{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:47:33Z","timestamp":1751521653403,"version":"3.38.0"},"reference-count":22,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055463","type":"journal-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T08:02:08Z","timestamp":1729756928000},"page":"2791-2818","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection"],"prefix":"10.32604","volume":"81","author":[{"given":"Isha","family":"Sood","sequence":"first","affiliation":[]},{"given":"Varsha","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.3390\/s22051837","article-title":"A survey of crypto ransomware attack detection methodologies: An evolving outlook","volume":"22","author":"Alqahtani","year":"2022","journal-title":"Sensors"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/2806605","article-title":"Ransomware: An interdisciplinary technical and legal approach","volume":"2022","author":"Robles-Carrillo","year":"2022","journal-title":"Security Commun. Networks"},{"key":"ref3","first-page":"454","article-title":"Automated behavioral analysis of malware: A case study of wannacry ransomware","volume":"2017","author":"Chen","year":"Dec. 2017","journal-title":"Proceedings-16th IEEE Int. Conf. Mach. Learn. Appl., ICMLA 2017"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.30574\/wjarr.2024.21.1.0315","article-title":"Machine learning in cybersecurity: A review of threat detection and defense mechanisms","volume":"21","author":"Okoli","year":"2024","journal-title":"World J. Adv. Res. Reviews"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.comcom.2022.11.001","article-title":"A review of machine learning-based zero-day attack detection: Challenges and future directions","volume":"198","author":"Guo","year":"15 Jan. 2023","journal-title":"Computer Commun."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.3390\/s23031053","article-title":"Dynamic feature dataset for ransomware detection using machine learning algorithms","volume":"23","author":"Herrera-Silva","year":"2023","journal-title":"Sensors"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.24018\/ejeng.2021.6.3.2372","article-title":"A review of cloud-based malware detection system: Opportunities, advances and challenges","volume":"6","author":"Aslan","year":"2021","journal-title":"European J. Eng. Technol. Res."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"40698","DOI":"10.1109\/ACCESS.2023.3268535","article-title":"The age of ransomware: A survey on the evolution, taxonomy, and research directions","volume":"11","author":"Razaulla","year":"2023","journal-title":"IEEE Access"},{"key":"ref9","first-page":"1984","article-title":"Early detection of crypto-ransomware using pre-encryption detection algorithm","volume":"34","author":"Kok","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1750","DOI":"10.1109\/TCAD.2017.2661811","article-title":"Reliable hardware architectures for cryptographic block ciphers LED and HIGHT","volume":"36","author":"Subramanian","year":"2017","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"J. Kaur, A. Cintas Canto, M. Mozaffari Kermani, and R. Azarderakhsh, \u201cA comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard,\u201d Apr. 2023, arXiv2304.06222. doi: 10.1145\/nnnnnnn.nnnnnnn.","DOI":"10.36227\/techrxiv.22970855.v1"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1109\/COMST.2024.3355222","article-title":"Post-quantum blockchain security for the Internet of Things: Survey and research directions","volume":"26","author":"Gharavi","journal-title":"IEEE Commun. Surv."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/TDSC.2017.2723891","article-title":"Supersingular isogeny Diffie-Hellman key exchange on 64-bit ARM","volume":"16","author":"Jalali","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref14","first-page":"11","article-title":"An inception V3 approach for malware classification using machine learning and transfer learning","volume":"4","author":"Ahmed","year":"2023","journal-title":"Int. J. Intell. Netw."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","article-title":"A survey on transfer learning","volume":"22","author":"Pan","year":"2009","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12183899","article-title":"Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data","volume":"12","author":"Singh","year":"2023","journal-title":"Electronics"},{"key":"ref17","article-title":"RanSAP: An open dataset of ransomware storage access patterns for training machine learning models","volume":"40","author":"Hirano","year":"Mar. 2022","journal-title":"Forensic Sci. Int.: Digit. Invest."},{"key":"ref18","first-page":"662","article-title":"On detection and prevention of zero-day attack using cuckoo sandbox in software-defined networks","volume":"17","author":"Al-Rushdan","year":"2020","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref19","article-title":"Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation","volume":"140","author":"Bhardwaj","year":"May 2024","journal-title":"Comput. Secur.Volume"},{"key":"ref20","unstructured":"W. Gong, Y. Zha, and J. Tang, \u201cRansomware detection and classification using generative adversarial networks with dynamic weight adaptation,\u201d Accessed: Aug. 12, 2024. [Online]. Available: https:\/\/files.osf.io\/v1\/resources\/5vju7\/providers\/osfstorage\/665069636b6c8e0da904cd11?action=download&direct&version=1"},{"key":"ref21","first-page":"252","article-title":"Cancer gene clustering using computational model","volume":"18","author":"Bihari","year":"2024","journal-title":"GMSARN Int. J."},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103842","article-title":"Explainability in AI-based behavioral malware detection systems","volume":"141","author":"Galli","year":"Jun. 2024","journal-title":"Computers Secur."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_55463\/TSP_CMC_55463.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:10:21Z","timestamp":1741320621000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":22,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055463","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}