{"id":"https://openalex.org/W7152487951","doi":"https://doi.org/10.1109/icecet63943.2025.11472266","title":"Understanding and Mitigating Ransomware Threats","display_name":"Understanding and Mitigating Ransomware Threats","publication_year":2025,"publication_date":"2025-07-03","ids":{"openalex":"https://openalex.org/W7152487951","doi":"https://doi.org/10.1109/icecet63943.2025.11472266"},"language":null,"primary_location":{"id":"doi:10.1109/icecet63943.2025.11472266","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472266","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133306223","display_name":"Najla Aldawsari","orcid":null},"institutions":[{"id":"https://openalex.org/I53276908","display_name":"Marymount University","ror":"https://ror.org/0008kv292","country_code":"US","type":"education","lineage":["https://openalex.org/I53276908"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Najla Aldawsari","raw_affiliation_strings":["Marymount University,School of Technology and Innovation,Arlington,United States"],"affiliations":[{"raw_affiliation_string":"Marymount University,School of Technology and Innovation,Arlington,United States","institution_ids":["https://openalex.org/I53276908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074868524","display_name":"Alex V. Mbaziira","orcid":null},"institutions":[{"id":"https://openalex.org/I53276908","display_name":"Marymount University","ror":"https://ror.org/0008kv292","country_code":"US","type":"education","lineage":["https://openalex.org/I53276908"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Mbaziira","raw_affiliation_strings":["Marymount University,School of Technology and Innovation,Arlington,United States"],"affiliations":[{"raw_affiliation_string":"Marymount University,School of Technology and Innovation,Arlington,United States","institution_ids":["https://openalex.org/I53276908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5133306223"],"corresponding_institution_ids":["https://openalex.org/I53276908"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74998717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5630000233650208,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5630000233650208,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.17339999973773956,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.060600001364946365,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9485999941825867},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.7218999862670898},{"id":"https://openalex.org/keywords/extortion","display_name":"Extortion","score":0.6050000190734863},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6026999950408936},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4341999888420105},{"id":"https://openalex.org/keywords/false-positives-and-false-negatives","display_name":"False positives and false negatives","score":0.36309999227523804}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9485999941825867},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.7218999862670898},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7163000106811523},{"id":"https://openalex.org/C2779066997","wikidata":"https://www.wikidata.org/wiki/Q6452087","display_name":"Extortion","level":2,"score":0.6050000190734863},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6026999950408936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43619999289512634},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4341999888420105},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.36309999227523804},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3208000063896179},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3158999979496002},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.29989999532699585},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2944999933242798},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet63943.2025.11472266","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472266","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2795158134","https://openalex.org/W3133843004","https://openalex.org/W3205163562"],"related_works":[],"abstract_inverted_index":{"Ransomware":[0],"is":[1,18],"an":[2],"ever-increasing":[3],"area":[4],"of":[5,21,24,28,35,40,52,75,91,99,125],"threat":[6],"and":[7,13,31,97,115,141,147,157],"ever-decreasing":[8],"hope'":[9],"for":[10,81,101,133],"both":[11,93],"perpetrators":[12],"the":[14,65,89,123,148],"victimized.":[15],"The":[16,105,127],"discussion":[17],"about":[19],"types":[20],"ransomwares,":[22],"ways":[23,27],"its":[25,29,36],"transmission,":[26],"encryption,":[30],"approaches":[32],"to":[33,112,118,121],"extirpation":[34],"impact.":[37],"Major":[38],"contributions":[39],"this":[41],"research":[42,66,128],"include":[43],"identifying":[44],"new":[45,113],"ransomware":[46,83,136],"attack":[47,84],"trends,":[48],"notably":[49],"increased":[50],"usage":[51],"a":[53,72,78,109,130,142],"double":[54],"extortion":[55],"technique":[56],"where":[57],"attackers":[58],"exfiltrate":[59],"sensitive":[60],"information":[61],"before":[62],"encryption.":[63],"Furthermore,":[64],"shows":[67],"that":[68],"random":[69],"forest":[70],"with":[71,137],"detection":[73,103,120],"rate":[74],"92%":[76],"demonstrates":[77],"promising":[79],"model":[80],"early":[82],"detection.":[85],"It":[86],"also":[87],"discusses":[88],"challenge":[90,152],"achieving":[92],"zero":[94],"false":[95,155],"positives":[96,156],"loss":[98],"sensitivity":[100],"anomaly":[102,119],"models.":[104],"suggested":[106],"method":[107],"provides":[108],"better":[110],"response":[111],"threats":[114],"more":[116],"weight":[117],"diminish":[122],"impact":[124],"ransomware.":[126],"delivers":[129],"holistic":[131],"solution":[132],"countering":[134],"raging":[135],"continuously":[138],"changing":[139],"sophistication":[140],"wide":[143],"reach":[144],"on":[145],"society":[146],"economy":[149],"by":[150],"overcoming":[151],"constraints":[153],"\u2014":[154],"limited":[158],"datasets.":[159]},"counts_by_year":[],"updated_date":"2026-04-11T06:13:24.991567","created_date":"2026-04-10T00:00:00"}
