{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:30:53Z","timestamp":1775838653466,"version":"3.50.1"},"reference-count":158,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,12,31]]},"abstract":"<jats:p>Although ransomware has been around since the early days of personal computers, its sophistication and aggression have increased substantially over the years. Ransomware, as a type of malware to extort ransom payments from victims, has evolved to deliver payloads in different attack vectors and on multiple platforms, and creating repeated disruptions and financial loss to many victims. Many studies have performed ransomware analysis and\/or presented detection, defense, or prevention techniques for ransomware. However, because the ransomware landscape has evolved aggressively, many of those studies have become less relevant or even outdated. Previous surveys on anti-ransomware studies have compared the methods and results of the studies they surveyed, but none of those surveys has attempted to critique on the internal or external validity of those studies. In this survey, we first examined the up-to-date concept of ransomware, and listed the inadequacies in current ransomware research. We then proposed a set of unified metrics to evaluate published studies on ransomware mitigation, and applied the metrics to 118 such studies to comprehensively compare and contrast their pros and cons, with the attempt to evaluate their relative strengths and weaknesses. Finally, we forecast the future trends of ransomware evolution, and propose future research directions.<\/jats:p>","DOI":"10.1145\/3479393","type":"journal-article","created":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T22:02:57Z","timestamp":1633730577000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":89,"title":["Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions"],"prefix":"10.1145","volume":"54","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0836-4266","authenticated-orcid":false,"given":"Timothy","family":"McIntosh","sequence":"first","affiliation":[{"name":"La Trobe University, Bundoora VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2421-2214","authenticated-orcid":false,"given":"A. S. M.","family":"Kayes","sequence":"additional","affiliation":[{"name":"La Trobe University, Bundoora VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4122-3767","authenticated-orcid":false,"given":"Yi-Ping Phoebe","family":"Chen","sequence":"additional","affiliation":[{"name":"La Trobe University, Bundoora VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5809-2150","authenticated-orcid":false,"given":"Alex","family":"Ng","sequence":"additional","affiliation":[{"name":"La Trobe University, Bundoora VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1399-7175","authenticated-orcid":false,"given":"Paul","family":"Watters","sequence":"additional","affiliation":[{"name":"Cyberstronomy Pty Ltd, Ballarat, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,10,8]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736455"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2015.7387902"},{"key":"e_1_2_2_3_1","first-page":"2236","article-title":"Automated analysis approach for the detection of high survivable ransomware","volume":"14","author":"Ahmed Yahye Abukar","year":"2020","unstructured":"Yahye Abukar Ahmed , Bar\u0131\u015f Ko\u00e7er , and Bander Ali Saleh Al-rimy. 2020 . Automated analysis approach for the detection of high survivable ransomware . KSII Transactions on Internet and Information Systems (TIIS) 14 , 5 (2020), 2236 \u2013 2257 . Yahye Abukar Ahmed, Bar\u0131\u015f Ko\u00e7er, and Bander Ali Saleh Al-rimy. 2020. Automated analysis approach for the detection of high survivable ransomware. KSII Transactions on Internet and Information Systems (TIIS) 14, 5 (2020), 2236\u20132257.","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"e_1_2_2_4_1","volume-title":"Bander Ali Saleh Al-rimy, and Mohammad Mehedi Hassan","author":"Ahmed Yahye Abukar","year":"2020","unstructured":"Yahye Abukar Ahmed , Bar\u0131\u015f Ko\u00e7er , Shamsul Huda , Bander Ali Saleh Al-rimy, and Mohammad Mehedi Hassan . 2020 . A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection. Journal of Network and Computer Applications ( 2020), 102753. Yahye Abukar Ahmed, Bar\u0131\u015f Ko\u00e7er, Shamsul Huda, Bander Ali Saleh Al-rimy, and Mohammad Mehedi Hassan. 2020. A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection. Journal of Network and Computer Applications (2020), 102753."},{"key":"e_1_2_2_5_1","unstructured":"Jinwoo Ahn Donggyu Park Chang-Gyu Lee Donghyun Min Junghee Lee Sungyong Park Qian Chen and Youngjae Kim. 2019. KEY-SSD: Access-control drive to protect files from ransomware attacks. https:\/\/arxiv.org\/abs\/1904.05012. Jinwoo Ahn Donggyu Park Chang-Gyu Lee Donghyun Min Junghee Lee Sungyong Park Qian Chen and Youngjae Kim. 2019. KEY-SSD: Access-control drive to protect files from ransomware attacks. https:\/\/arxiv.org\/abs\/1904.05012."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2914390"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012674"},{"key":"e_1_2_2_8_1","volume-title":"Mamoun Alazab, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Abdulmohsen Almalawi, Abdullah Marish Ali, and Tawfik Al-Hadhrami.","author":"Bander Ali","year":"2020","unstructured":"Bander Ali Saleh Al-rimy , Mohd Aizaini Maarof , Mamoun Alazab, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Abdulmohsen Almalawi, Abdullah Marish Ali, and Tawfik Al-Hadhrami. 2020 . Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection. Future Generation Computer Systems ( 2020). Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Abdulmohsen Almalawi, Abdullah Marish Ali, and Tawfik Al-Hadhrami. 2020. Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection. Future Generation Computer Systems (2020)."},{"key":"e_1_2_2_9_1","article-title":"Zero-day aware decision fusion-based model for crypto-ransomware early detection","volume":"10","author":"Bander Ali","year":"2018","unstructured":"Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof , Yuli Adam Prasetyo , Syed Zainudeen Mohd Shaid , and Asmawi Fadillah Mohd Ariffin . 2018 . Zero-day aware decision fusion-based model for crypto-ransomware early detection . International Journal of Integrated Engineering 10 , 6 (2018). Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Yuli Adam Prasetyo, Syed Zainudeen Mohd Shaid, and Asmawi Fadillah Mohd Ariffin. 2018. Zero-day aware decision fusion-based model for crypto-ransomware early detection. International Journal of Integrated Engineering 10, 6 (2018).","journal-title":"International Journal of Integrated Engineering"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.005"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740837"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907485"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080868"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDMA47397.2020.00022"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00013"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500161"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167304"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005540"},{"key":"e_1_2_2_20_1","volume-title":"2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI\u201920)","author":"Ahsan Ayub Md.","year":"2020","unstructured":"Md. Ahsan Ayub , Andrea Continella , and Ambareen Siraj . 2020 . An I\/O request packet (IRP) driven effective ransomware detection scheme using artificial neural network . In 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI\u201920) . IEEE Computer Society, 319\u2013324. Md. Ahsan Ayub, Andrea Continella, and Ambareen Siraj. 2020. An I\/O request packet (IRP) driven effective ransomware detection scheme using artificial neural network. In 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI\u201920). IEEE Computer Society, 319\u2013324."},{"key":"e_1_2_2_21_1","volume-title":"Gyu Bin Lee, and Eul Gyu Im","author":"Bae Seong Il","year":"2019","unstructured":"Seong Il Bae , Gyu Bin Lee, and Eul Gyu Im . 2019 . Ransomware detection using machine learning algorithms. Concurrency and Computation: Practice and Experience ( 2019), e5422. Seong Il Bae, Gyu Bin Lee, and Eul Gyu Im. 2019. Ransomware detection using machine learning algorithms. Concurrency and Computation: Practice and Experience (2019), e5422."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2020.2977285"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138878"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376213"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51974-2_14"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945839"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134605"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102287"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30086-1"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407044"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.10.012"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz009"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2924650"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787905"},{"key":"e_1_2_2_36_1","volume-title":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA\u201917)","author":"Chen Qian","unstructured":"Qian Chen and Robert A. Bridges . 2017. Automated behavioral analysis of malware: A case study of wannacry ransomware . In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA\u201917) . IEEE, 454\u2013460. Qian Chen and Robert A. Bridges. 2017. Automated behavioral analysis of malware: A case study of wannacry ransomware. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA\u201917). IEEE, 454\u2013460."},{"key":"e_1_2_2_37_1","volume-title":"Henry Haswell, and Robert A. Bridges.","author":"Chen Qian","year":"2019","unstructured":"Qian Chen , Sheikh Rabiul Islam , Henry Haswell, and Robert A. Bridges. 2019 . Automated ransomware behavior analysis: Pattern extraction and early detection. In International Conference on Science of Cyber Security. Springer , 199\u2013214. Qian Chen, Sheikh Rabiul Islam, Henry Haswell, and Robert A. Bridges. 2019. Automated ransomware behavior analysis: Pattern extraction and early detection. In International Conference on Science of Cyber Security. Springer, 199\u2013214."},{"key":"e_1_2_2_38_1","volume-title":"Proceedings of 34th International Conference on Computers and Their Applications 58","author":"Christopher J.","year":"2019","unstructured":"Christopher J. W. Chew and Vimal Kumar. 2019. Behaviour based ransomware detection . Proceedings of 34th International Conference on Computers and Their Applications 58 ( 2019 ), 127\u2013136. Christopher J. W. Chew and Vimal Kumar. 2019. Behaviour based ransomware detection. Proceedings of 34th International Conference on Computers and Their Applications 58 (2019), 127\u2013136."},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0398-5"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.039"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101568"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180467"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491637"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00338-7"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.300979"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10113706"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_2_2_50_1","volume-title":"38th IEEE Symposium on Security and Privacy.","author":"Feng Yun","year":"2017","unstructured":"Yun Feng , Chaoge Liu , and Baoxu Liu . 2017 . Poster: A new approach to detecting ransomware with deception . In 38th IEEE Symposium on Security and Privacy. Yun Feng, Chaoge Liu, and Baoxu Liu. 2017. Poster: A new approach to detecting ransomware with deception. In 38th IEEE Symposium on Security and Privacy."},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19051114"},{"key":"e_1_2_2_52_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 242\u2013258","author":"Ferrante Alberto","year":"2017","unstructured":"Alberto Ferrante , Miroslaw Malek , Fabio Martinelli , Francesco Mercaldo , and Jelena Milosevic . 2017 . Extinguishing ransomware\u2014A hybrid approach to android ransomware detection . In International Symposium on Foundations and Practice of Security. Springer, 242\u2013258 . Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, and Jelena Milosevic. 2017. Extinguishing ransomware\u2014A hybrid approach to android ransomware detection. In International Symposium on Foundations and Practice of Security. Springer, 242\u2013258."},{"key":"e_1_2_2_53_1","volume-title":"2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON\u201917)","author":"Gallegos-Segovia Pablo L.","unstructured":"Pablo L. Gallegos-Segovia , Jack F. Bravo-Torres , V\u00edctor M. Larios-Rosillo , Pa\u00fal E. Vintimilla-Tapia , Iv\u00e1n F. Yuquilima-Albarado , and Juan D . Jara-Saltos. 2017. Social engineering as an attack vector for ransomware . In 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON\u201917) . IEEE, 1\u20136. Pablo L. Gallegos-Segovia, Jack F. Bravo-Torres, V\u00edctor M. Larios-Rosillo, Pa\u00fal E. Vintimilla-Tapia, Iv\u00e1n F. Yuquilima-Albarado, and Juan D. Jara-Saltos. 2017. Social engineering as an attack vector for ransomware. In 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON\u201917). IEEE, 1\u20136."},{"key":"e_1_2_2_54_1","volume-title":"Ryan","author":"Gen\u00e7 Ziya Alper","year":"2018","unstructured":"Ziya Alper Gen\u00e7 , Gabriele Lenzini , and Peter Y. A . Ryan . 2018 . Next generation cryptographic ransomware. In Nordic Conference on Secure IT Systems. Springer , 385\u2013401. Ziya Alper Gen\u00e7, Gabriele Lenzini, and Peter Y. A. Ryan. 2018. Next generation cryptographic ransomware. In Nordic Conference on Secure IT Systems. Springer, 385\u2013401."},{"key":"e_1_2_2_55_1","volume-title":"Ryan","author":"Gen\u00e7 Ziya Alper","year":"2018","unstructured":"Ziya Alper Gen\u00e7 , Gabriele Lenzini , and Peter Y. A . Ryan . 2018 . No random, no ransom: A key to stop cryptographic ransomware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer , 234\u2013255. Ziya Alper Gen\u00e7, Gabriele Lenzini, and Peter Y. A. Ryan. 2018. No random, no ransom: A key to stop cryptographic ransomware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 234\u2013255."},{"key":"e_1_2_2_56_1","volume-title":"Ryan","author":"Gen\u00e7 Ziya Alper","year":"2019","unstructured":"Ziya Alper Gen\u00e7 , Gabriele Lenzini , and Peter Y. A . Ryan . 2019 . NoCry: No more secure encryption keys for cryptographic ransomware. In International Workshop on Emerging Technologies for Authorization and Authentication. Springer , 69\u201385. Ziya Alper Gen\u00e7, Gabriele Lenzini, and Peter Y. A. Ryan. 2019. NoCry: No more secure encryption keys for cryptographic ransomware. In International Workshop on Emerging Technologies for Authorization and Authentication. Springer, 69\u201385."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_14"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.019"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.02.008"},{"key":"e_1_2_2_60_1","volume-title":"2017 20th International Conference of Computer and Information Technology (ICCIT\u201917)","unstructured":"Md. Mahbub Hasan and Md. Mahbubur Rahman. 2017. RansHunt: A support vector machines based ransomware analysis framework with integrated feature set . In 2017 20th International Conference of Computer and Information Technology (ICCIT\u201917) . IEEE, 1\u20137. Md. Mahbub Hasan and Md. Mahbubur Rahman. 2017. RansHunt: A support vector machines based ransomware analysis framework with integrated feature set. In 2017 20th International Conference of Computer and Information Technology (ICCIT\u201917). IEEE, 1\u20137."},{"key":"e_1_2_2_61_1","volume-title":"Fighting ransomware with guided undo. NISK Journal 11","author":"Held Matthias","year":"2018","unstructured":"Matthias Held and Marcel Waldvogel . 2018. Fighting ransomware with guided undo. NISK Journal 11 ( 2018 ). Matthias Held and Marcel Waldvogel. 2018. Fighting ransomware with guided undo. NISK Journal 11 (2018)."},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.3390\/info9090231"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939214"},{"key":"e_1_2_2_64_1","volume-title":"Know abnormal, find evil: Frequent pattern mining for ransomware threat hunting and intelligence","author":"Homayoun Sajad","year":"2017","unstructured":"Sajad Homayoun , Ali Dehghantanha , Marzieh Ahmadzadeh , Sattar Hashemi , and Raouf Khayami . 2017. Know abnormal, find evil: Frequent pattern mining for ransomware threat hunting and intelligence . IEEE Transactions on Emerging Topics in Computing ( 2017 ). Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, and Raouf Khayami. 2017. Know abnormal, find evil: Frequent pattern mining for ransomware threat hunting and intelligence. IEEE Transactions on Emerging Topics in Computing (2017)."},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.045"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00133"},{"key":"e_1_2_2_67_1","volume-title":"Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, and Alex C. Snoeren.","author":"Huang Danny Yuxing","year":"2018","unstructured":"Danny Yuxing Huang , Damon McCoy , Maxwell Matthaios Aliapoulios , Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, and Alex C. Snoeren. 2018 . Tracking ransomware end-to-end. In Tracking Ransomware End-to-End. IEEE , 0. Danny Yuxing Huang, Damon McCoy, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, and Alex C. Snoeren. 2018. Tracking ransomware end-to-end. In Tracking Ransomware End-to-End. IEEE, 0."},{"key":"e_1_2_2_68_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2231\u20132244","author":"Huang Jian","unstructured":"Jian Huang , Jun Xu , Xinyu Xing , Peng Liu , and Moinuddin K. Qureshi . 2017. FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2231\u20132244 . Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, and Moinuddin K. Qureshi. 2017. FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2231\u20132244."},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-019-0097-9"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGS3.2019.8688299"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390376"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3257-z"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229907"},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2017.8167881"},{"key":"e_1_2_2_75_1","doi-asserted-by":"crossref","first-page":"e5726","DOI":"10.1002\/cpe.5726","article-title":"VoterChoice: A ransomware detection honeypot with multiple voting framework","volume":"32","author":"Ng Chee Keong","year":"2020","unstructured":"Chee Keong Ng , Sutharshan Rajasegarar , Lei Pan , Frank Jiang , and Leo Yu Zhang . 2020 . VoterChoice: A ransomware detection honeypot with multiple voting framework . Concurrency and Computation: Practice and Experience 32 , 14 (2020), e5726 . Chee Keong Ng, Sutharshan Rajasegarar, Lei Pan, Frank Jiang, and Leo Yu Zhang. 2020. VoterChoice: A ransomware detection honeypot with multiple voting framework. Concurrency and Computation: Practice and Experience 32, 14 (2020), e5726.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"e_1_2_2_76_1","volume-title":"International Conference on Advanced Communication Systems and Information Security. Springer, 180\u2013192","author":"Kerrich Mohamed Amine","year":"2019","unstructured":"Mohamed Amine Kerrich , Adnane Addaim , and Loubna Damej . 2019 . Proposed solution for HID fileless ransomware using machine learning . In International Conference on Advanced Communication Systems and Information Security. Springer, 180\u2013192 . Mohamed Amine Kerrich, Adnane Addaim, and Loubna Damej. 2019. Proposed solution for HID fileless ransomware using machine learning. In International Conference on Advanced Communication Systems and Information Security. Springer, 180\u2013192."},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100233"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208974"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003785"},{"key":"e_1_2_2_80_1","volume-title":"25th USENIX Security Symposium (USENIX Security\u201916)","author":"Kharaz Amin","year":"2016","unstructured":"Amin Kharaz , Sajjad Arshad , Collin Mulliner , William Robertson , and Engin Kirda . 2016 . UNVEIL: A large-scale, automated approach to detecting ransomware . In 25th USENIX Security Symposium (USENIX Security\u201916) . 757\u2013772. Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. UNVEIL: A large-scale, automated approach to detecting ransomware. In 25th USENIX Security Symposium (USENIX Security\u201916). 757\u2013772."},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_5"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326119"},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2956192"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers8040079"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102646"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0137-1"},{"key":"e_1_2_2_89_1","volume-title":"Do crypto-currencies fuel ransomware?IT professional 19, 5","author":"Kshetri Nir","year":"2017","unstructured":"Nir Kshetri and Jeffrey Voas . 2017. Do crypto-currencies fuel ransomware?IT professional 19, 5 ( 2017 ), 11\u201315. Nir Kshetri and Jeffrey Voas. 2017. Do crypto-currencies fuel ransomware?IT professional 19, 5 (2017), 11\u201315."},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1825-5"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931136"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4337"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.07.014"},{"key":"e_1_2_2_94_1","volume-title":"International Conference on Testbeds and Research Infrastructures. Springer, 46\u201361","author":"Lu Tianliang","year":"2019","unstructured":"Tianliang Lu , Yanhui Du , Jing Wu , and Yuxuan Bao . 2019 . Ransomware Detection Based on an Improved Double-Layer Negative Selection Algorithm . In International Conference on Testbeds and Research Infrastructures. Springer, 46\u201361 . Tianliang Lu, Yanhui Du, Jing Wu, and Yuxuan Bao. 2019. Ransomware Detection Based on an Improved Double-Layer Negative Selection Algorithm. In International Conference on Testbeds and Research Infrastructures. Springer, 46\u201361."},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPAC.2017.8304335"},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481371"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701576412"},{"key":"e_1_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019793"},{"key":"e_1_2_2_99_1","volume-title":"Automation & Power Engineering (RDCAPE\u201917)","author":"Maniath Sumith","unstructured":"Sumith Maniath , Aravind Ashok , Prabaharan Poornachandran , V. G. Sujadevi , A. U. Prem Sankar , and Srinath Jan . 2017. Deep learning LSTM based ransomware detection. In 2017 Recent Developments in Control , Automation & Power Engineering (RDCAPE\u201917) . IEEE , 442\u2013446. Sumith Maniath, Aravind Ashok, Prabaharan Poornachandran, V. G. Sujadevi, A. U. Prem Sankar, and Srinath Jan. 2017. Deep learning LSTM based ransomware detection. In 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE\u201917). IEEE, 442\u2013446."},{"key":"e_1_2_2_100_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/S1353-4858(17)30037-5","article-title":"Fileless attacks: Compromising targets without malware","volume":"2017","author":"Mansfield-Devine Steve","year":"2017","unstructured":"Steve Mansfield-Devine . 2017 . Fileless attacks: Compromising targets without malware . Network Security 2017 , 4 (2017), 7 \u2013 11 . Steve Mansfield-Devine. 2017. Fileless attacks: Compromising targets without malware. Network Security 2017, 4 (2017), 7\u201311.","journal-title":"Network Security"},{"key":"e_1_2_2_101_1","volume-title":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS\u201919)","author":"Michael","unstructured":"Michael J. May and Etamar Laron. 2019. Combating ransomware using content analysis and complex file events . In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS\u201919) . IEEE, 1\u20135. Michael J. May and Etamar Laron. 2019. Combating ransomware using content analysis and complex file events. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS\u201919). IEEE, 1\u20135."},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_32"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36802-9_20"},{"key":"e_1_2_2_104_1","unstructured":"Timothy McIntosh Julian Jang-Jaccard Paul Watters and Teo Susnjak. 2019. Masquerade attacks against security software exclusion lists. (2019) 5\u201312. Timothy McIntosh Julian Jang-Jaccard Paul Watters and Teo Susnjak. 2019. Masquerade attacks against security software exclusion lists. (2019) 5\u201312."},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.09.035"},{"key":"e_1_2_2_106_1","volume-title":"Watters","author":"McIntosh Timothy R.","year":"2018","unstructured":"Timothy R. McIntosh , Julian Jang-Jaccard , and Paul A . Watters . 2018 . Large scale behavioral analysis of ransomware attacks. In International Conference on Neural Information Processing. Springer , 217\u2013229. Timothy R. McIntosh, Julian Jang-Jaccard, and Paul A. Watters. 2018. Large scale behavioral analysis of ransomware attacks. In International Conference on Neural Information Processing. Springer, 217\u2013229."},{"key":"e_1_2_2_107_1","volume-title":"4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech\u201918)","author":"Medhat May","unstructured":"May Medhat , Samir Gaber , and Nashwa Abdelbaki . 2018. A new static-based framework for ransomware detection. In 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing , 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech\u201918) . IEEE , 710\u2013715. May Medhat, Samir Gaber, and Nashwa Abdelbaki. 2018. A new static-based framework for ransomware detection. In 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech\u201918). IEEE, 710\u2013715."},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_6"},{"key":"e_1_2_2_109_1","volume-title":"Yara Fareed Fahmy Bayoumy, and Guttorm Sindre","author":"Meland Per H\u00e5kon","year":"2020","unstructured":"Per H\u00e5kon Meland , Yara Fareed Fahmy Bayoumy, and Guttorm Sindre . 2020 . The Ransomware-as-a-Service economy within the darknet. Computers & Security ( 2020), 101762. Per H\u00e5kon Meland, Yara Fareed Fahmy Bayoumy, and Guttorm Sindre. 2020. The Ransomware-as-a-Service economy within the darknet. Computers & Security (2020), 101762."},{"key":"e_1_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39570-8_14"},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2883431"},{"key":"e_1_2_2_112_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 345\u2013353","author":"Modi Jaimin","year":"2019","unstructured":"Jaimin Modi , Issa Traore , Asem Ghaleb , Karim Ganame , and Sherif Ahmed . 2019 . Detecting ransomware in encrypted web traffic . In International Symposium on Foundations and Practice of Security. Springer, 345\u2013353 . Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, and Sherif Ahmed. 2019. Detecting ransomware in encrypted web traffic. In International Symposium on Foundations and Practice of Security. Springer, 345\u2013353."},{"key":"e_1_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.14"},{"key":"e_1_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.013"},{"key":"e_1_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"e_1_2_2_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3329786"},{"key":"e_1_2_2_117_1","volume-title":"Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom\u201919)","author":"Choi Joong-Hyun","unstructured":"Joon-young Paik, Joong-Hyun Choi , Rize Jin , Jianming Wang , and Eun-Sun Cho . 2019. Buffer management for identifying crypto-ransomware attack in environment with no semantic information. In 2019 IEEE International Conference on Parallel & Distributed Processing with Applications , Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom\u201919) . IEEE , 443\u2013450. Joon-young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, and Eun-Sun Cho. 2019. Buffer management for identifying crypto-ransomware attack in environment with no semantic information. In 2019 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom\u201919). IEEE, 443\u2013450."},{"key":"e_1_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70290-2_12"},{"key":"e_1_2_2_119_1","volume-title":"International Conference on Risks and Security of Internet and Systems. Springer, 11\u201328","author":"Palisse Aur\u00e9lien","year":"2016","unstructured":"Aur\u00e9lien Palisse , H\u00e9l\u00e8ne Le Bouder , Jean-Louis Lanet , Colas Le Guernic , and Axel Legay . 2016 . Ransomware and the legacy crypto API . In International Conference on Risks and Security of Internet and Systems. Springer, 11\u201328 . Aur\u00e9lien Palisse, H\u00e9l\u00e8ne Le Bouder, Jean-Louis Lanet, Colas Le Guernic, and Axel Legay. 2016. Ransomware and the legacy crypto API. In International Conference on Risks and Security of Internet and Systems. Springer, 11\u201328."},{"key":"e_1_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62974-8_12"},{"key":"e_1_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35055-0_9"},{"key":"e_1_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190215.1190270"},{"key":"e_1_2_2_123_1","doi-asserted-by":"publisher","DOI":"10.1080\/19325037.2004.10603611"},{"key":"e_1_2_2_124_1","volume-title":"RAPTOR: Ransomware attack PredicTOR. arXiv:1803.01598.","author":"Quinkert Florian","year":"2018","unstructured":"Florian Quinkert , Thorsten Holz , K. S. M. Hossain , Emilio Ferrara , and Kristina Lerman . 2018 . RAPTOR: Ransomware attack PredicTOR. arXiv:1803.01598. Florian Quinkert, Thorsten Holz, K. S. M. Hossain, Emilio Ferrara, and Kristina Lerman. 2018. RAPTOR: Ransomware attack PredicTOR. arXiv:1803.01598."},{"key":"e_1_2_2_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113400"},{"key":"e_1_2_2_126_1","volume-title":"ICCCE","author":"Rastogi Rahul","year":"2020","unstructured":"Rahul Rastogi , Gaurav Agarwal , and R. K. Shukla . Interactive security of ransomware with heuristic random bit generator . In ICCCE 2020 . Springer, 965\u2013973. Rahul Rastogi, Gaurav Agarwal, and R. K. Shukla. Interactive security of ransomware with heuristic random bit generator. In ICCCE 2020. Springer, 965\u2013973."},{"key":"e_1_2_2_127_1","volume-title":"Vadlamani Ravi, and Dipankar Dasgupta.","author":"Reddy Bheemidi Vikram","year":"2020","unstructured":"Bheemidi Vikram Reddy , Gutha Jaya Krishna , Vadlamani Ravi, and Dipankar Dasgupta. 2020 . Machine learning and feature selection based ransomware detection using hexacodes. In Evolution in Computational Intelligence. Springer , 583\u2013597. Bheemidi Vikram Reddy, Gutha Jaya Krishna, Vadlamani Ravi, and Dipankar Dasgupta. 2020. Machine learning and feature selection based ransomware detection using hexacodes. In Evolution in Computational Intelligence. Springer, 583\u2013597."},{"key":"e_1_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978344"},{"key":"e_1_2_2_129_1","volume-title":"DeepRan: Attention-based BiLSTM and CRF for ransomware early detection and classifcation. Information Systems Frontiers","author":"Roy Krishna Chandra","year":"2020","unstructured":"Krishna Chandra Roy and Qian Chen . 2020. DeepRan: Attention-based BiLSTM and CRF for ransomware early detection and classifcation. Information Systems Frontiers ( 2020 ), 1\u201317. Krishna Chandra Roy and Qian Chen. 2020. DeepRan: Attention-based BiLSTM and CRF for ransomware early detection and classifcation. Information Systems Frontiers (2020), 1\u201317."},{"key":"e_1_2_2_130_1","volume-title":"2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS\u201916)","author":"Scaife Nolen","unstructured":"Nolen Scaife , Henry Carter , Patrick Traynor , and Kevin R. B. Butler . 2016. Cryptolock (and drop it): Stopping ransomware attacks on user data . In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS\u201916) . IEEE, 303\u2013312. Nolen Scaife, Henry Carter, Patrick Traynor, and Kevin R. B. Butler. 2016. Cryptolock (and drop it): Stopping ransomware attacks on user data. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS\u201916). IEEE, 303\u2013312."},{"key":"e_1_2_2_131_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.004"},{"key":"e_1_2_2_132_1","volume-title":"Lupu","author":"Sgandurra Daniele","year":"2016","unstructured":"Daniele Sgandurra , Luis Mu\u00f1oz-Gonz\u00e1lez , Rabih Mohsen , and Emil C . Lupu . 2016 . Automated dynamic analysis of ransomware: Benefits , limitations and use for detection. arXiv:1609.03020. Daniele Sgandurra, Luis Mu\u00f1oz-Gonz\u00e1lez, Rabih Mohsen, and Emil C. Lupu. 2016. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv:1609.03020."},{"key":"e_1_2_2_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970466"},{"key":"e_1_2_2_134_1","volume-title":"2018 10th International Conference on Communication Systems & Networks (COMSNETS\u201918)","author":"Shaukat Saiyed Kashif","unstructured":"Saiyed Kashif Shaukat and Vinay J. Ribeiro . 2018. RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning . In 2018 10th International Conference on Communication Systems & Networks (COMSNETS\u201918) . IEEE, 356\u2013363. Saiyed Kashif Shaukat and Vinay J. Ribeiro. 2018. RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning. In 2018 10th International Conference on Communication Systems & Networks (COMSNETS\u201918). IEEE, 356\u2013363."},{"key":"e_1_2_2_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595683"},{"key":"e_1_2_2_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053172"},{"key":"e_1_2_2_137_1","volume-title":"The effective ransomware prevention technique using process monitoring on android platform. Mobile Information Systems 2016","author":"Song Sanggeun","year":"2016","unstructured":"Sanggeun Song , Bongjoon Kim , and Sangjun Lee . 2016. The effective ransomware prevention technique using process monitoring on android platform. Mobile Information Systems 2016 ( 2016 ). Sanggeun Song, Bongjoon Kim, and Sangjun Lee. 2016. The effective ransomware prevention technique using process monitoring on android platform. Mobile Information Systems 2016 (2016)."},{"key":"e_1_2_2_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2888568"},{"key":"e_1_2_2_139_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280842"},{"key":"e_1_2_2_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00033"},{"key":"e_1_2_2_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229710.3229726"},{"key":"e_1_2_2_142_1","volume-title":"RansomSpector: An introspection-based approach to detect crypto ransomware. Computers & Security","author":"Tang Fei","year":"2020","unstructured":"Fei Tang , Boyang Ma , Jinku Li , Fengwei Zhang , Jipeng Su , and Jianfeng Ma. 2020. RansomSpector: An introspection-based approach to detect crypto ransomware. Computers & Security ( 2020 ), 101997. Fei Tang, Boyang Ma, Jinku Li, Fengwei Zhang, Jipeng Su, and Jianfeng Ma. 2020. RansomSpector: An introspection-based approach to detect crypto ransomware. Computers & Security (2020), 101997."},{"key":"e_1_2_2_143_1","first-page":"1","article-title":"Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks","volume":"12","author":"Thomas Jason","year":"2018","unstructured":"Jason Thomas . 2018 . Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks . International Journal of Business Management 12 , 3 (2018), 1 \u2013 23 . Jason Thomas. 2018. Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management 12, 3 (2018), 1\u201323.","journal-title":"International Journal of Business Management"},{"key":"e_1_2_2_144_1","first-page":"87","article-title":"Deep learning for ransomware detection","volume":"116","author":"Tseng Aragorn","year":"2016","unstructured":"Aragorn Tseng , Y. Chen , Y. Kao , and T. Lin . 2016 . Deep learning for ransomware detection . IEICE Technical Report 116 , 282 (2016), 87 \u2013 92 . Aragorn Tseng, Y. Chen, Y. Kao, and T. Lin. 2016. Deep learning for ransomware detection. IEICE Technical Report 116, 282 (2016), 87\u201392.","journal-title":"IEICE Technical Report"},{"key":"e_1_2_2_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00024"},{"key":"e_1_2_2_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587409"},{"key":"e_1_2_2_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300041"},{"key":"e_1_2_2_148_1","volume-title":"Automatically traceback RDP-based targeted ransomware attacks. Wireless Communications and Mobile Computing 2018","author":"Wang ZiHan","year":"2018","unstructured":"ZiHan Wang , ChaoGe Liu , Jing Qiu , ZhiHong Tian , Xiang Cui , and Shen Su. 2018. Automatically traceback RDP-based targeted ransomware attacks. Wireless Communications and Mobile Computing 2018 ( 2018 ). ZiHan Wang, ChaoGe Liu, Jing Qiu, ZhiHong Tian, Xiang Cui, and Shen Su. 2018. Automatically traceback RDP-based targeted ransomware attacks. Wireless Communications and Mobile Computing 2018 (2018)."},{"key":"e_1_2_2_149_1","doi-asserted-by":"crossref","unstructured":"Azka Wani and S. Revathi. 2020. Ransomware protection in loT using software defined networking.International Journal of Electrical & Computer Engineering (2088-8708) 10 (2020). Azka Wani and S. Revathi. 2020. Ransomware protection in loT using software defined networking.International Journal of Electrical & Computer Engineering (2088-8708) 10 (2020).","DOI":"10.11591\/ijece.v10i3.pp3166-3175"},{"key":"e_1_2_2_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2016.7924925"},{"key":"e_1_2_2_151_1","volume-title":"Ying Qian, and Lixin Tao.","author":"Yang Tianda","year":"2015","unstructured":"Tianda Yang , Yu Yang , Kai Qian , Dan Chia-Tien Lo , Ying Qian, and Lixin Tao. 2015 . Automated detection and analysis for android ransomware. In 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE , 1338\u20131343. Tianda Yang, Yu Yang, Kai Qian, Dan Chia-Tien Lo, Ying Qian, and Lixin Tao. 2015. Automated detection and analysis for android ransomware. In 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 1338\u20131343."},{"key":"e_1_2_2_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502676"},{"key":"e_1_2_2_153_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.025"},{"key":"e_1_2_2_154_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.025"},{"key":"e_1_2_2_155_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"},{"key":"e_1_2_2_156_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.007"},{"key":"e_1_2_2_157_1","volume-title":"RANDS: A machine learning-based anti-ransomware tool for windows platforms. Frontiers in Artificial Intelligence and Applications 318","author":"Zuhair Hiba","year":"2019","unstructured":"Hiba Zuhair and Ali Selamat . 2019 . RANDS: A machine learning-based anti-ransomware tool for windows platforms. Frontiers in Artificial Intelligence and Applications 318 (2019). Hiba Zuhair and Ali Selamat. 2019. RANDS: A machine learning-based anti-ransomware tool for windows platforms. Frontiers in Artificial Intelligence and Applications 318 (2019)."},{"key":"e_1_2_2_158_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10093210"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479393","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:52Z","timestamp":1750191532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,8]]},"references-count":158,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,12,31]]}},"alternative-id":["10.1145\/3479393"],"URL":"https:\/\/doi.org\/10.1145\/3479393","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,8]]},"assertion":[{"value":"2021-02-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}