{"id":"https://openalex.org/W4283746445","doi":"https://doi.org/10.1142/s0218001422510107","title":"Crow Search with Adaptive Awareness Probability-Based Deep Belief Network for Detecting Ransomware","display_name":"Crow Search with Adaptive Awareness Probability-Based Deep Belief Network for Detecting Ransomware","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4283746445","doi":"https://doi.org/10.1142/s0218001422510107"},"language":"en","primary_location":{"id":"doi:10.1142/s0218001422510107","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218001422510107","pdf_url":null,"source":{"id":"https://openalex.org/S41486457","display_name":"International Journal of Pattern Recognition and Artificial Intelligence","issn_l":"0218-0014","issn":["0218-0014","1793-6381"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pattern Recognition and Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050499909","display_name":"P A Shemitha","orcid":null},"institutions":[{"id":"https://openalex.org/I96797292","display_name":"Noorul Islam University","ror":"https://ror.org/01y2gf490","country_code":"IN","type":"education","lineage":["https://openalex.org/I96797292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shemitha P A","raw_affiliation_strings":["Department of Computer Science & Engineering, Noorul Islam center for higher education, Kumaracoil, Tamilnadu 629180, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, Noorul Islam center for higher education, Kumaracoil, Tamilnadu 629180, India","institution_ids":["https://openalex.org/I96797292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059161846","display_name":"Julia Punitha Malar Dhas","orcid":"https://orcid.org/0000-0001-5563-8077"},"institutions":[{"id":"https://openalex.org/I119668213","display_name":"Karunya University","ror":"https://ror.org/03k23nv15","country_code":"IN","type":"education","lineage":["https://openalex.org/I119668213"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Julia Punitha Malar Dhas","raw_affiliation_strings":["Department of Computer Science & Engineering, Karunya Institute of Technology and Sciences, Coimbatore, Tamilnadu 641114, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, Karunya Institute of Technology and Sciences, Coimbatore, Tamilnadu 641114, India","institution_ids":["https://openalex.org/I119668213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050499909"],"corresponding_institution_ids":["https://openalex.org/I96797292"],"apc_list":null,"apc_paid":null,"fwci":0.5944,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63180516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"36","issue":"11","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8128699064254761},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.7945858240127563},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6935420632362366},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6154400110244751},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5407557487487793},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.5394694209098816},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4539692997932434},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45146819949150085},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4380418062210083},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.43664973974227905},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43531373143196106},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43032175302505493},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.41296449303627014},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18824630975723267},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07348743081092834}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8128699064254761},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.7945858240127563},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6935420632362366},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6154400110244751},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5407557487487793},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.5394694209098816},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4539692997932434},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45146819949150085},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4380418062210083},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.43664973974227905},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43531373143196106},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43032175302505493},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.41296449303627014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18824630975723267},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07348743081092834},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218001422510107","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218001422510107","pdf_url":null,"source":{"id":"https://openalex.org/S41486457","display_name":"International Journal of Pattern Recognition and Artificial Intelligence","issn_l":"0218-0014","issn":["0218-0014","1793-6381"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pattern Recognition and Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W883434633","https://openalex.org/W961868200","https://openalex.org/W1988566638","https://openalex.org/W2042407751","https://openalex.org/W2121571815","https://openalex.org/W2306115793","https://openalex.org/W2327031957","https://openalex.org/W2511683089","https://openalex.org/W2511701350","https://openalex.org/W2546350184","https://openalex.org/W2558619741","https://openalex.org/W2596144082","https://openalex.org/W2756675797","https://openalex.org/W2779814706","https://openalex.org/W2784028699","https://openalex.org/W2788496860","https://openalex.org/W2790624550","https://openalex.org/W2792599578","https://openalex.org/W2884348845","https://openalex.org/W2887944710","https://openalex.org/W2889893970","https://openalex.org/W2891844510","https://openalex.org/W2893176864","https://openalex.org/W2895214484","https://openalex.org/W2895219758","https://openalex.org/W2895401392","https://openalex.org/W2898841117","https://openalex.org/W2902458612","https://openalex.org/W2904792378","https://openalex.org/W2911626912","https://openalex.org/W3027333051","https://openalex.org/W3032179786","https://openalex.org/W3047793319"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4253977752","https://openalex.org/W2964829536","https://openalex.org/W3120595989","https://openalex.org/W4232561318","https://openalex.org/W2904586340","https://openalex.org/W3214090987","https://openalex.org/W4311251602"],"abstract_inverted_index":{"\u201cCrypto":[0],"ransomware":[1,40],"is":[2,41,94,107,111,122,143,171],"defined":[3],"as":[4,113],"malware":[5],"that":[6],"blocks":[7],"the":[8,23,34,37,45,48,54,75,82,86,95,102,114,119,125,134,147,150,168,175,178],"user":[9],"file\u2019s":[10],"access":[11],"by":[12],"encrypting":[13],"them":[14,17],"and":[15,50,71],"demands":[16],"with":[18,161],"a":[19,157],"ransom":[20],"for":[21,43,52,124,139,146],"obtaining":[22],"decryption":[24],"key\u201d.":[25],"This":[26],"causes":[27],"some":[28],"major":[29,87],"threats":[30],"in":[31,56,89],"many":[32],"of":[33,39,47,97,104,128,149,177],"companies.":[35],"Therefore,":[36],"detection":[38],"needful":[42],"reducing":[44],"workloads":[46],"analysts":[49],"also":[51],"finding":[53],"variations":[55],"unknown":[57],"samples.":[58],"The":[59],"adopted":[60],"scheme":[61],"encompasses":[62],"3":[63],"phases:":[64],"(i)":[65],"feature":[66,69],"extraction,":[67],"(ii)":[68],"selection":[70,103,127,148],"(iii)":[72],"classification.":[73],"Initially,":[74],"sequential":[76,92,131,152],"frequent":[77],"patterns":[78,136],"are":[79,137],"extracted":[80,91,130],"using":[81],"apriori":[83],"framework.":[84],"However,":[85],"challenge":[88],"this":[90,154],"pattern":[93],"curse":[96],"dimensionality.":[98],"To":[99],"overcome":[100],"this,":[101,118],"optimal":[105,126,135,151],"features":[106],"very":[108],"important,":[109],"which":[110],"done":[112],"second":[115],"stage.":[116],"In":[117,167],"optimization":[120],"concept":[121],"evolved":[123],"these":[129],"patterns.":[132],"Furthermore,":[133],"given":[138],"classification,":[140],"where":[141],"DBN":[142],"deployed.":[144],"Particularly,":[145],"pattern,":[153],"work":[155],"proposes":[156],"new":[158],"crow":[159],"search":[160],"adaptive":[162],"awareness":[163],"probability":[164],"(CS-AAP)":[165],"model.":[166],"end,":[169],"analysis":[170],"performed":[172],"to":[173],"authorize":[174],"supremacy":[176],"developed":[179],"scheme.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
