{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:29Z","timestamp":1767339809907,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T00:00:00Z","timestamp":1608249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,18]]},"DOI":"10.1145\/3447654.3447659","type":"proceedings-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T21:36:12Z","timestamp":1620941772000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Ransomware Detection techniques in the Dawn of Artificial Intelligence: A Survey"],"prefix":"10.1145","author":[{"given":"Monica","family":"Sneha","sequence":"first","affiliation":[{"name":"PES University, India"}]},{"given":"Arti","family":"Arya","sequence":"additional","affiliation":[{"name":"PES University India, India"}]},{"given":"Pooja","family":"Agarwal","sequence":"additional","affiliation":[{"name":"PES University India, India"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"volume-title":"Norsk hydro responds to ransomware attack with transparency","year":"2019","author":"Team M. S.","key":"e_1_3_2_1_1_1"},{"volume-title":"2020 cyberthreat defense report","year":"2020","author":"L. CyberEdge Group","key":"e_1_3_2_1_2_1"},{"volume-title":"How disaster recovery and ransomware intersect: A disaster recovery report","year":"2019","author":"Climer S.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101568"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2016.1252191"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323682"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2017.8110056"},{"key":"e_1_3_2_1_8_1","article-title":"Ransomware, threat and detection techniques: A review","author":"Kok H.","year":"2019","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945839"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628743"},{"key":"e_1_3_2_1_12_1","first-page":"205","article-title":"Machine learning based file entropy analysis for ransomware detection in backup systems","volume":"7","author":"Lee K.","year":"2019","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.011"},{"volume-title":"A multi-level ransomware detection framework using natural language processing and machine learning","year":"2019","author":"Poudyal S.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.025"},{"key":"e_1_3_2_1_16_1","first-page":"710","article-title":"A digital dna sequencing engine for ransomware detection using machine learning","volume":"8","author":"Khan F.","year":"2020","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"e_1_3_2_1_18_1","first-page":"6","volume-title":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, ser. SDN-NFV Sec\u201918","author":"Cusack G.","year":"2018"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"e_1_3_2_1_20_1","unstructured":"O. M. K. Alhawi J. Baldwin and A. Dehghantanha Leveraging Machine Learning Techniques for Windows  O. M. K. Alhawi J. Baldwin and A. Dehghantanha Leveraging Machine Learning Techniques for Windows"},{"journal-title":"Springer International Publishing","first-page":"93","year":"2018","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.036"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.045"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682899"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2018.8328219"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34637-9_15"},{"key":"e_1_3_2_1_28_1","first-page":"2609","volume-title":"Twostage ransomware detection using dynamic analysis and machine learning techniques","author":"Jinsoo H.","year":"2020"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2019.8930732"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.02.249"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33617-2_5"}],"event":{"name":"ICNCC 2020: 2020 The 9th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2020","location":"Tokyo Japan"},"container-title":["2020 The 9th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447654.3447659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:09Z","timestamp":1750200069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,18]]},"references-count":31,"alternative-id":["10.1145\/3447654.3447659","10.1145\/3447654"],"URL":"https:\/\/doi.org\/10.1145\/3447654.3447659","relation":{},"subject":[],"published":{"date-parts":[[2020,12,18]]},"assertion":[{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}