{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:36Z","timestamp":1750309536652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711632","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"158-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["RanCF: Optimizing Ransomware Classification in IIoT Environments with Random Forest"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8389-095X","authenticated-orcid":false,"given":"Mowei","family":"Gong","sequence":"first","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3932-6298","authenticated-orcid":false,"given":"Xuepeng","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Technical Support, Beijing Luo'an Technology Co., Ltd, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9550-478X","authenticated-orcid":false,"given":"Tianqi","family":"Peng","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5239-5150","authenticated-orcid":false,"given":"Guiping","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7106-6782","authenticated-orcid":false,"given":"Haotian","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7748-2449","authenticated-orcid":false,"given":"Xinyue","family":"Cui","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TransAI51903.2021.00012"},{"key":"e_1_3_3_1_3_2","unstructured":"Jim Bates. 1990. Trojan horse: AIDS information introductory diskette version 2.0. Virus Bulletin 6 (1990) 1143\u20131148."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91625-1_5"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243771"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Azaabi Cletus Alex\u00a0A Opoku and Benjamin\u00a0Asubam Weyori. 2024. An Evaluation of Current Malware Trends and Defense Techniques: A Scoping Review with Empirical Case Studies. Journal of Advances in Information Technology 15 5 (2024).","DOI":"10.12720\/jait.15.5.649-671"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Aviad Cohen and Nir Nissim. 2018. Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Systems with Applications 102 (2018) 158\u2013178.","DOI":"10.1016\/j.eswa.2018.02.039"},{"key":"e_1_3_3_1_8_2","unstructured":"Parshwa Dand and Dhaval Chudasama. 2021. A Comparative Study about the Ransomware. Journal of Advanced Database Management & Systems 8 3 (2021) 8\u201315."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33617-2_5"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639090"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323680"},{"key":"e_1_3_3_1_12_2","volume-title":"The Current State of Ransomware","author":"James\u00a0Wyke Anand\u00a0Ajjan","year":"2015","unstructured":"Anand\u00a0Ajjan James\u00a0Wyke. 2015. The Current State of Ransomware. Technical Report. SOPHOS. https:\/\/api.semanticscholar.org\/CorpusID:26809198"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Jin Ho\u00a0Park Jin Ho\u00a0Park Sushil Kumar\u00a0Singh Jin Ho\u00a0Park Mikail Mohammed\u00a0Salim Sushil Kumar\u00a0Singh Abir El\u00a0Azzaoui Mikail Mohammed\u00a0Salim and Jong Hyuk\u00a0Park Abir El\u00a0Azzaoui. 2022. Ransomware-based Cyber Attacks: A Comprehensive Survey. Journal of Internet Technology 23 7 (Dec. 2022) 1557\u20131564. 10.53106\/160792642022122307010","DOI":"10.53106\/160792642022122307010"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8702049"},{"key":"e_1_3_3_1_15_2","unstructured":"Noel Keijzer. 2020. The new generation of ransomware - An in depth study of Ransomware-as-a-Service. (2020). http:\/\/essay.utwente.nl\/81595\/"},{"key":"e_1_3_3_1_16_2","volume-title":"RANSOMWARE IN ICS ENVIRONMENTS","author":"Larson Selena","year":"2020","unstructured":"Selena Larson and Camille Singleton. 2020. RANSOMWARE IN ICS ENVIRONMENTS. Technical Report. DRAGOS."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3234691"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Harun Oz Ahmet Aris Albert Levi and A.\u00a0Selcuk Uluagac. 2022. A Survey on Ransomware: Evolution Taxonomy and Defense Solutions. Comput. Surveys 54 11s (Jan. 2022) 1\u201337. 10.1145\/3514229arXiv:https:\/\/arXiv.org\/abs\/2102.06249 [cs].","DOI":"10.1145\/3514229"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/GCWCN.2018.8668630"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2019.8776926"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Hiba Zuhair Ali Selamat and Ondrej Krejcar. 2020. A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning. Applied Sciences 10 9 (May 2020) 3210. 10.3390\/app10093210","DOI":"10.3390\/app10093210"}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":20,"alternative-id":["10.1145\/3711618.3711632","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711632","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}