{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:33:03Z","timestamp":1775899983460,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647816","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-7","source":"Crossref","is-referenced-by-count":26,"title":["API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models"],"prefix":"10.1109","author":[{"given":"May","family":"Almousa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sai","family":"Basavaraju","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohd","family":"Anwar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Package Manager"},{"key":"ref38","year":"0","journal-title":"CNET"},{"key":"ref33","year":"0","journal-title":"theZoo - A Live Malware Repository"},{"key":"ref32","year":"0","journal-title":"VirusShare"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628743"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488219"},{"key":"ref37","year":"0","journal-title":"VirusTotal"},{"key":"ref36","article-title":"Free malware sample sources for researchers","year":"0","journal-title":"Zeltser"},{"key":"ref35","year":"0","journal-title":"An Analysis of Hybrid"},{"key":"ref34","year":"0","journal-title":"Malwaretips"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"ref40","year":"0","journal-title":"Portable"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11780656_14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70500-0_25"},{"key":"ref14","article-title":"Zero-day malware detection based on supervised learning algorithms of api call signatures","author":"alazab","year":"2010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.02.008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.15"},{"key":"ref17","article-title":"A benchmark api call dataset for windows pe malware classification","author":"catak","year":"2019","journal-title":"arXiv preprint arXiv 1905 00571"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00032"},{"key":"ref4","author":"brandom","year":"2017","journal-title":"Uk hospitals hit with massive ransomware attack"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref3","author":"whittaker","year":"2018","journal-title":"Atlanta projected to spend at least $2 6 million on ransomware recovery"},{"key":"ref6","first-page":"757","article-title":"UNVEIL: A large-scale, automated approach to detecting ransomware","author":"kharaz","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref29","first-page":"10","article-title":"Ransomware: Evolution, mitigation and prevention","volume":"13","author":"richardson","year":"2017","journal-title":"Management International Review"},{"key":"ref5","author":"abrams","year":"2020","journal-title":"Foxconn electronics giant hit by ransomware $34 million ransom"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"ref2","author":"dignan","year":"2018","journal-title":"Tsmc says variant of wannacry virus brought down its plants"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502676"},{"key":"ref46","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"liaw","year":"2002","journal-title":"R News"},{"key":"ref20","article-title":"Ttanalyze: A tool for analyzing malware","volume":"4","author":"kruegel","year":"2006","journal-title":"Proceedings of the 15th European Institute for Computer Antivirus Research (EICAR 2006) Annual Conference"},{"key":"ref45","article-title":"Ransomware analysis using feature engineering and deep neural networks","author":"ashraf","year":"2019","journal-title":"arXiv preprint arXiv 1910 01500"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5120\/6194-8715"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313426"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2018.1387734"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0224-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/260905"},{"key":"ref41","article-title":"Automated malware analysis system","year":"0","journal-title":"Cuckoo Sandbox"},{"key":"ref23","article-title":"A multilevel ransomware detection framework using natural language processing and machine learning","author":"poudyal","year":"2019","journal-title":"14th International Conference on Malicious and Unwanted Software&#x201D;"},{"key":"ref44","year":"0","journal-title":"APIMonitor"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"},{"key":"ref43","year":"0","journal-title":"SysInternals"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129704"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","location":"Auckland, New Zealand","start":{"date-parts":[[2021,12,13]]},"end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647816.pdf?arnumber=9647816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:51Z","timestamp":1652201991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647816","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}