{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:42:46Z","timestamp":1769316166651,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T00:00:00Z","timestamp":1534118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,13]]},"DOI":"10.1145\/3229710.3229726","type":"proceedings-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T16:28:33Z","timestamp":1533054513000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Detecting Ransomware using Support Vector Machines"],"prefix":"10.1145","author":[{"given":"Yuki","family":"Takeuchi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Tokyo Metropolitan University, Hino, Tokyo, Japan"}]},{"given":"Kazuya","family":"Sakai","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Tokyo Metropolitan University, Hino, Tokyo, Japan"}]},{"given":"Satoshi","family":"Fukumoto","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Tokyo Metropolitan University, Hino, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,8,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0752-1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"},{"key":"e_1_3_2_1_4_1","unstructured":"Cuckoo Foundation. Accessed 4-20-2018. Cuckoo Sandbox - Automated Malware Analysis. https:\/\/cuckoosandbox.org\/. (Accessed 4-20-2018).  Cuckoo Foundation. Accessed 4-20-2018. Cuckoo Sandbox - Automated Malware Analysis. https:\/\/cuckoosandbox.org\/. (Accessed 4-20-2018)."},{"key":"e_1_3_2_1_5_1","volume-title":"International Multiconference on Computer Science and Information Technology","author":"Gavrilu\u0163 Drago\u015f","unstructured":"Drago\u015f Gavrilu\u0163 , Mihai Cimpoe\u015fu , Dan Anton , and Liviu Ciortuz . 2009. Malware Detection Using Machine Learning . In International Multiconference on Computer Science and Information Technology . IEEE , 735--741. Drago\u015f Gavrilu\u0163, Mihai Cimpoe\u015fu, Dan Anton, and Liviu Ciortuz. 2009. Malware Detection Using Machine Learning. In International Multiconference on Computer Science and Information Technology. IEEE, 735--741."},{"key":"e_1_3_2_1_6_1","unstructured":"Inc. Hybrid Analysis GmbH. Accessed 4-20-2018. Free Automated Malware Analysis Service - powered by Falcon Sandbox. https:\/\/www.hybrid-analysis.com\/. (Accessed 4-20-2018).  Inc. Hybrid Analysis GmbH. Accessed 4-20-2018. Free Automated Malware Analysis Service - powered by Falcon Sandbox. https:\/\/www.hybrid-analysis.com\/. (Accessed 4-20-2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"Ransomware: How Consumers and Businesses Value Their Data.","author":"IBM.","year":"2016","unstructured":"IBM. 2016 . Ransomware: How Consumers and Businesses Value Their Data. (2016), 6 pages. IBM. 2016. Ransomware: How Consumers and Businesses Value Their Data. (2016), 6 pages."},{"key":"e_1_3_2_1_8_1","unstructured":"Inc. Informer Technologies. Accessed 4-20-2018. Must-have software for windows - download for free. http:\/\/software.informer.com\/software\/. (Accessed 4-20-2018).  Inc. Informer Technologies. Accessed 4-20-2018. Must-have software for windows - download for free. http:\/\/software.informer.com\/software\/. (Accessed 4-20-2018)."},{"key":"e_1_3_2_1_9_1","volume-title":"Electronic Crime Research","author":"Liao Kevin","unstructured":"Kevin Liao , Ziming Zhao , Adam Doup\u00e9 , and Gail-Joon Ahn . 2016. Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin . In Electronic Crime Research . IEEE , 1--13. Kevin Liao, Ziming Zhao, Adam Doup\u00e9, and Gail-Joon Ahn. 2016. Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin. In Electronic Crime Research. IEEE, 1--13."},{"key":"e_1_3_2_1_10_1","volume-title":"Limits of Static Analysis for Malware Detection. In Computer Security Applications Conference. IEEE, 421--430","author":"Moser Andreas","year":"2007","unstructured":"Andreas Moser , Christopher Kruegel , and Engin Kirda . 2007 . Limits of Static Analysis for Malware Detection. In Computer Security Applications Conference. IEEE, 421--430 . Andreas Moser, Christopher Kruegel, and Engin Kirda. 2007. Limits of Static Analysis for Malware Detection. In Computer Security Applications Conference. IEEE, 421--430."},{"key":"e_1_3_2_1_11_1","first-page":"10","article-title":"Ransomware: Evolution, mitigation and prevention","volume":"13","author":"Richardson R.","year":"2017","unstructured":"R. Richardson and M. North . 2017 . Ransomware: Evolution, mitigation and prevention . International Management Review 13 , 1 (2017), 10 . R. Richardson and M. North. 2017. Ransomware: Evolution, mitigation and prevention. International Management Review 13, 1 (2017), 10.","journal-title":"International Management Review"},{"key":"e_1_3_2_1_12_1","volume-title":"Journal of Computer Security 19, 4","author":"Rieck Konrad","year":"2011","unstructured":"Konrad Rieck , Philipp Trinius , Carsten Willems , and Thorsten Holz . 2011. Journal of Computer Security 19, 4 ( 2011 ), 639--668. Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz. 2011. Journal of Computer Security 19, 4 (2011), 639--668."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"e_1_3_2_1_14_1","volume-title":"Lupu","author":"Sgandurra Daniele","year":"2016","unstructured":"Daniele Sgandurra , Luis Mu\u00f1oz-Gonz\u00e1lez , Rabih Mohsen , and Emil C . Lupu . 2016 . Automated Dynamic Analysis of Ransomware: Benefits, Limitations and Use for Detection. Computing Research Repository ( 2016), 104. Daniele Sgandurra, Luis Mu\u00f1oz-Gonz\u00e1lez, Rabih Mohsen, and Emil C. Lupu. 2016. Automated Dynamic Analysis of Ransomware: Benefits, Limitations and Use for Detection. Computing Research Repository (2016), 104."},{"key":"e_1_3_2_1_15_1","unstructured":"P. Vinod Rajasthan Jaipur V. Laxmi and M. Gaur. 2009. Survey on Malware Detection Methods. In 3rd Hacker's Workshop on Computer and Internet Security. 74--79.  P. Vinod Rajasthan Jaipur V. Laxmi and M. Gaur. 2009. Survey on Malware Detection Methods. In 3rd Hacker's Workshop on Computer and Internet Security. 74--79."}],"event":{"name":"ICPP '18 Comp: 47th International Conference on Parallel Processing Companion","location":"Eugene OR USA","acronym":"ICPP '18 Comp","sponsor":["University of Oregon University of Oregon"]},"container-title":["Proceedings of the 47th International Conference on Parallel Processing Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229710.3229726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229710.3229726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:38Z","timestamp":1750212458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229710.3229726"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,13]]},"references-count":15,"alternative-id":["10.1145\/3229710.3229726","10.1145\/3229710"],"URL":"https:\/\/doi.org\/10.1145\/3229710.3229726","relation":{},"subject":[],"published":{"date-parts":[[2018,8,13]]},"assertion":[{"value":"2018-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}