{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:35:54Z","timestamp":1772724954823,"version":"3.50.1"},"reference-count":32,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.059116","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:31:11Z","timestamp":1733970671000},"page":"4485-4502","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":7,"title":["Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model"],"prefix":"10.32604","volume":"81","author":[{"given":"Ki-Pyoung","family":"Ma","sequence":"first","affiliation":[]},{"given":"Dong-Ju","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Sang-Joon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","volume":"392","author":"Mehta","year":"2022","journal-title":"Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","article-title":"A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments","volume":"7","author":"Li","year":"2021","journal-title":"Energy Rep."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"CANN: An intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","author":"Lin","year":"2015","journal-title":"Knowl. Based Syst."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"6249","DOI":"10.1109\/ACCESS.2019.2963724","article-title":"A comprehensive review on malware detection approaches","volume":"8","author":"Aslan","year":"2020","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"206303","DOI":"10.1109\/ACCESS.2020.3036491","article-title":"Intelligent vision-based malware detection and classification using deep random forest paradigm","volume":"8","author":"Roseline","year":"2020","journal-title":"IEEE Access"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"175063","DOI":"10.1109\/ACCESS.2020.3025967","article-title":"Wind speed forecasting based on extreme gradient boosting","volume":"8","author":"Cai","year":"2020","journal-title":"IEEE Access"},{"key":"ref7","series-title":"Int. Conf. Adv. Netw. Technol. Intell. Comput.","first-page":"117","article-title":"Comparative analysis of short-term load forecasting using machine learning techniques","author":"Shifare","year":"2023"},{"key":"ref8","first-page":"1","article-title":"Short-term power load forecasting using SSA-CNN-LSTM method","volume":"12","author":"Wang","year":"2024","journal-title":"Syst. Sci. Control Eng."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.procs.2016.08.072","article-title":"Experimental analysis of ransomware on Windows and Android platforms: Evolution and characterization","volume":"94","author":"Zavarsky","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref10","unstructured":"A. B. Kardile, \u201cCrypto ransomware analysis and detection using process monitor,\u201d The Univ. of Texas at Arlington, Arlington, TX, USA, 2017."},{"key":"ref11","series-title":"IEEE 24th Int. Conf. Softw. Anal., Evol. Reeng. (SANER)","article-title":"UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)","author":"Kirda","year":"2017"},{"key":"ref12","unstructured":"D. Sgandurra, L. Mu\u00f1oz-Gonz\u00a3lez, R. Mohsen, and E. C. Lupu, \u201cAutomated dynamic analysis of ransomware: Benefits, limitations and use for detection,\u201d 2016. doi: 10.48550\/arXiv.1609.03020."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.compeleceng.2017.10.012","article-title":"Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics","volume":"66","author":"Cabaj","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref14","series-title":"Proc. 47th Int. Conf. Parallel Process. Companion","first-page":"1","article-title":"Detecting ransomware using support vector machines","author":"Takeuchi","year":"2018"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"6731","DOI":"10.1007\/s00500-018-3257-z","article-title":"Ransomware detection method based on context-aware entropy analysis","volume":"22","author":"Jung","year":"2018","journal-title":"Soft Comput."},{"key":"ref16","series-title":"Proc. Int. Conf. Res. Adapt. Convergent Syst.","first-page":"196","article-title":"Automatic ransomware detection and analysis based on dynamic API calls flow graph","author":"Chen","year":"2017"},{"key":"ref17","series-title":"Proc. 2018 ACM Int. Workshop Secur. Softw. Defined Netw. Netw. Funct. Virtual.","first-page":"1","article-title":"Machine learning-based detection of ransomware using SDN","author":"Cusack","year":"2018"},{"key":"ref18","series-title":"Proc. 2018 IEEE Secur. Priv. Workshops (SPW)","first-page":"180","article-title":"Forensic analysis of ransomware families using static and dynamic analysis","author":"Subedi","year":"2018"},{"key":"ref19","first-page":"93","volume":"70","author":"Alhawi","year":"2018","journal-title":"Cyber Threat Intelligence. Advances in Information Security"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","article-title":"Classification of ransomware families with machine learning based on N-gram of opcodes","volume":"90","author":"Zhang","year":"2019","journal-title":"Future Gen. Comput. Syst."},{"key":"ref21","series-title":"Proc. 2017 20th Int. Conf. Comput. Inform. Technol. (ICCIT)","first-page":"1","article-title":"RansHunt: A support vector machines based ransomware analysis framework with integrated feature set","author":"Hasan","year":"2017"},{"key":"ref22","series-title":"Proc. 2017 Int. Conf. Secur., Pattern Anal., Cybern. (SPAC)","first-page":"531","article-title":"Ransomware detection based on V-detector negative selection algorithm","author":"Lu","year":"2018"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"119710","DOI":"10.1109\/ACCESS.2020.3003785","article-title":"A digital DNA sequencing engine for ransomware detection using machine learning","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"8699","DOI":"10.1007\/s12652-020-02630-7","article-title":"Detecting ransomware attacks using intelligent algorithms: Recent development and next direction from deep learning and big data perspectives","volume":"12","author":"Bello","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-20550-2","volume":"9148","author":"Almgren","year":"2015","journal-title":"Detection of Intrusions and Malware, and Vulnerability Assessment"},{"key":"ref26","article-title":"RanSAP: An open dataset of ransomware storage access patterns for training machine learning models","volume":"40","author":"Hirano","year":"2022, Art. no. 301314","journal-title":"Forensic Sci. Int.: Digit. Investig."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10796-020-10017-4","article-title":"DeepRan: Attention-based BiLSTM and CRF for ransomware early detection and classification","volume":"23","author":"Roy","year":"2021","journal-title":"Inform. Syst. Front."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","article-title":"Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI","volume":"58","author":"Arrieta","year":"2020","journal-title":"Inf. Fus."},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1016\/j.media.2022.102470","article-title":"Explainable artificial intelligence (XAI) in deep learning-based medical image analysis","volume":"79","author":"van der Velden","year":"2022, Art. no. 102470","journal-title":"Med. Image Anal."},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.3389\/fdata.2021.688969","article-title":"Principles and practice of explainable machine learning","volume":"4","author":"Belle","year":"2021, Art. no. 688969","journal-title":"Front. Big Data"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.3390\/s23031053","article-title":"Dynamic feature dataset for ransomware detection using machine learning algorithms","volume":"23","author":"Herrera-Silva","year":"2023, Art. no. 1053","journal-title":"Sensors"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/su14127375","article-title":"Interpretable machine learning models for malicious domains detection using explainable Artificial Intelligence (XAI)","volume":"14","author":"Aslam","year":"2022","journal-title":"Sustainability"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59067\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:13:41Z","timestamp":1741328021000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.059116","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-09-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}