallow and deep networks for ransomware detection and classification"],"prefix":"10.1109","author":[{"given":"R.","family":"Vinayakumar","sequence":"first","affiliation":[]},{"given":"K.P.","family":"Soman","sequence":"additional","affiliation":[]},{"given":"K.K.","family":"Senthil Velan","sequence":"additional","affiliation":[]},{"given":"Shaunak","family":"Ganorkar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","volume":"16","author":"abadi","year":"2016","journal-title":"OSDI"},{"key":"ref11","first-page":"315","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"2011","journal-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref12","author":"hinton","year":"2012","journal-title":"Improving Neural Networks by Preventing Co-adaptation of Feature Detectors"},{"key":"ref13","year":"2013","journal-title":"Sandbox cuckoo &#x201C;automated malware analysis &#x201D; url"},{"key":"ref14","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019793"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref6","author":"sgandurra","year":"2016","journal-title":"Automated Dynamic Analysis of Ransomware Benefits Limitations and use for Detection"},{"key":"ref5","first-page":"87","article-title":"Deep learning for ransomware detection","volume":"116","author":"aragorn","year":"2016","journal-title":"IEICE Technical Report IEICE Tech Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref2","year":"2016","journal-title":"Story of the year Ransomware revolution"},{"key":"ref1","author":"david navetta","year":"2017","journal-title":"Wannacry ransomware attack summary"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Udupi","start":{"date-parts":[[2017,9,13]]},"end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08125850.pdf?arnumber=8125850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T04:15:10Z","timestamp":1584677710000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8125850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8125850","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}