{"id":"https://openalex.org/W4200055159","doi":"https://doi.org/10.1109/pst52912.2021.9647816","title":"API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models","display_name":"API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200055159","doi":"https://doi.org/10.1109/pst52912.2021.9647816"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647816","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014776130","display_name":"May Almousa","orcid":"https://orcid.org/0000-0003-3695-081X"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]},{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA","US"],"is_corresponding":true,"raw_author_name":"May Almousa","raw_affiliation_strings":["Computer Science Department, College of Engineering, North Carolina A&T State University, NC, USA","Information Technology Department, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, College of Engineering, North Carolina A&T State University, NC, USA","institution_ids":["https://openalex.org/I35777872"]},{"raw_affiliation_string":"Information Technology Department, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019784374","display_name":"Sai Basavaraju","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Basavaraju","raw_affiliation_strings":["Computer Science Department, College of Engineering, North Carolina A&T State University, NC, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, College of Engineering, North Carolina A&T State University, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003653980","display_name":"Mohd Anwar","orcid":"https://orcid.org/0000-0002-2653-7987"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohd Anwar","raw_affiliation_strings":["Computer Science Department, College of Engineering, North Carolina A&T State University, NC, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, College of Engineering, North Carolina A&T State University, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014776130"],"corresponding_institution_ids":["https://openalex.org/I106778892","https://openalex.org/I35777872"],"apc_list":null,"apc_paid":null,"fwci":3.6603,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94062817,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9546436071395874},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7437524199485779},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.41997572779655457},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41865259408950806},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3867926597595215},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3722130060195923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.310700923204422}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9546436071395874},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7437524199485779},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.41997572779655457},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41865259408950806},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3867926597595215},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3722130060195923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.310700923204422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst52912.2021.9647816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647816","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W101596157","https://openalex.org/W273955616","https://openalex.org/W1503224444","https://openalex.org/W1540198462","https://openalex.org/W1566259290","https://openalex.org/W1573526548","https://openalex.org/W1916732574","https://openalex.org/W1967261319","https://openalex.org/W2040895929","https://openalex.org/W2084979543","https://openalex.org/W2085807744","https://openalex.org/W2119359024","https://openalex.org/W2135814109","https://openalex.org/W2162792873","https://openalex.org/W2461373307","https://openalex.org/W2513529237","https://openalex.org/W2553476679","https://openalex.org/W2559964890","https://openalex.org/W2601591992","https://openalex.org/W2614042168","https://openalex.org/W2766662076","https://openalex.org/W2778638786","https://openalex.org/W2789729245","https://openalex.org/W2885747980","https://openalex.org/W2900633536","https://openalex.org/W2911731407","https://openalex.org/W2978822875","https://openalex.org/W2999445414","https://openalex.org/W3088716616","https://openalex.org/W4248806346","https://openalex.org/W4288358969","https://openalex.org/W6604196288","https://openalex.org/W6610017368","https://openalex.org/W6737892506","https://openalex.org/W6763066046","https://openalex.org/W6769181742"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794","https://openalex.org/W2964829536","https://openalex.org/W2904586340","https://openalex.org/W3120595989"],"abstract_inverted_index":{"Ransomware":[0,13,43],"is":[1,29,109],"a":[2,46,55,200,222],"major":[3],"malware":[4],"attack":[5],"experienced":[6],"by":[7,33],"large":[8],"corporations":[9],"and":[10,57,135,138,148,158,210,227],"healthcare":[11],"services.":[12],"employs":[14],"the":[15,35,38,50,62,112,118,185,189,194,212],"idea":[16],"of":[17,27,40,64,106,115,124,131,205,224],"cryptovirology,":[18],"which":[19],"uses":[20],"cryptography":[21],"to":[22,30,127,160,170,183,242],"design":[23],"malware.":[24],"The":[25,104,165,175],"goal":[26],"ransomware":[28,65,82,94,116,125,142,147,202,217,247],"extort":[31],"ransom":[32],"threatening":[34],"victim":[36],"with":[37,99,193,237],"destruction":[39],"their":[41],"data.":[42],"typically":[44],"involves":[45,72],"3-step":[47],"process:":[48],"analyzing":[49],"victim\u2019s":[51],"network":[52],"traffic,":[53],"identifying":[54],"vulnerability,":[56],"then":[58],"exploiting":[59],"it.":[60],"Thus,":[61],"detection":[63,83,95,143,203,218],"has":[66],"become":[67],"an":[68,89,228],"important":[69],"undertaking":[70],"that":[71],"various":[73,129],"sophisticated":[74],"solutions":[75,241],"for":[76,163,207,214],"improving":[77],"security.":[78],"To":[79],"further":[80,235],"enhance":[81],"capabilities,":[84],"this":[85,107],"paper":[86],"focuses":[87],"on":[88,117,145],"Application":[90],"Programming":[91],"Interface":[92],"(API)-based":[93],"approach":[96,232],"in":[97],"combination":[98,223],"machine":[100,140,172],"learning":[101,173],"(ML)":[102],"techniques.":[103],"focus":[105],"research":[108],"(i)":[110],"understanding":[111],"life":[113],"cycle":[114],"Windows":[119],"platform,":[120],"(ii)":[121],"dynamic":[122],"analysis":[123,162,198],"samples":[126],"extract":[128],"features":[130],"malicious":[132],"code":[133],"patterns,":[134],"(iii)":[136],"developing":[137],"validating":[139],"learning-based":[141],"models":[144],"different":[146],"benign":[149],"samples.":[150],"Data":[151],"were":[152,168,191],"collected":[153],"from":[154,246],"publicly":[155],"available":[156],"repositories":[157],"subjected":[159],"sandbox":[161],"sampling.":[164],"sampled":[166],"datasets":[167],"applied":[169],"build":[171],"models.":[174],"grid":[176],"search":[177],"hyperparameter":[178],"optimization":[179],"algorithm":[180],"was":[181],"employed":[182],"obtain":[184],"best":[186],"fit":[187],"model;":[188],"results":[190],"cross-validated":[192],"testing":[195],"datasets.":[196],"This":[197,231],"yielded":[199],"high":[201],"accuracy":[204],"99.18%":[206],"Windows-based":[208],"platforms":[209],"shows":[211],"potential":[213],"achieving":[215],"high-accuracy":[216],"capabilities":[219],"when":[220],"using":[221],"API":[225],"calls":[226],"ML":[229],"model.":[230],"can":[233],"be":[234],"utilized":[236],"existing":[238],"multilayer":[239],"security":[240],"protect":[243],"critical":[244],"data":[245],"attacks.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
