{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:56:42Z","timestamp":1764835002495,"version":"3.46.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1109\/icumt67815.2025.11268719","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:02Z","timestamp":1764787202000},"page":"52-61","source":"Crossref","is-referenced-by-count":0,"title":["Unveiling Ransomware: Sequence Alignment and Deep Learning for Early Detection"],"prefix":"10.1109","author":[{"given":"Pavel","family":"Novak","sequence":"first","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czechia"}]},{"given":"Vaclav","family":"Oujezsky","sequence":"additional","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czechia"}]}],"member":"263","reference":[{"article-title":"Ransomware statistics: Facts and trends for 2025","year":"2025","author":"Bodnar","key":"ref1"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"102828","DOI":"10.1016\/j.jisa.2021.102828","article-title":"Malware classification and composition analysis: A survey of recent developments","volume":"59","author":"Abusitta","year":"2021","journal-title":"Journal of Information Security and Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984187"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969038"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04673-3"},{"issue":"3","key":"ref6","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","article-title":"A general method applicable to the search for similarities in the amino acid sequence of two proteins","volume":"48","author":"Needleman","year":"1970","journal-title":"Journal of Molecular Biology"},{"issue":"1","key":"ref7","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/0022-2836(81)90087-5","article-title":"Identification of common molecular subsequences","volume":"147","author":"Smith","year":"1981","journal-title":"Journal of Molecular Biology"},{"issue":"4693","key":"ref8","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1126\/science.2983426","article-title":"Rapid and sensitive protein similarity searches","volume":"227","author":"Lipman","year":"1985","journal-title":"Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1051\/shsconf\/202214403018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01000408"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0033354"},{"key":"ref12","first-page":"161","article-title":"Bayesian variable order markov models","volume-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, ser. Proceedings of Machine Learning Research","volume":"9","author":"Dimitrakakis"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370421"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/s0218488598000094"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3453153"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"102389","DOI":"10.1016\/j.cose.2021.102389","article-title":"Malware detection on windows audit logs using lstms","volume":"109","author":"Ring","year":"2021","journal-title":"Computers & Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3675741.3675743"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129712"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3676284"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598054"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24138\/jcomss-2024-0098"},{"article-title":"Ransomware sequence alignment","year":"2025","author":"Nov\u00e1k","key":"ref24"},{"year":"2021","key":"ref25","article-title":"Ransomware pcap dataset"},{"year":"2024","key":"ref26","article-title":"Sample captures - wireshark wiki"},{"article-title":"Cryptomix variant named cryptoshield 1.0 ransomware distributed by exploit kits","year":"2017","author":"Abrams","key":"ref27"}],"event":{"name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2025,11,3]]},"location":"Florence, Italy","end":{"date-parts":[[2025,11,5]]}},"container-title":["2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268479\/11268547\/11268719.pdf?arnumber=11268719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:50:40Z","timestamp":1764834640000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icumt67815.2025.11268719","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]}}}