{"id":"https://openalex.org/W4406892335","doi":"https://doi.org/10.1109/csnet64211.2024.10851740","title":"A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks","display_name":"A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406892335","doi":"https://doi.org/10.1109/csnet64211.2024.10851740"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047519449","display_name":"Anika Tasnim","orcid":null},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Anika Maisha Tasnim","raw_affiliation_strings":["Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116056996","display_name":"Amrin Hassan Heya","orcid":null},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Amrin Hassan Heya","raw_affiliation_strings":["Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058224826","display_name":"Md. Mamunur Rashid","orcid":"https://orcid.org/0000-0001-6249-1181"},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Md Maraj Rashid","raw_affiliation_strings":["Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116056997","display_name":"Nafis Shahriar","orcid":null},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Nafis Shahriar","raw_affiliation_strings":["Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011273002","display_name":"Raqeebir Rab","orcid":null},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Raqeebir Rab","raw_affiliation_strings":["Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"Ahsanullah University of Science &#x0026; Technology,Dept of Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009075818","display_name":"Abderrahmane Leshob","orcid":"https://orcid.org/0000-0002-4066-3111"},"institutions":[{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Abderrahmane Leshob","raw_affiliation_strings":["University of Quebec at Montreal,Department of Analytics, Operations, and IT,Montreal,Canada"],"affiliations":[{"raw_affiliation_string":"University of Quebec at Montreal,Department of Analytics, Operations, and IT,Montreal,Canada","institution_ids":["https://openalex.org/I159129438"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5047519449"],"corresponding_institution_ids":["https://openalex.org/I135564639"],"apc_list":null,"apc_paid":null,"fwci":0.3493,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61111994,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"153","last_page":"156"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.921999990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.943701982498169},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8996703624725342},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7106136083602905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45318931341171265},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41596096754074097},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.24804434180259705},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15668213367462158}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.943701982498169},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8996703624725342},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7106136083602905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45318931341171265},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41596096754074097},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.24804434180259705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15668213367462158}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W3035504622","https://openalex.org/W3198095371","https://openalex.org/W4211262529","https://openalex.org/W4296913371","https://openalex.org/W4317796364","https://openalex.org/W4386838013","https://openalex.org/W4390805757"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474"],"abstract_inverted_index":{"Ransomware":[0],"attacks,":[1],"particularly":[2],"those":[3],"employing":[4],"cryptocurrencies":[5],"such":[6],"as":[7,150],"Bitcoin,":[8],"pose":[9],"a":[10],"significant":[11],"risk":[12],"to":[13,120,189],"worldwide":[14],"cybersecurity.":[15],"The":[16],"decentralized":[17],"structure":[18],"of":[19,33,157,171,183],"these":[20],"networks,":[21],"coupled":[22],"with":[23],"the":[24,29,146,151,167,180],"anonymity":[25],"they":[26],"afford,":[27],"complicates":[28],"tracking":[30],"and":[31,51,73,83,98,124,139,159,163,169,186,193],"cessation":[32],"criminal":[34],"operations.":[35],"This":[36,165],"paper":[37],"presents":[38],"an":[39,155],"extensive":[40],"analysis":[41],"focused":[42],"on":[43,55],"improving":[44,136],"ransomware":[45,57,197],"detection":[46],"utilizing":[47],"advanced":[48,89],"machine":[49],"learning":[50,53],"deep":[52],"approaches":[54,112],"multiclass":[56,144],"classification.":[58],"Our":[59,177],"investigation":[60],"employed":[61],"three":[62],"principal":[63],"models:":[64],"Bidirectional":[65],"Long":[66],"Short-Term":[67],"Memory":[68],"(BiLSTM),":[69],"Multi-Layer":[70],"Perceptron":[71],"(MLP),":[72],"Support":[74],"Vector":[75],"Machine":[76],"(SVM).":[77],"To":[78],"address":[79,125],"inherent":[80],"class":[81,126],"imbalances":[82],"enhance":[84],"model":[85,141,148,194],"efficacy,":[86],"we":[87],"incorporated":[88],"techniques,":[90],"including":[91],"Topological":[92,102],"Data":[93,100,103],"Analysis":[94,104],"(TDA),":[95],"Focal":[96,116],"Loss,":[97],"Synthetic":[99],"Generation.":[101],"(TDA)":[105],"revealed":[106],"complex":[107],"data":[108],"patterns":[109],"that":[110],"conventional":[111],"may":[113],"overlook,":[114],"while":[115],"Loss":[117],"was":[118],"integrated":[119],"emphasize":[121],"difficult":[122],"instances":[123],"imbalance.":[127],"Moreover,":[128],"Generative":[129],"Adversarial":[130],"Networks":[131],"(GANs)":[132],"produced":[133],"synthetic":[134],"data,":[135],"dataset":[137],"equilibrium":[138],"fortifying":[140],"training.":[142],"In":[143],"classification,":[145],"BiLSTM":[147,172],"emerged":[149],"superior":[152],"performer,":[153],"attaining":[154],"accuracy":[156],"85.54%":[158],"exceeding":[160],"both":[161],"MLP":[162],"SVM.":[164],"underscores":[166],"versatility":[168],"efficacy":[170],"across":[173],"multiple":[174],"prediction":[175],"categories.":[176],"research":[178],"highlights":[179],"essential":[181],"integration":[182],"TDA,":[184],"GAN,":[185],"focal":[187],"loss":[188],"improve":[190],"feature":[191],"representation":[192],"resilience":[195],"in":[196],"detection.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
