{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:27:14Z","timestamp":1774448834853,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/iscisc.2018.8546941","type":"proceedings-article","created":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:47:14Z","timestamp":1544230034000},"page":"1-7","source":"Crossref","is-referenced-by-count":11,"title":["A Novel Approach for Detecting DGA-based Ransomwares"],"prefix":"10.1109","author":[{"given":"Saeid","family":"Salehi","sequence":"first","affiliation":[]},{"given":"HamidReza","family":"Shahriari","sequence":"additional","affiliation":[]},{"given":"Mohammad Mehdi","family":"Ahmadian","sequence":"additional","affiliation":[]},{"given":"Ladan","family":"Tazik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"16","year":"2013","journal-title":"McAfee Threats Report Fourth Quarter 2013"},{"key":"ref11","first-page":"46","year":"2016","journal-title":"McAfee Threats Report June 2016"},{"key":"ref12","first-page":"8","year":"2018","journal-title":"McAfee Threats Report March 2018"},{"key":"ref13","first-page":"46","article-title":"A Taxonomy of Domain-Generation Algorithms","year":"2016","journal-title":"IEEE Security& Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"key":"ref4","article-title":"FBI: North Korea to blame for Sony hack","year":"2014","journal-title":"Retrieved from KrebsOnSecurity"},{"key":"ref3","article-title":"Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection","year":"2016","journal-title":"arXiv preprint arXiv 1609 03020"},{"key":"ref6","first-page":"77","article-title":"Detecting Ransomware with Honeypot Techniques","year":"2016","journal-title":"2016 Cybersecurity and Cyberforensics Conference (CCC) CCC"},{"key":"ref5","article-title":"Connection-monitor & connection-breaker: A novel approach for prevention and detection of high survivable ransomwares","year":"2015","journal-title":"Information Security and Cryptology (ISCISC) 2015 12th International Iranian Society of Cryptology Conference on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(16)30036-7"},{"key":"ref7","first-page":"353","article-title":"Analysis and Detection of Ransomware Through Its Delivery Methods","year":"2017","journal-title":"International Conference on Recent Developments in Science Engineering and Technology"},{"key":"ref2","article-title":"2entFOX: A framework for high survivable ransomwares detection","year":"2016","journal-title":"Information Security and Cryptology (ISCISC) 2016 13th International Iranian Society of Cryptology Conference on"},{"key":"ref1","first-page":"757","article-title":"UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware","year":"2016","journal-title":"USENIX Security Symposium"},{"key":"ref9","first-page":"12","year":"2013","journal-title":"McAfee Threats Report First Quarter 2013"}],"event":{"name":"2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","location":"Tehran","start":{"date-parts":[[2018,8,28]]},"end":{"date-parts":[[2018,8,29]]}},"container-title":["2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8516127\/8546847\/08546941.pdf?arnumber=8546941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T04:53:11Z","timestamp":1598244791000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8546941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2018.8546941","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}