A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction

  • Bander Ali Saleh Al-Rimy*
  • , Mohd Aiziani Maarof
  • , Mamoun Alazab*
  • , Fawaz Alsolami
  • , Syed Zainudeen Mohd Shaid
  • , Fuad A. Ghaleb*
  • , Tawfik Al-Hadhrami
  • , Abdullah Marish Ali
  • *Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    63 Citations (SciVal)
    Original languageEnglish
    Article number9151929
    Pages (from-to)140586-140598
    Number of pages13
    JournalIEEE Access
    Volume8
    DOIs
    Publication statusPublished (VoR) - 2020

    Keywords

    • Cybersecurity
    • early detection
    • malware
    • ransomware
    • TF-IDF

    Cite this