{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:07:21Z","timestamp":1763345241595,"version":"3.45.0"},"reference-count":34,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064260","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T07:22:23Z","timestamp":1753946543000},"page":"1693-1714","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Ransomware Detection with Machine Learning Techniques and Effective API Integration"],"prefix":"10.32604","volume":"85","author":[{"given":"Asad","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Qaiser","family":"Riaz","sequence":"additional","affiliation":[]},{"given":"Madiha","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Rafia","family":"Mumtaz","sequence":"additional","affiliation":[]},{"given":"Ki-Hyun","family":"Jung","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Ransomware attack report [Internet]; 2017 [cited 2025 Feb 10]. Available from: https:\/\/en.wikipedia.org\/wiki\/WannaCry."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3171","DOI":"10.1007\/s13369-019-04319-2","article-title":"Cyber security threats and vulnerabilities: a systematic mapping study","volume":"45","author":"Humayun","year":"2020","journal-title":"Arab J Sci Eng"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/s40163-019-0097-9","article-title":"Ransomware deployment methods and analysis: views from a predictive model and human responses","volume":"8","author":"Hull","year":"2019","journal-title":"Crime Sci"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"79","DOI":"10.3390\/computers8040079","article-title":"Prevention of crypto-ransomware using a pre-encryption detection algorithm","volume":"8","author":"Kok","year":"2019","journal-title":"Computers"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"110138","DOI":"10.1016\/j.comnet.2023.110138","article-title":"Ransomware early detection: a survey","volume":"239","author":"Cen","year":"2024","journal-title":"Comput Netw"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"101861","DOI":"10.1016\/j.sysarc.2020.101861","article-title":"A survey on machine learning-based malware detection in executable files","volume":"112","author":"Singh","year":"2021","journal-title":"J Syst Archit"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.compeleceng.2019.07.014","article-title":"Ransomware protection using the moving target defense perspective","volume":"78","author":"Lee","year":"2019","journal-title":"Comput Electr Eng"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1016\/j.future.2019.06.005","article-title":"Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection","volume":"101","author":"Ali Saleh Al-rimy","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"31918","DOI":"10.1109\/ACCESS.2018.2840119","article-title":"A practical public key encryption scheme based on learning parity with noise","volume":"6","author":"Yu","year":"2018","journal-title":"IEEE Access"},{"key":"ref10","unstructured":"\u00c7elikta\u015f B. The ransomware detection and prevention tool design by using signature and anomaly based detection methods [master\u2019s thesis]. Istanbul, T\u00fcrkiye: Istanbul Technical University; 2018."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"162691","DOI":"10.4108\/eai.13-7-2018.162691","article-title":"A three-level ransomware detection and prevention mechanism","author":"Ren","year":"2018","journal-title":"EAI Endorsed Trans Energy Web"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-319-73951-9_5","author":"Alhawi","year":"2018","journal-title":"Cyber threat intelligence"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"100445","DOI":"10.1016\/j.eij.2024.100445","article-title":"Ransomware detection based on machine learning using memory features","volume":"25","author":"Aljabri","year":"2024","journal-title":"Egypt Inform J"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"147400","DOI":"10.1109\/ACCESS.2024.3476164","article-title":"Enhancing malicious code detection with boosted N-gram analysis and efficient feature selection","volume":"12","author":"Javan","year":"2024","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1007\/s10207-017-0398-5","article-title":"Talos: no more ransomware victims with formal methods","volume":"17","author":"Cimitile","year":"2018","journal-title":"Int J Inf Secur"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"718","DOI":"10.3390\/sym14040718","article-title":"Permissions-based detection of Android malware using machine learning","volume":"14","author":"Akbar","year":"2022","journal-title":"Symmetry"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"159036","DOI":"10.1109\/ACCESS.2024.3486094","article-title":"Performance-oriented and sustainability-oriented design of an effective Android malware detector","volume":"12","author":"Qadir","year":"2024","journal-title":"IEEE Access"},{"journal-title":"Crypto ransomware analysis and detection using process monitor [master\u2019s thesis]","year":"2017","author":"Kardile","key":"ref18"},{"key":"ref19","first-page":"4283","article-title":"Covalent bond based Android malware detection using permission and system call pairs","volume":"78","author":"Gupta","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref20","first-page":"130545","article-title":"RENTAKA: a novel machine learning framework for crypto-ransomware pre-encryption detection","volume":"13","author":"Zakaria","year":"2022","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1016\/j.jksuci.2020.06.012","article-title":"Early detection of crypto-ransomware using pre-encryption detection algorithm","volume":"34","author":"Kok","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"article-title":"A comprehensive API call analysis for detecting windows-based ransomware","series-title":"Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR); 2022 Jul 27\u201329","author":"Mohan Anand","key":"ref22"},{"key":"ref23","unstructured":"Sgandurra D, Mu\u00f1oz-Gonz\u00e1lez L, Mohsen R, Lupu EC. Automated dynamic analysis of ransomware: benefits, limitations and use for detection. arXiv:1609.03020. 2016. doi:10.48550\/arXiv.1609.03020."},{"article-title":"API-based ransomware detection using machine learning-based threat detection models","series-title":"Proceedings of the 2021 18th International Conference on Privacy, Security and Trust (PST); 2021 Dec 13\u201315","author":"Almousa","key":"ref24"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"117597","DOI":"10.1109\/ACCESS.2022.3218779","article-title":"Machine learning algorithms and frameworks in ransomware detection","volume":"10","author":"Smith","year":"2022","journal-title":"IEEE Access"},{"key":"ref26","article-title":"Ransomware detection with a 2-tier machine learning approach using a novel clustering algorithm","author":"Zhang","year":"2024","journal-title":"Res Sq Forthcoming"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"118299","DOI":"10.1016\/j.eswa.2022.118299","article-title":"Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic","volume":"209","author":"Berrueta","year":"2022","journal-title":"Expert Syst Appl"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1109\/TETC.2017.2756908","article-title":"Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence","volume":"8","author":"Homayoun","year":"2020","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.3390\/s23031053","article-title":"Dynamic feature dataset for ransomware detection using machine learning algorithms","volume":"23","author":"Herrera-Silva","year":"2023","journal-title":"Sensors"},{"key":"ref30","first-page":"167","article-title":"Fuzzy discretization technique for Bayesian flood disaster model","volume":"17","author":"Ahmad Azami","year":"2018","journal-title":"J Inf Commun Technol"},{"key":"ref31","first-page":"10921","article-title":"Performance study of enhanced SHA-256 algorithm","volume":"10","author":"Gowthaman","year":"2015","journal-title":"Int J Appl Eng Res"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s10207-024-00819-x","article-title":"Real-time system call-based ransomware detection","volume":"23","author":"Chew","year":"2024","journal-title":"Int J Inf Secur"},{"key":"ref33","doi-asserted-by":"crossref","unstructured":"Anikolova E, Martins S, Rozental D, Fontana J, Maier P. Ransomware detection through behavioral attack signatures evaluation: a novel machine learning framework for improved accuracy and robustness; 2024. doi:10.36227\/techrxiv.173092022.26611647.","DOI":"10.36227\/techrxiv.173092022.26611647\/v1"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1867","DOI":"10.1007\/s10586-023-04043-5","article-title":"Ransomware early detection using deep reinforcement learning on portable executable header","volume":"27","author":"Deng","year":"2024","journal-title":"Clust Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_64260\/TSP_CMC_64260.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:02:55Z","timestamp":1763344975000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064260","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}