{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:09:30Z","timestamp":1753884570095,"version":"3.41.2"},"reference-count":38,"publisher":"World Scientific Pub Co Pte Ltd","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2022,9,15]]},"abstract":"<jats:p> \u201cCrypto ransomware is defined as malware that blocks the user file\u2019s access by encrypting them and demands them with a ransom for obtaining the decryption key\u201d. This causes some major threats in many of the companies. Therefore, the detection of ransomware is needful for reducing the workloads of the analysts and also for finding the variations in unknown samples. The adopted scheme encompasses 3 phases: (i) feature extraction, (ii) feature selection and (iii) classification. Initially, the sequential frequent patterns are extracted using the apriori framework. However, the major challenge in this extracted sequential pattern is the curse of dimensionality. To overcome this, the selection of optimal features is very important, which is done as the second stage. In this, the optimization concept is evolved for the optimal selection of these extracted sequential patterns. Furthermore, the optimal patterns are given for classification, where DBN is deployed. Particularly, for the selection of the optimal sequential pattern, this work proposes a new crow search with adaptive awareness probability (CS-AAP) model. In the end, analysis is performed to authorize the supremacy of the developed scheme. <\/jats:p>","DOI":"10.1142\/s0218001422510107","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T03:19:05Z","timestamp":1656645545000},"source":"Crossref","is-referenced-by-count":3,"title":["Crow Search with Adaptive Awareness Probability-Based Deep Belief Network for Detecting Ransomware"],"prefix":"10.1142","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6147-4010","authenticated-orcid":false,"given":"Shemitha","family":"P A","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Noorul Islam center for higher education, Kumaracoil, Tamilnadu 629180, India"}]},{"given":"Julia Punitha Malar","family":"Dhas","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Karunya Institute of Technology and Sciences, Coimbatore, Tamilnadu 641114, India"}]}],"member":"219","published-online":{"date-parts":[[2022,8,31]]},"reference":[{"doi-asserted-by":"publisher","key":"S0218001422510107BIB001","DOI":"10.1016\/j.comnet.2015.07.013"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB002","DOI":"10.1109\/TDSC.2009.1"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB003","DOI":"10.1016\/j.comcom.2019.01.003"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB004","DOI":"10.1016\/j.compstruc.2016.03.001"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB006","DOI":"10.1016\/j.clsr.2018.08.005"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB007","DOI":"10.1016\/j.compeleceng.2017.10.012"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB008","DOI":"10.1109\/MNET.2016.1600110NM"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB009","DOI":"10.1007\/s10207-017-0398-5"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB010","DOI":"10.1016\/j.eswa.2018.02.039"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB011","DOI":"10.1007\/s40860-018-0072-3"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB012","DOI":"10.1016\/j.fsidi.2020.300979"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB013","DOI":"10.1016\/j.cie.2018.01.006"},{"issue":"3","key":"S0218001422510107BIB014","first-page":"12","volume":"2","author":"Gangappa M.","year":"2019","journal-title":"Multim. Res."},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB015","DOI":"10.1016\/j.aasri.2013.10.043"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB016","DOI":"10.1016\/j.jnca.2018.03.013"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB017","DOI":"10.1109\/TETC.2017.2756908"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB018","DOI":"10.1109\/ACCESS.2018.2884964"},{"key":"S0218001422510107BIB019","first-page":"123","volume":"43","author":"Kumar S.","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB020","DOI":"10.46253\/jcmps.v2i3.a2"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB021","DOI":"10.1515\/jisys-2016-0111"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB022","DOI":"10.1016\/j.patcog.2020.107374"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB023","DOI":"10.1109\/ACCESS.2018.2873583"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB024","DOI":"10.1109\/LCA.2018.2883431"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB025","DOI":"10.1016\/j.knosys.2015.07.006"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB026","DOI":"10.1016\/j.jnca.2018.09.013"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB027","DOI":"10.3233\/HIS-120161"},{"issue":"2","key":"S0218001422510107BIB028","first-page":"180","volume":"8","author":"Rajakumar B. R.","year":"2013","journal-title":"Int. J. Comput. Sci. Eng."},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB029","DOI":"10.1109\/ICCIC.2012.6510293"},{"issue":"1","key":"S0218001422510107BIB030","first-page":"36","volume":"1","author":"Rewadkar D.","year":"2018","journal-title":"J. Netw. Commun. Syst."},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB031","DOI":"10.1016\/j.icte.2018.09.001"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB032","DOI":"10.1049\/ic.2013.0361"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB033","DOI":"10.1016\/j.clsr.2018.08.004"},{"volume-title":"2019 7th Int. Conf. Future Internet of Things and Cloud (FiCloud)","year":"2019","author":"Umaru A.","key":"S0218001422510107BIB034"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB035","DOI":"10.1109\/ACCESS.2018.2868885"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB036","DOI":"10.1016\/j.apenergy.2016.08.108"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB037","DOI":"10.1016\/j.microrel.2019.01.007"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB038","DOI":"10.1016\/j.icte.2017.12.007"},{"doi-asserted-by":"publisher","key":"S0218001422510107BIB039","DOI":"10.1016\/j.jss.2018.06.072"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001422510107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T07:52:01Z","timestamp":1663141921000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001422510107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,31]]},"references-count":38,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,9,15]]}},"alternative-id":["10.1142\/S0218001422510107"],"URL":"https:\/\/doi.org\/10.1142\/s0218001422510107","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2022,8,31]]},"article-number":"2251010"}}