Ransomware triage using deep learning: twitter as a case study. Vinayakumar, R, Alazab, M., Jolfaei, A., Soman, K., & Poornachandran, P. In 2019 Cybersecurity and Cyberforensics Conference (CCC), pages 67-73, 2019. IEEE. bibtex @inproceedings{vinayakumar2019ransomware,
title={Ransomware triage using deep learning: twitter as a case study},
author={Vinayakumar, R and Alazab, Mamoun and Jolfaei, Alireza and Soman, KP and Poornachandran, Prabaharan},
booktitle={2019 Cybersecurity and Cyberforensics Conference (CCC)},
pages={67-73},
year={2019},
organization={IEEE}
}
Downloads: 0
{"_id":"sp37AWboEaXyKYs2C","bibbaseid":"vinayakumar-alazab-jolfaei-soman-poornachandran-ransomwaretriageusingdeeplearningtwitterasacasestudy-2019","authorIDs":["2nXR5wDZNvfDuqRgx","5K5hy7muX4mE3nTm5","5e368651f0f9c4de01000086","5e36e831b26a0fde01000084","5e375152e25d29de0100002c","5e37940f0aa992de01000063","5e37b7cee84c4cf201000103","5e3933c69d05f2df0100005d","5e3a2c59237cdede01000036","5e3d12e97cb23fde0100009b","5e40b8b5019547df010000da","5e4110d3f47523de010000f1","5e4e9fc564b624de0100006a","5e4f0312338acfde01000150","5e56ee4fa8dabede01000451","5e63aeb65e3c57de01000140","5e64de5a0b8008df01000091","637tdhYomssgLFTYb","7KJGyrfGiyNHnchBG","7rZan6iRE79Rn233P","8ArsGXXJPwh4nXmvh","9X48anwxGrtC3EoRN","9c8fxrtEXehAxWS6Z","A9nugaMaMYWTktQqs","DuMsmDsoHEiHZ9xNy","Eg5umPxeGQ2k2zok5","H3Hjx6x7Shv6PceWt","HoG3rwt7Cdy3gfayR","JNuvXfiWw5e6qRBx7","JdaDgJyZr5CweqKTE","Jmbu4rh4iQ7EzSHHB","Knq8fWgZhQmSXm3QG","Kp5K6zZp8igZWsKWE","M4eG8R33cdkrhn6bL","NtZJ8btLrsyDAPdeG","P2gyWqCt6dDWNTPSg","P4Eno9eHedAdtAaRv","XAbCW2oC3A5XD3JXp","YSe46GxQ2LNP3xACY","aMxuwSTwcCNrBMtff","b5QACZC8PSAJn4fTH","bDJQBedY4PdtLFMcP","f4bngExqDuPyGdPcE","hbnd76Zgn2ERCHdqm","isTTWWkFKvquodcdi","jF2jqLpWY7ipH4MnE","jizAgY7njFt4Pu8MC","ku3zLR6XX5F783HPv","mCLsymF7oHt3LRQQE","odDrHWJugrXaXBDbP","p9smRQ3xph5qFKfB9","umBt46tzLhy9zXWkv","uuKNDkTy4mwbp56DD","v6G6uKFgfhj5Fjr3D","vZtJBXukuKcfuS43B","vvyZv2FAiKaHbabCG","wXecPAJLSvFfvHhPh","wYZ5YFwe8aC6kHmNu","xCATC8gfgXMtrxqbu","xR2RPDxwzmTxZxndJ"],"author_short":["Vinayakumar, R","Alazab, M.","Jolfaei, A.","Soman, K.","Poornachandran, P."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Ransomware triage using deep learning: twitter as a case study","author":[{"propositions":[],"lastnames":["Vinayakumar"],"firstnames":["R"],"suffixes":[]},{"propositions":[],"lastnames":["Alazab"],"firstnames":["Mamoun"],"suffixes":[]},{"propositions":[],"lastnames":["Jolfaei"],"firstnames":["Alireza"],"suffixes":[]},{"propositions":[],"lastnames":["Soman"],"firstnames":["KP"],"suffixes":[]},{"propositions":[],"lastnames":["Poornachandran"],"firstnames":["Prabaharan"],"suffixes":[]}],"booktitle":"2019 Cybersecurity and Cyberforensics Conference (CCC)","pages":"67-73","year":"2019","organization":"IEEE","bibtex":"@inproceedings{vinayakumar2019ransomware,\n title={Ransomware triage using deep learning: twitter as a case study},\n author={Vinayakumar, R and Alazab, Mamoun and Jolfaei, Alireza and Soman, KP and Poornachandran, Prabaharan},\n booktitle={2019 Cybersecurity and Cyberforensics Conference (CCC)},\n pages={67-73},\n year={2019},\n organization={IEEE}\n}\n\n","author_short":["Vinayakumar, R","Alazab, M.","Jolfaei, A.","Soman, K.","Poornachandran, P."],"key":"vinayakumar2019ransomware","id":"vinayakumar2019ransomware","bibbaseid":"vinayakumar-alazab-jolfaei-soman-poornachandran-ransomwaretriageusingdeeplearningtwitterasacasestudy-2019","role":"author","urls":{},"metadata":{"authorlinks":{"jolfaei, a":"https://bibbase.org/show?bib=jolfaei.info%2Fpub.bib"}},"downloads":0},"bibtype":"inproceedings","biburl":"https://jolfaei.info/pub.bib","creationDate":"2020-01-21T11:44:14.318Z","downloads":0,"keywords":[],"search_terms":["ransomware","triage","using","deep","learning","twitter","case","study","vinayakumar","alazab","jolfaei","soman","poornachandran"],"title":"Ransomware triage using deep learning: twitter as a case study","year":2019,"dataSources":["YHrhASpJsFsNdJpd8","5YWvWPheEotDSpB7L","GKDGf5EvzCjx9wg6A"]}