{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:15:42Z","timestamp":1771960542165,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10226130","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T13:26:12Z","timestamp":1693315572000},"page":"135-142","source":"Crossref","is-referenced-by-count":19,"title":["A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices"],"prefix":"10.1109","author":[{"given":"Mahmoud","family":"AlJamal","sequence":"first","affiliation":[{"name":"Al-Hussien bin Abdullah for IT The Hashemite University,Faculty of Prince,Department of Information Technology,Zarqa,Jordan,13133"}]},{"given":"Rabee","family":"Alquran","sequence":"additional","affiliation":[{"name":"Al-Hussien bin Abdullah for IT The Hashemite University,Faculty of Prince,Department of Information Technology,Zarqa,Jordan,13133"}]},{"given":"Issa","family":"AL-Aiash","sequence":"additional","affiliation":[{"name":"Al-Hussien bin Abdullah for IT The Hashemite University,Faculty of Prince,Department of Information Technology,Zarqa,Jordan,13133"}]},{"given":"Ala","family":"Mughaid","sequence":"additional","affiliation":[{"name":"Al-Hussien bin Abdullah for IT The Hashemite University,Faculty of Prince,Department of Information Technology,Zarqa,Jordan,13133"}]},{"given":"Shadi","family":"AlZu'bi","sequence":"additional","affiliation":[{"name":"Al Zaytoonah University of Jordan,Computer Science Department,Amman,Jordan"}]},{"given":"Ala A.","family":"Abutabanjeh","sequence":"additional","affiliation":[{"name":"Concordia University,Department of Business Administration,Chicago,IL"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/17\/4A\/4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UCET.2019.8881884"},{"key":"ref23","first-page":"617","article-title":"Utilizing machine learning algorithms for effectively detection iot ddos attacks","author":"mughaid","year":"0","journal-title":"International Conference on Advanced Research in Computing"},{"key":"ref15","author":"alhebsi","year":"2022","journal-title":"Android Malware Detection using Machine Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-07080-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745366"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130288"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/708"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24274-9_26"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.07.166"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon48659.2022.9764053"},{"key":"ref1","article-title":"Smartphone users worldwide 2014&#x2013;2019","year":"2019","journal-title":"The Statisticain"},{"key":"ref17","article-title":"University of New Brunswick","year":"2017","journal-title":"Canadian institute for cybersecu-rity - datasets"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03604-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0703-x"},{"key":"ref8","first-page":"388","article-title":"Es-capade: Encryption-type-ransomware: System call based pattern detection","author":"chew","year":"0","journal-title":"Network and System Security 14th International Conference NSS 2020 Melbourne VIC Australia November 25&#x2013;27 2020 Proceedings 14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon48659.2022.9764053"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT47987.2019.8991114"},{"key":"ref4","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0207"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3156571"},{"key":"ref5","author":"mahan","year":"2022","journal-title":"Exploring Ransomware on The Oculus Quest 2"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","location":"Amman, Jordan","start":{"date-parts":[[2023,8,9]]},"end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10226130.pdf?arnumber=10226130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T13:43:14Z","timestamp":1695044594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10226130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10226130","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}