A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction

Bander Ali Saleh Al-Rimy*, Mohd Aiziani Maarof, Mamoun Alazab*, Fawaz Alsolami, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb*, Tawfik Al-Hadhrami, Abdullah Marish Ali

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    43 Citations (SciVal)
    Original languageEnglish
    Article number9151929
    Pages (from-to)140586-140598
    Number of pages13
    JournalIEEE Access
    Volume8
    DOIs
    Publication statusPublished (VoR) - 2020

    Keywords

    • Cybersecurity
    • early detection
    • malware
    • ransomware
    • TF-IDF

    Fingerprint

    Dive into the research topics of 'A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction'. Together they form a unique fingerprint.

    Cite this