{"id":"https://openalex.org/W4317796364","doi":"https://doi.org/10.1155/2023/6274260","title":"Machine Learning-Based Ransomware Classification of Bitcoin Transactions","display_name":"Machine Learning-Based Ransomware Classification of Bitcoin Transactions","publication_year":2023,"publication_date":"2023-01-23","ids":{"openalex":"https://openalex.org/W4317796364","doi":"https://doi.org/10.1155/2023/6274260"},"language":"en","primary_location":{"id":"doi:10.1155/2023/6274260","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/6274260","pdf_url":"https://downloads.hindawi.com/journals/acisc/2023/6274260.pdf","source":{"id":"https://openalex.org/S30680879","display_name":"Applied Computational Intelligence and Soft Computing","issn_l":"1687-9724","issn":["1687-9724","1687-9732"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computational Intelligence and Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/acisc/2023/6274260.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043749261","display_name":"Suleiman Ali Alsaif","orcid":"https://orcid.org/0000-0003-4699-6432"},"institutions":[{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Suleiman Ali Alsaif","raw_affiliation_strings":["Computer Department, Deanship of Preparatory Year and Supporting Studies, Imam Abdulrahman Bin Faisal University, Dammam 31441, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-4699-6432","affiliations":[{"raw_affiliation_string":"Computer Department, Deanship of Preparatory Year and Supporting Studies, Imam Abdulrahman Bin Faisal University, Dammam 31441, Saudi Arabia","institution_ids":["https://openalex.org/I76571253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5043749261"],"corresponding_institution_ids":["https://openalex.org/I76571253"],"apc_list":{"value":900,"currency":"USD","value_usd":900},"apc_paid":{"value":900,"currency":"USD","value_usd":900},"fwci":7.1085,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96919538,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2023","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9313404560089111},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8267449736595154},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.645510196685791},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5349892973899841},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5228003263473511},{"id":"https://openalex.org/keywords/confusion-matrix","display_name":"Confusion matrix","score":0.5221574306488037},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5116674900054932},{"id":"https://openalex.org/keywords/gradient-boosting","display_name":"Gradient boosting","score":0.45757150650024414},{"id":"https://openalex.org/keywords/confusion","display_name":"Confusion","score":0.4285967946052551},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.42085063457489014},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.418782114982605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40722912549972534},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.12117215991020203},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07401686906814575}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9313404560089111},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8267449736595154},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.645510196685791},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5349892973899841},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5228003263473511},{"id":"https://openalex.org/C138602881","wikidata":"https://www.wikidata.org/wiki/Q2709591","display_name":"Confusion matrix","level":2,"score":0.5221574306488037},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5116674900054932},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.45757150650024414},{"id":"https://openalex.org/C2781140086","wikidata":"https://www.wikidata.org/wiki/Q557945","display_name":"Confusion","level":2,"score":0.4285967946052551},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.42085063457489014},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.418782114982605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40722912549972534},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.12117215991020203},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07401686906814575},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2023/6274260","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/6274260","pdf_url":"https://downloads.hindawi.com/journals/acisc/2023/6274260.pdf","source":{"id":"https://openalex.org/S30680879","display_name":"Applied Computational Intelligence and Soft Computing","issn_l":"1687-9724","issn":["1687-9724","1687-9732"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computational Intelligence and Soft Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a6be881935604ca69976b22bff367fad","is_oa":true,"landing_page_url":"https://doaj.org/article/a6be881935604ca69976b22bff367fad","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Applied Computational Intelligence and Soft Computing, Vol 2023 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2023/6274260","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/6274260","pdf_url":"https://downloads.hindawi.com/journals/acisc/2023/6274260.pdf","source":{"id":"https://openalex.org/S30680879","display_name":"Applied Computational Intelligence and Soft Computing","issn_l":"1687-9724","issn":["1687-9724","1687-9732"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computational Intelligence and Soft Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4317796364.pdf"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1454642304","https://openalex.org/W1930907635","https://openalex.org/W1981976602","https://openalex.org/W2072266282","https://openalex.org/W2101234009","https://openalex.org/W2118978333","https://openalex.org/W2295598076","https://openalex.org/W2303253355","https://openalex.org/W2335755599","https://openalex.org/W2414847921","https://openalex.org/W2740773989","https://openalex.org/W2787166691","https://openalex.org/W2794784953","https://openalex.org/W2800509541","https://openalex.org/W2911964244","https://openalex.org/W2949281759","https://openalex.org/W2952066300","https://openalex.org/W2963604227","https://openalex.org/W2988809393","https://openalex.org/W2995098893","https://openalex.org/W2995179710","https://openalex.org/W3005676508","https://openalex.org/W3029018358","https://openalex.org/W3070581385","https://openalex.org/W3115781961","https://openalex.org/W3159006041","https://openalex.org/W3175794737","https://openalex.org/W3177260159","https://openalex.org/W3204881560","https://openalex.org/W3213259568","https://openalex.org/W4205884137","https://openalex.org/W4214726431","https://openalex.org/W4309215243","https://openalex.org/W4311051464","https://openalex.org/W4313001182","https://openalex.org/W6628351948","https://openalex.org/W6750045448","https://openalex.org/W6910681941"],"related_works":["https://openalex.org/W4285067014","https://openalex.org/W3214090987","https://openalex.org/W4386690025","https://openalex.org/W3208169454","https://openalex.org/W4322710485","https://openalex.org/W4315777889","https://openalex.org/W3008856725","https://openalex.org/W3157478749","https://openalex.org/W3201348321","https://openalex.org/W4205685985"],"abstract_inverted_index":{"Ransomware":[0],"attacks":[1],"are":[2],"one":[3],"of":[4,18,24,69,109,138],"the":[5,11,16,20,77,103,127,132,143],"most":[6],"dangerous":[7],"related":[8],"crimes":[9],"in":[10,80,107,159],"coin":[12],"market.":[13],"To":[14],"increase":[15],"challenge":[17],"fighting":[19],"attack,":[21],"early":[22],"detection":[23],"ransomware":[25,53,105,157],"seems":[26],"necessary.":[27],"In":[28],"this":[29],"article,":[30],"we":[31],"propose":[32],"a":[33,141],"high-performance":[34],"Bitcoin":[35,41,81,160],"transaction":[36],"predictive":[37,100],"system":[38],"that":[39,48,126],"investigates":[40],"payment":[42,82],"transactions":[43],"to":[44,75,155],"learn":[45,76],"data":[46],"patterns":[47,79],"can":[49],"recognize":[50],"and":[51,91,112,121],"classify":[52],"payments":[54,158],"for":[55],"heterogeneous":[56],"bitcoin":[57],"networks":[58],"into":[59],"malicious":[60],"or":[61],"benign":[62],"transactions.":[63,161],"The":[64],"proposed":[65],"approach":[66],"makes":[67],"use":[68],"three":[70],"supervised":[71],"machine":[72],"learning":[73],"methods":[74],"distinctive":[78],"transactions,":[83],"namely,":[84],"logistic":[85],"regression":[86],"(LR),":[87],"random":[88],"forest":[89],"(RF),":[90],"Extreme":[92],"Gradient":[93],"Boosting":[94],"(XGBoost).":[95],"We":[96],"evaluate":[97],"these":[98],"ML-based":[99],"models":[101,153],"on":[102],"BitcoinHeist":[104],"dataset":[106],"terms":[108],"classification":[110],"accuracy":[111,137,146],"other":[113],"evaluation":[114],"measures":[115],"such":[116],"as":[117],"confusion":[118],"matrix,":[119],"recall,":[120],"F1-score.":[122],"It":[123],"turned":[124],"out":[125],"experimental":[128],"results":[129],"recorded":[130],"by":[131],"XGBoost":[133],"model":[134,145],"achieved":[135],"an":[136],"99.08%.":[139],"As":[140],"result,":[142],"resulting":[144],"is":[147],"higher":[148],"than":[149],"many":[150],"recent":[151],"state-of-the-art":[152],"developed":[154],"detect":[156]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
