ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.01957
  4. Cited By
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat
  Hunting and Intelligence

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence

6 August 2018
Sajad Homayoun
Ali Dehghantanha
Marzieh Ahmadzadeh
S. Hashemi
R. Khayami
ArXiv (abs)PDFHTML

Papers citing "Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence"

10 / 10 papers shown
Title
Traffic Prediction using Artificial Intelligence: Review of Recent
  Advances and Emerging Opportunities
Traffic Prediction using Artificial Intelligence: Review of Recent Advances and Emerging Opportunities
Maryam Shaygan
Collin Meese
Wanxin Li
Xiaoliang (George) Zhao
Mark M. Nejad
108
123
0
31 May 2023
Majority Voting Approach to Ransomware Detection
Majority Voting Approach to Ransomware Detection
Simon R. Davies
Richard Macfarlane
William J. Buchanan
36
0
0
30 May 2023
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber
  Threat Hunting
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting
Renzheng Wei
Lijun Cai
Aimin Yu
Dan Meng
60
33
0
20 Apr 2021
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
Harun Oz
Ahmet Aris
A. Levi
A. S. Uluagac
73
197
0
11 Feb 2021
Automated Ransomware Behavior Analysis: Pattern Extraction and Early
  Detection
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection
Qian Chen
Sheikh Rabiul Islam
Henry Haswell
Robert A. Bridges
AAML
41
25
0
15 Oct 2019
A Blockchain-based Framework for Detecting Malicious Mobile Applications
  in App Stores
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores
Sajad Homayoun
Ali Dehghantanha
R. Parizi
Kim-Kwang Raymond Choo
41
39
0
12 Jun 2019
Leveraging Support Vector Machine for Opcode Density Based Detection of
  Crypto-Ransomware
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware
James Baldwin
Ali Dehghantanha
42
48
0
27 Jul 2018
Leveraging Machine Learning Techniques for Windows Ransomware Network
  Traffic Detection
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection
O. Alhawi
James Baldwin
Ali Dehghantanha
44
138
0
27 Jul 2018
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis
  and Enhancement Using Case-Control Studies
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies
Milda Petraityte
Ali Dehghantanha
Gregory Epiphaniou
39
13
0
27 Jul 2018
Redundancy Coefficient Gradual Up-weighting-based Mutual Information
  Feature Selection Technique for Crypto-ransomware Early Detection
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection
B. Al-rimy
M. A. Maarof
Syed Zainudeen Mohd Shaid
13
46
0
22 Jul 2018
1