{"id":"https://openalex.org/W3046149163","doi":"https://doi.org/10.1109/access.2020.3012674","title":"A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction","display_name":"A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3046149163","doi":"https://doi.org/10.1109/access.2020.3012674","mag":"3046149163"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3012674","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3012674","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09151929.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09151929.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013398556","display_name":"Bander Ali Saleh Al\u2010rimy","orcid":"https://orcid.org/0000-0003-3048-5961"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bander Ali Saleh Al-Rimy","raw_affiliation_strings":["Faculty of Business and Technology, Unitar International University, Petaling Jaya, Malaysia"],"raw_orcid":"https://orcid.org/0000-0003-3048-5961","affiliations":[{"raw_affiliation_string":"Faculty of Business and Technology, Unitar International University, Petaling Jaya, Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084617987","display_name":"Mohd A. Maarof","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Aiziani Maarof","raw_affiliation_strings":["School of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018409592","display_name":"Mamoun Alazab","orcid":"https://orcid.org/0000-0002-1928-3704"},"institutions":[{"id":"https://openalex.org/I29894533","display_name":"Charles Darwin University","ror":"https://ror.org/048zcaj52","country_code":"AU","type":"education","lineage":["https://openalex.org/I29894533"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mamoun Alazab","raw_affiliation_strings":["College of Engineering, IT, and Environment, Charles Darwin University, Casuarina, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Engineering, IT, and Environment, Charles Darwin University, Casuarina, Australia","institution_ids":["https://openalex.org/I29894533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062000051","display_name":"Fawaz Alsolami","orcid":"https://orcid.org/0000-0002-0396-1347"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Fawaz Alsolami","raw_affiliation_strings":["Faculty of Computing and Information Technology, King Abdulaziz University (KAU), Jeddah, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Information Technology, King Abdulaziz University (KAU), Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050602115","display_name":"Syed Zainudeen Mohd Shaid","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Syed Zainudeen Mohd Shaid","raw_affiliation_strings":["School of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043834125","display_name":"Fuad A. Ghaleb","orcid":"https://orcid.org/0000-0002-1468-0655"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Fuad A. Ghaleb","raw_affiliation_strings":["School of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Malaysia"],"raw_orcid":"https://orcid.org/0000-0002-1468-0655","affiliations":[{"raw_affiliation_string":"School of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064284704","display_name":"Tawfik Al-Hadhrami","orcid":"https://orcid.org/0000-0001-7441-604X"},"institutions":[{"id":"https://openalex.org/I52590639","display_name":"Nottingham Trent University","ror":"https://ror.org/04xyxjd90","country_code":"GB","type":"education","lineage":["https://openalex.org/I52590639"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tawfik Al-Hadhrami","raw_affiliation_strings":["School of Science and Technology, Nottingham Trent University, Nottingham, U.K"],"raw_orcid":"https://orcid.org/0000-0001-7441-604X","affiliations":[{"raw_affiliation_string":"School of Science and Technology, Nottingham Trent University, Nottingham, U.K","institution_ids":["https://openalex.org/I52590639"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087787854","display_name":"Abdullah Ali","orcid":"https://orcid.org/0000-0001-6676-7456"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdullah Marish Ali","raw_affiliation_strings":["Faculty of Computing and Information Technology, King Abdulaziz University (KAU), Jeddah, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-6676-7456","affiliations":[{"raw_affiliation_string":"Faculty of Computing and Information Technology, King Abdulaziz University (KAU), Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5013398556"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.9888,"has_fulltext":true,"cited_by_count":70,"citation_normalized_percentile":{"value":0.97870812,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"140586","last_page":"140598"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8497740626335144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7711386680603027},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6324138641357422},{"id":"https://openalex.org/keywords/tf\u2013idf","display_name":"tf\u2013idf","score":0.5375810265541077},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44336411356925964},{"id":"https://openalex.org/keywords/extraction","display_name":"Extraction (chemistry)","score":0.44194769859313965},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.41633516550064087},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32909393310546875},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2947150468826294},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.21439799666404724},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20202839374542236},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1814233362674713}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8497740626335144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7711386680603027},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6324138641357422},{"id":"https://openalex.org/C81758059","wikidata":"https://www.wikidata.org/wiki/Q796584","display_name":"tf\u2013idf","level":3,"score":0.5375810265541077},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44336411356925964},{"id":"https://openalex.org/C4725764","wikidata":"https://www.wikidata.org/wiki/Q844704","display_name":"Extraction (chemistry)","level":2,"score":0.44194769859313965},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.41633516550064087},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32909393310546875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2947150468826294},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.21439799666404724},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20202839374542236},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1814233362674713},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.3012674","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3012674","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09151929.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:irep.ntu.ac.uk:40499","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400559","display_name":"Nottingham Trent University's Institutional Repository (Nottingham Trent Repository)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I52590639","host_organization_name":"Nottingham Trent University","host_organization_lineage":["https://openalex.org/I52590639"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:doaj.org/article:8afdf01bc84d4d60aa6ddcb7e1f77087","is_oa":true,"landing_page_url":"https://doaj.org/article/8afdf01bc84d4d60aa6ddcb7e1f77087","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 140586-140598 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3012674","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3012674","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09151929.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4714249715","display_name":null,"funder_award_id":"DF-742-611-1441","funder_id":"https://openalex.org/F4320322322","funder_display_name":"King Abdulaziz University"}],"funders":[{"id":"https://openalex.org/F4320322322","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3046149163.pdf","grobid_xml":"https://content.openalex.org/works/W3046149163.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W1493503294","https://openalex.org/W1994740897","https://openalex.org/W2000672666","https://openalex.org/W2072386950","https://openalex.org/W2083183119","https://openalex.org/W2095610590","https://openalex.org/W2191468669","https://openalex.org/W2295755339","https://openalex.org/W2367504390","https://openalex.org/W2461373307","https://openalex.org/W2513529237","https://openalex.org/W2544488729","https://openalex.org/W2552218842","https://openalex.org/W2558619741","https://openalex.org/W2592102543","https://openalex.org/W2594561196","https://openalex.org/W2602517145","https://openalex.org/W2745390745","https://openalex.org/W2747715470","https://openalex.org/W2750688159","https://openalex.org/W2756675797","https://openalex.org/W2766662076","https://openalex.org/W2774791171","https://openalex.org/W2775582065","https://openalex.org/W2780577826","https://openalex.org/W2784113120","https://openalex.org/W2789539798","https://openalex.org/W2789729245","https://openalex.org/W2792599578","https://openalex.org/W2793829161","https://openalex.org/W2794890550","https://openalex.org/W2800557391","https://openalex.org/W2807312247","https://openalex.org/W2809150229","https://openalex.org/W2883822334","https://openalex.org/W2885096636","https://openalex.org/W2885652007","https://openalex.org/W2885747980","https://openalex.org/W2887506070","https://openalex.org/W2887670066","https://openalex.org/W2890196927","https://openalex.org/W2891842027","https://openalex.org/W2892249614","https://openalex.org/W2893176864","https://openalex.org/W2895214484","https://openalex.org/W2902302694","https://openalex.org/W2953056235","https://openalex.org/W2963563709","https://openalex.org/W2963961561","https://openalex.org/W3004549544","https://openalex.org/W3006334803","https://openalex.org/W3122507336","https://openalex.org/W4237332204","https://openalex.org/W4293742266","https://openalex.org/W6650729164","https://openalex.org/W6668562040","https://openalex.org/W6697196120","https://openalex.org/W6729193369","https://openalex.org/W6729572983","https://openalex.org/W6735455086","https://openalex.org/W6746315589","https://openalex.org/W6754685718","https://openalex.org/W6817563333"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794","https://openalex.org/W2964829536","https://openalex.org/W2904586340","https://openalex.org/W3120595989"],"abstract_inverted_index":{"The":[0,236,253],"cryptography":[1],"employed":[2,96,187],"against":[3],"user":[4],"files":[5],"makes":[6],"the":[7,28,47,52,62,65,78,81,93,98,114,120,124,128,140,143,148,167,170,175,184,189,194,203,223,230,239,246,250,263,268],"effect":[8],"of":[9,116,123,130,142,169,206,233,241,249],"crypto-ransomware":[10,35,89,234],"attacks":[11,21],"irreversible":[12],"even":[13],"after":[14],"detection":[15,37,136,149],"and":[16,105,160,179,266],"removal.":[17],"Thus,":[18],"detecting":[19],"such":[20],"early,":[22],"i.e.":[23],"during":[24,229,245],"pre-encryption":[25,48,171,195,231,264],"phase":[26,49,196,232,273],"before":[27],"encryption":[29,63],"takes":[30],"place":[31],"is":[32],"necessary.":[33],"Existing":[34],"early":[36,121,135,247],"solutions":[38],"use":[39],"a":[40,155],"fixed":[41,53,185],"time-based":[42],"thresholding":[43,55,186],"approach":[44,56],"to":[45,84,92,100,138,221,261,271,277],"determine":[46,262],"boundaries.":[50],"However,":[51],"time":[54,79],"implies":[57],"that":[58,165,257],"all":[59,75],"samples":[60,76],"start":[61,85],"at":[64,119],"same":[66],"time.":[67],"Such":[68],"assumption":[69],"does":[70],"not":[71],"necessarily":[72],"hold":[73],"for":[74,80,197],"as":[77],"main":[82],"sabotage":[83],"varies":[86],"among":[87],"different":[88,110],"families":[90],"due":[91],"obfuscation":[94],"techniques":[95,133],"by":[97,188],"malware":[99],"change":[101],"its":[102],"attack":[103,111,125,243,251],"strategies":[104],"evade":[106],"detection,":[107],"which":[108,174],"generates":[109],"behaviors.":[112],"Additionally,":[113],"lack":[115],"sufficient":[117],"data":[118,227],"phases":[122,248],"adversely":[126],"affects":[127],"ability":[129],"feature":[131],"extraction":[132],"in":[134],"models":[137],"perceive":[139],"characteristics":[141],"attacks,":[144],"which,":[145],"consequently,":[146],"decreases":[147],"accuracy.":[150],"Therefore,":[151],"this":[152,272],"paper":[153],"proposes":[154],"Dynamic":[156],"Pre-encryption":[157],"Boundary":[158],"Delineation":[159],"Feature":[161],"Extraction":[162],"(DPBD-FE)":[163],"scheme":[164],"determines":[166],"boundary":[168],"phase,":[172],"from":[173,225],"features":[176,224,269],"are":[177],"extracted":[178],"selected":[180],"more":[181,274],"accurately.":[182],"Unlike":[183],"extant":[190],"works,":[191],"DPBD-FE":[192,258],"tracks":[193],"each":[198],"instance":[199],"individually":[200],"based":[201],"on":[202],"first":[204],"occurrence":[205],"any":[207],"cryptography-related":[208],"APIs.":[209],"Then,":[210],"an":[211],"annotated":[212],"Term":[213],"Frequency-Inverse":[214],"Document":[215],"Frequency":[216],"(aTF-IDF)":[217],"technique":[218],"was":[219,259],"utilized":[220],"extract":[222,267],"runtime":[226],"generated":[228],"attacks.":[235],"aTF-IDF":[237],"overcomes":[238],"challenge":[240],"insufficient":[242],"patterns":[244],"lifecycle.":[252],"experimental":[254],"evaluation":[255],"shows":[256],"able":[260],"boundaries":[265],"related":[270,278],"accurately":[275],"compared":[276],"works.":[279]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":24},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
