{"id":"https://openalex.org/W4386066991","doi":"https://doi.org/10.1109/smartnets58706.2023.10215732","title":"Machine Learning with Bitcoin Heist Ransomware","display_name":"Machine Learning with Bitcoin Heist Ransomware","publication_year":2023,"publication_date":"2023-07-25","ids":{"openalex":"https://openalex.org/W4386066991","doi":"https://doi.org/10.1109/smartnets58706.2023.10215732"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets58706.2023.10215732","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10215732","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101236365","display_name":"Nurhaliza Hassan","orcid":null},"institutions":[{"id":"https://openalex.org/I142934699","display_name":"California State University, Fullerton","ror":"https://ror.org/02avqqw26","country_code":"US","type":"education","lineage":["https://openalex.org/I142934699"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nurhaliza Hassan","raw_affiliation_strings":["California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA","Dept. of Computer Science, California State University, Fullerton, Fullerton, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA","institution_ids":["https://openalex.org/I142934699"]},{"raw_affiliation_string":"Dept. of Computer Science, California State University, Fullerton, Fullerton, CA, USA","institution_ids":["https://openalex.org/I142934699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000617260","display_name":"Kanika Sood","orcid":"https://orcid.org/0000-0002-7012-4266"},"institutions":[{"id":"https://openalex.org/I142934699","display_name":"California State University, Fullerton","ror":"https://ror.org/02avqqw26","country_code":"US","type":"education","lineage":["https://openalex.org/I142934699"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kanika Sood","raw_affiliation_strings":["California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA","Dept. of Computer Science, California State University, Fullerton, Fullerton, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA","institution_ids":["https://openalex.org/I142934699"]},{"raw_affiliation_string":"Dept. of Computer Science, California State University, Fullerton, Fullerton, CA, USA","institution_ids":["https://openalex.org/I142934699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112875173","display_name":"Gabriel Suzuki","orcid":null},"institutions":[{"id":"https://openalex.org/I142934699","display_name":"California State University, Fullerton","ror":"https://ror.org/02avqqw26","country_code":"US","type":"education","lineage":["https://openalex.org/I142934699"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gabriel Suzuki","raw_affiliation_strings":["California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA","Dept. of Computer Science, California State University, Fullerton, Fullerton, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Fullerton,Dept. of Computer Science,Fullerton,CA,USA","institution_ids":["https://openalex.org/I142934699"]},{"raw_affiliation_string":"Dept. of Computer Science, California State University, Fullerton, Fullerton, CA, USA","institution_ids":["https://openalex.org/I142934699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101236365"],"corresponding_institution_ids":["https://openalex.org/I142934699"],"apc_list":null,"apc_paid":null,"fwci":0.4075,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56832551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.886802613735199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7434949278831482},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4381857216358185},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33416515588760376},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.2629854679107666}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.886802613735199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7434949278831482},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4381857216358185},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33416515588760376},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2629854679107666}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets58706.2023.10215732","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10215732","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2885747980","https://openalex.org/W2911731407","https://openalex.org/W3004344696","https://openalex.org/W3111126165","https://openalex.org/W4292230971","https://openalex.org/W4312400385","https://openalex.org/W4318148196"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794"],"abstract_inverted_index":{"In":[0,124],"recent":[1],"years,":[2,45],"there":[3],"has":[4,20,37,72],"been":[5,21],"a":[6,62,84,120],"significant":[7],"rise":[8],"in":[9,24,39,41],"the":[10,22,42,65,74,78,91,96,137],"popularity":[11],"of":[12,53,64,98],"cryptocurrency":[13,18,56,130],"amongst":[14],"investors":[15],"worldwide.":[16],"One":[17],"that":[19,71,87],"forerunner":[23],"this":[25,125,142],"new":[26,51],"digital":[27],"age":[28],"is":[29,77],"Satoshi":[30],"Nakamoto\u2019s":[31],"Bitcoin.":[32],"As":[33,61],"much":[34],"as":[35,50,148],"it":[36],"augmented":[38],"value":[40],"past":[43],"several":[44],"many":[46],"issues":[47],"have":[48,82],"emerged":[49],"points":[52],"concern":[54],"surrounding":[55],"ransomware":[57,132],"orchestrated":[58],"by":[59],"scammers.":[60],"result":[63],"growing":[66],"scandals,":[67],"one":[68],"notorious":[69],"case":[70],"made":[73],"most":[75],"headlines":[76],"Bitcoin":[79,92,122],"Heist.":[80],"We":[81],"found":[83],"sizable":[85],"dataset":[86],"traces":[88],"back":[89],"to":[90,110],"Heist":[93],"incident.":[94],"With":[95],"help":[97],"data":[99],"science":[100],"and":[101,131,133,157],"machine":[102,138],"learning":[103,139],"fundamentals,":[104],"we":[105,127],"will":[106,128],"explain":[107,129],"different":[108],"methodologies":[109],"determine":[111],"whether":[112],"transactions":[113],"are":[114],"malicious":[115],"or":[116],"not":[117],"based":[118],"on":[119],"given":[121],"address.":[123],"paper,":[126],"further":[134],"insights":[135],"into":[136],"concepts":[140],"behind":[141],"issue":[143],"through":[144],"various":[145],"models":[146],"such":[147],"Adaptive":[149],"Boosting":[150],"(AdaBoost),":[151],"Gradient":[152],"Boosting,":[153],"K-Nearest":[154],"Neighbor":[155],"(KNN),":[156],"Random":[158],"Forest.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
