{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:29:30Z","timestamp":1742401770915},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,25]]},"DOI":"10.1109\/smartnets58706.2023.10215732","type":"proceedings-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T17:32:28Z","timestamp":1692725548000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Machine Learning with Bitcoin Heist Ransomware"],"prefix":"10.1109","author":[{"given":"Nurhaliza","family":"Hassan","sequence":"first","affiliation":[{"name":"California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA"}]},{"given":"Kanika","family":"Sood","sequence":"additional","affiliation":[{"name":"California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA"}]},{"given":"Gabriel","family":"Suzuki","sequence":"additional","affiliation":[{"name":"California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ssci.2018.8628743"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/iot1020030"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2019.00016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"},{"key":"ref5","article-title":"Gradient Boosting Algorithm in Machine Learning","volume-title":"Python Geeks","author":"Geeks","year":"2022"},{"year":"2019","key":"ref6","article-title":"K Nearest Neighbors with Python \u2014 ML"},{"key":"ref7","article-title":"Random Forest Regression in Python - GeeksforGeeks","volume-title":"GeeksforGeeks","author":"Dutta","year":"2019"},{"article-title":"Implementing the AdaBoost Algorithm From Scratch","volume-title":"GeeksforGeeks","year":"2021","key":"ref8"},{"article-title":"Another huge bitcoin heist: Bitcoin worth 72 million stolen from bitfinex","volume-title":"Reuters","year":"2016","key":"ref9"},{"year":"2018","key":"ref10","article-title":"Cyber Activity and for the First Time Identifies Associated Digital Currency Addresses"},{"volume-title":"UCI Machine Learning Repository","year":"2020","key":"ref11"},{"year":"2020","key":"ref12","article-title":"4 Types of Classification Tasks in Machine Learning"},{"year":"2021","key":"ref13","article-title":"65, 000 Bitcoin: A New All Time High"},{"year":"2022","key":"ref14","article-title":"What is cryptocurrency and how does it work?"},{"year":"2021","key":"ref15","article-title":"How Bitcoin Has Fueled Ransomware Attacks"},{"year":"2020","key":"ref16","article-title":"Ransomware"},{"article-title":"Improving AI-based defenses to disrupt human-operated ransomware","volume-title":"Microsoft Security Blog","year":"2022","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/BigData55660.2022.10021008","article-title":"Graph Representation Learning based Vulnerable Target Identification in Ransomware Attacks","author":"Wei","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00237"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.127.2200280"}],"event":{"name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","start":{"date-parts":[[2023,7,25]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,7,27]]}},"container-title":["2023 International Conference on Smart Applications, Communications and Networking (SmartNets)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10215379\/10215514\/10215732.pdf?arnumber=10215732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T19:00:37Z","timestamp":1709319637000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10215732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/smartnets58706.2023.10215732","relation":{},"subject":[],"published":{"date-parts":[[2023,7,25]]}}}