id sid tid token lemma pos work_ayatblpinzaztdzhilw6yqsi6m 1 1 On on IN work_ayatblpinzaztdzhilw6yqsi6m 1 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 1 3 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 1 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 5 Microsoft Microsoft NNP work_ayatblpinzaztdzhilw6yqsi6m 1 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 1 7 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 1 8 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 1 9 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 1 10 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 1 11 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 1 12 On on IN work_ayatblpinzaztdzhilw6yqsi6m 1 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 1 14 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 1 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 16 Microsoft Microsoft NNP work_ayatblpinzaztdzhilw6yqsi6m 1 17 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 1 18 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 1 19 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 1 20 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 1 21 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 1 22 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 1 23 Sana Sana NNP work_ayatblpinzaztdzhilw6yqsi6m 1 24 Aurangzeb1 Aurangzeb1 NNP work_ayatblpinzaztdzhilw6yqsi6m 1 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 26 * * NFP work_ayatblpinzaztdzhilw6yqsi6m 1 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 28 Rao Rao NNP work_ayatblpinzaztdzhilw6yqsi6m 1 29 Naveed Naveed NNP work_ayatblpinzaztdzhilw6yqsi6m 1 30 Bin Bin NNP work_ayatblpinzaztdzhilw6yqsi6m 1 31 Rais2 Rais2 NNS work_ayatblpinzaztdzhilw6yqsi6m 1 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 33 * * NFP work_ayatblpinzaztdzhilw6yqsi6m 1 34 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 35 Muhammad Muhammad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 36 Aleem3 Aleem3 NNP work_ayatblpinzaztdzhilw6yqsi6m 1 37 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 38 Muhammad Muhammad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 39 Arshad Arshad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 40 Islam3 Islam3 NNP work_ayatblpinzaztdzhilw6yqsi6m 1 41 and and CC work_ayatblpinzaztdzhilw6yqsi6m 1 42 Muhammad Muhammad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 43 Azhar Azhar NNP work_ayatblpinzaztdzhilw6yqsi6m 1 44 Iqbal4 Iqbal4 NNP work_ayatblpinzaztdzhilw6yqsi6m 1 45 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 1 46 Department Department NNP work_ayatblpinzaztdzhilw6yqsi6m 1 47 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 48 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 1 49 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 1 50 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 51 National National NNP work_ayatblpinzaztdzhilw6yqsi6m 1 52 University University NNP work_ayatblpinzaztdzhilw6yqsi6m 1 53 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 54 Modern Modern NNP work_ayatblpinzaztdzhilw6yqsi6m 1 55 Languages Languages NNPS work_ayatblpinzaztdzhilw6yqsi6m 1 56 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 57 Islamabad Islamabad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 58 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 59 Islamabad Islamabad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 60 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 61 ICT ICT NNP work_ayatblpinzaztdzhilw6yqsi6m 1 62 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 63 Pakistan Pakistan NNP work_ayatblpinzaztdzhilw6yqsi6m 1 64 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 1 65 College College NNP work_ayatblpinzaztdzhilw6yqsi6m 1 66 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 67 Engineering Engineering NNP work_ayatblpinzaztdzhilw6yqsi6m 1 68 and and CC work_ayatblpinzaztdzhilw6yqsi6m 1 69 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 1 70 Technology Technology NNP work_ayatblpinzaztdzhilw6yqsi6m 1 71 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 72 Ajman Ajman NNP work_ayatblpinzaztdzhilw6yqsi6m 1 73 University University NNP work_ayatblpinzaztdzhilw6yqsi6m 1 74 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 75 Ajman Ajman NNP work_ayatblpinzaztdzhilw6yqsi6m 1 76 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 77 United United NNP work_ayatblpinzaztdzhilw6yqsi6m 1 78 Arab Arab NNP work_ayatblpinzaztdzhilw6yqsi6m 1 79 Emirates Emirates NNP work_ayatblpinzaztdzhilw6yqsi6m 1 80 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 1 81 Department Department NNP work_ayatblpinzaztdzhilw6yqsi6m 1 82 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 83 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 1 84 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 1 85 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 86 National National NNP work_ayatblpinzaztdzhilw6yqsi6m 1 87 University University NNP work_ayatblpinzaztdzhilw6yqsi6m 1 88 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 89 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 1 90 and and CC work_ayatblpinzaztdzhilw6yqsi6m 1 91 Emerging Emerging NNP work_ayatblpinzaztdzhilw6yqsi6m 1 92 Sciences Sciences NNPS work_ayatblpinzaztdzhilw6yqsi6m 1 93 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 94 Islamabad Islamabad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 95 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 96 Islamabad Islamabad NNP work_ayatblpinzaztdzhilw6yqsi6m 1 97 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 98 ICT ICT NNP work_ayatblpinzaztdzhilw6yqsi6m 1 99 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 100 Pakistan Pakistan NNP work_ayatblpinzaztdzhilw6yqsi6m 1 101 4 4 CD work_ayatblpinzaztdzhilw6yqsi6m 1 102 School School NNP work_ayatblpinzaztdzhilw6yqsi6m 1 103 of of IN work_ayatblpinzaztdzhilw6yqsi6m 1 104 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 1 105 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 1 106 and and CC work_ayatblpinzaztdzhilw6yqsi6m 1 107 Technology Technology NNP work_ayatblpinzaztdzhilw6yqsi6m 1 108 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 1 109 SIST SIST NNP work_ayatblpinzaztdzhilw6yqsi6m 1 110 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 1 111 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 112 Southwest Southwest NNP work_ayatblpinzaztdzhilw6yqsi6m 1 113 Jiaotong Jiaotong NNP work_ayatblpinzaztdzhilw6yqsi6m 1 114 University University NNP work_ayatblpinzaztdzhilw6yqsi6m 1 115 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 116 Chengdu Chengdu NNP work_ayatblpinzaztdzhilw6yqsi6m 1 117 , , , work_ayatblpinzaztdzhilw6yqsi6m 1 118 China China NNP work_ayatblpinzaztdzhilw6yqsi6m 1 119 * * NFP work_ayatblpinzaztdzhilw6yqsi6m 1 120 These these DT work_ayatblpinzaztdzhilw6yqsi6m 1 121 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 1 122 contributed contribute VBD work_ayatblpinzaztdzhilw6yqsi6m 1 123 equally equally RB work_ayatblpinzaztdzhilw6yqsi6m 1 124 to to IN work_ayatblpinzaztdzhilw6yqsi6m 1 125 this this DT work_ayatblpinzaztdzhilw6yqsi6m 1 126 work work NN work_ayatblpinzaztdzhilw6yqsi6m 1 127 . . . work_ayatblpinzaztdzhilw6yqsi6m 2 1 ABSTRACT ABSTRACT NNP work_ayatblpinzaztdzhilw6yqsi6m 2 2 Due due IN work_ayatblpinzaztdzhilw6yqsi6m 2 3 to to IN work_ayatblpinzaztdzhilw6yqsi6m 2 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 2 5 expeditious expeditious JJ work_ayatblpinzaztdzhilw6yqsi6m 2 6 inclination inclination NN work_ayatblpinzaztdzhilw6yqsi6m 2 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 2 8 online online NNP work_ayatblpinzaztdzhilw6yqsi6m 2 9 services service NNS work_ayatblpinzaztdzhilw6yqsi6m 2 10 usage usage NN work_ayatblpinzaztdzhilw6yqsi6m 2 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 2 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 2 13 incidents incident NNS work_ayatblpinzaztdzhilw6yqsi6m 2 14 of of IN work_ayatblpinzaztdzhilw6yqsi6m 2 15 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 2 16 proliferation proliferation NN work_ayatblpinzaztdzhilw6yqsi6m 2 17 being be VBG work_ayatblpinzaztdzhilw6yqsi6m 2 18 reported report VBN work_ayatblpinzaztdzhilw6yqsi6m 2 19 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 2 20 on on IN work_ayatblpinzaztdzhilw6yqsi6m 2 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 2 22 rise rise NN work_ayatblpinzaztdzhilw6yqsi6m 2 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 3 1 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 3 2 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 3 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 3 4 more more RBR work_ayatblpinzaztdzhilw6yqsi6m 3 5 hazardous hazardous JJ work_ayatblpinzaztdzhilw6yqsi6m 3 6 threat threat NN work_ayatblpinzaztdzhilw6yqsi6m 3 7 than than IN work_ayatblpinzaztdzhilw6yqsi6m 3 8 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 3 9 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 3 10 as as IN work_ayatblpinzaztdzhilw6yqsi6m 3 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 3 12 victim victim NN work_ayatblpinzaztdzhilw6yqsi6m 3 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 3 14 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 3 15 can can MD work_ayatblpinzaztdzhilw6yqsi6m 3 16 not not RB work_ayatblpinzaztdzhilw6yqsi6m 3 17 regain regain VB work_ayatblpinzaztdzhilw6yqsi6m 3 18 access access NN work_ayatblpinzaztdzhilw6yqsi6m 3 19 to to IN work_ayatblpinzaztdzhilw6yqsi6m 3 20 the the DT work_ayatblpinzaztdzhilw6yqsi6m 3 21 hijacked hijacked JJ work_ayatblpinzaztdzhilw6yqsi6m 3 22 device device NN work_ayatblpinzaztdzhilw6yqsi6m 3 23 until until IN work_ayatblpinzaztdzhilw6yqsi6m 3 24 some some DT work_ayatblpinzaztdzhilw6yqsi6m 3 25 form form NN work_ayatblpinzaztdzhilw6yqsi6m 3 26 of of IN work_ayatblpinzaztdzhilw6yqsi6m 3 27 compensation compensation NN work_ayatblpinzaztdzhilw6yqsi6m 3 28 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 3 29 paid pay VBN work_ayatblpinzaztdzhilw6yqsi6m 3 30 . . . work_ayatblpinzaztdzhilw6yqsi6m 4 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 4 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 4 3 literature literature NN work_ayatblpinzaztdzhilw6yqsi6m 4 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 4 5 several several JJ work_ayatblpinzaztdzhilw6yqsi6m 4 6 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 4 7 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 4 8 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 4 9 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 4 10 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 4 11 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 4 12 for for IN work_ayatblpinzaztdzhilw6yqsi6m 4 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 4 14 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 4 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 4 16 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 4 17 including include VBG work_ayatblpinzaztdzhilw6yqsi6m 4 18 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 4 19 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 4 20 however however RB work_ayatblpinzaztdzhilw6yqsi6m 4 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 4 22 to to IN work_ayatblpinzaztdzhilw6yqsi6m 4 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 4 24 best good JJS work_ayatblpinzaztdzhilw6yqsi6m 4 25 of of IN work_ayatblpinzaztdzhilw6yqsi6m 4 26 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 4 27 knowledge knowledge NN work_ayatblpinzaztdzhilw6yqsi6m 4 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 4 29 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 4 30 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 4 31 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 4 32 for for IN work_ayatblpinzaztdzhilw6yqsi6m 4 33 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 4 34 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 4 35 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 4 36 not not RB work_ayatblpinzaztdzhilw6yqsi6m 4 37 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 4 38 investigated investigate VBN work_ayatblpinzaztdzhilw6yqsi6m 4 39 for for IN work_ayatblpinzaztdzhilw6yqsi6m 4 40 this this DT work_ayatblpinzaztdzhilw6yqsi6m 4 41 purpose purpose NN work_ayatblpinzaztdzhilw6yqsi6m 4 42 , , , work_ayatblpinzaztdzhilw6yqsi6m 4 43 as as IN work_ayatblpinzaztdzhilw6yqsi6m 4 44 of of IN work_ayatblpinzaztdzhilw6yqsi6m 4 45 today today NN work_ayatblpinzaztdzhilw6yqsi6m 4 46 . . . work_ayatblpinzaztdzhilw6yqsi6m 5 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 5 2 this this DT work_ayatblpinzaztdzhilw6yqsi6m 5 3 study study NN work_ayatblpinzaztdzhilw6yqsi6m 5 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 5 5 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 5 6 show show VBP work_ayatblpinzaztdzhilw6yqsi6m 5 7 that that IN work_ayatblpinzaztdzhilw6yqsi6m 5 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 5 9 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 5 10 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 5 11 picture picture NN work_ayatblpinzaztdzhilw6yqsi6m 5 12 obtained obtain VBN work_ayatblpinzaztdzhilw6yqsi6m 5 13 via via IN work_ayatblpinzaztdzhilw6yqsi6m 5 14 a a DT work_ayatblpinzaztdzhilw6yqsi6m 5 15 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 5 16 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 5 17 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 5 18 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 5 19 beneficial beneficial JJ work_ayatblpinzaztdzhilw6yqsi6m 5 20 to to TO work_ayatblpinzaztdzhilw6yqsi6m 5 21 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 5 22 the the DT work_ayatblpinzaztdzhilw6yqsi6m 5 23 obfuscated obfuscate VBN work_ayatblpinzaztdzhilw6yqsi6m 5 24 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 5 25 too too RB work_ayatblpinzaztdzhilw6yqsi6m 5 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 6 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 6 2 evaluate evaluate VBP work_ayatblpinzaztdzhilw6yqsi6m 6 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 6 4 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 6 5 obtained obtain VBN work_ayatblpinzaztdzhilw6yqsi6m 6 6 from from IN work_ayatblpinzaztdzhilw6yqsi6m 6 7 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 6 8 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 6 9 counters counter VBZ work_ayatblpinzaztdzhilw6yqsi6m 6 10 to to TO work_ayatblpinzaztdzhilw6yqsi6m 6 11 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 6 12 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 6 13 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 6 14 into into IN work_ayatblpinzaztdzhilw6yqsi6m 6 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 6 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 6 17 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 6 18 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 6 19 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 6 20 categories category NNS work_ayatblpinzaztdzhilw6yqsi6m 6 21 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 6 22 several several JJ work_ayatblpinzaztdzhilw6yqsi6m 6 23 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 6 24 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 6 25 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 6 26 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 6 27 as as IN work_ayatblpinzaztdzhilw6yqsi6m 6 28 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 6 29 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 6 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 6 31 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 6 32 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 6 33 , , , work_ayatblpinzaztdzhilw6yqsi6m 6 34 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 6 35 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 6 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 6 37 and and CC work_ayatblpinzaztdzhilw6yqsi6m 6 38 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 6 39 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 6 40 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 6 41 . . . work_ayatblpinzaztdzhilw6yqsi6m 7 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 7 2 employed employed JJ work_ayatblpinzaztdzhilw6yqsi6m 7 3 data data NN work_ayatblpinzaztdzhilw6yqsi6m 7 4 set set NN work_ayatblpinzaztdzhilw6yqsi6m 7 5 comprises comprise VBZ work_ayatblpinzaztdzhilw6yqsi6m 7 6 80 80 CD work_ayatblpinzaztdzhilw6yqsi6m 7 7 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 7 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 7 9 80 80 CD work_ayatblpinzaztdzhilw6yqsi6m 7 10 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 7 11 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 7 12 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 7 13 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 7 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 7 15 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 7 16 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 7 17 collected collect VBN work_ayatblpinzaztdzhilw6yqsi6m 7 18 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 7 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 7 20 VirusShare VirusShare NNP work_ayatblpinzaztdzhilw6yqsi6m 7 21 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 7 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 8 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 8 2 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 8 3 revealed reveal VBD work_ayatblpinzaztdzhilw6yqsi6m 8 4 that that IN work_ayatblpinzaztdzhilw6yqsi6m 8 5 extracted extract VBN work_ayatblpinzaztdzhilw6yqsi6m 8 6 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 8 7 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 8 8 play play VBP work_ayatblpinzaztdzhilw6yqsi6m 8 9 a a DT work_ayatblpinzaztdzhilw6yqsi6m 8 10 substantial substantial JJ work_ayatblpinzaztdzhilw6yqsi6m 8 11 part part NN work_ayatblpinzaztdzhilw6yqsi6m 8 12 in in IN work_ayatblpinzaztdzhilw6yqsi6m 8 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 8 14 identification identification NN work_ayatblpinzaztdzhilw6yqsi6m 8 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 8 16 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 8 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 8 18 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 8 19 with with IN work_ayatblpinzaztdzhilw6yqsi6m 8 20 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 8 21 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 8 22 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 8 23 score score NN work_ayatblpinzaztdzhilw6yqsi6m 8 24 of of IN work_ayatblpinzaztdzhilw6yqsi6m 8 25 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 8 26 achieved achieve VBN work_ayatblpinzaztdzhilw6yqsi6m 8 27 by by IN work_ayatblpinzaztdzhilw6yqsi6m 8 28 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 8 29 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 8 30 and and CC work_ayatblpinzaztdzhilw6yqsi6m 8 31 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 8 32 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 8 33 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 8 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 9 1 Subjects Subjects NNP work_ayatblpinzaztdzhilw6yqsi6m 9 2 Artificial Artificial NNP work_ayatblpinzaztdzhilw6yqsi6m 9 3 Intelligence Intelligence NNP work_ayatblpinzaztdzhilw6yqsi6m 9 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 5 Data Data NNPS work_ayatblpinzaztdzhilw6yqsi6m 9 6 Mining Mining NNP work_ayatblpinzaztdzhilw6yqsi6m 9 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 9 8 Machine Machine NNP work_ayatblpinzaztdzhilw6yqsi6m 9 9 Learning Learning NNP work_ayatblpinzaztdzhilw6yqsi6m 9 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 11 Scientific Scientific NNP work_ayatblpinzaztdzhilw6yqsi6m 9 12 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 9 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 9 14 Simulation Simulation NNP work_ayatblpinzaztdzhilw6yqsi6m 9 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 16 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 9 17 and and CC work_ayatblpinzaztdzhilw6yqsi6m 9 18 Privacy Privacy NNP work_ayatblpinzaztdzhilw6yqsi6m 9 19 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 20 Operating Operating NNP work_ayatblpinzaztdzhilw6yqsi6m 9 21 Systems Systems NNPS work_ayatblpinzaztdzhilw6yqsi6m 9 22 Keywords Keywords NNPS work_ayatblpinzaztdzhilw6yqsi6m 9 23 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 9 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 25 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 9 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 27 Performance Performance NNP work_ayatblpinzaztdzhilw6yqsi6m 9 28 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 9 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 30 Classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 9 31 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 32 Machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 9 33 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 9 34 INTRODUCTION introduction NN work_ayatblpinzaztdzhilw6yqsi6m 9 35 Over over IN work_ayatblpinzaztdzhilw6yqsi6m 9 36 the the DT work_ayatblpinzaztdzhilw6yqsi6m 9 37 past past JJ work_ayatblpinzaztdzhilw6yqsi6m 9 38 several several JJ work_ayatblpinzaztdzhilw6yqsi6m 9 39 years year NNS work_ayatblpinzaztdzhilw6yqsi6m 9 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 9 41 an an DT work_ayatblpinzaztdzhilw6yqsi6m 9 42 exponential exponential JJ work_ayatblpinzaztdzhilw6yqsi6m 9 43 increase increase NN work_ayatblpinzaztdzhilw6yqsi6m 9 44 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 9 45 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 9 46 reported report VBN work_ayatblpinzaztdzhilw6yqsi6m 9 47 in in IN work_ayatblpinzaztdzhilw6yqsi6m 9 48 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 9 49 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 9 50 . . . work_ayatblpinzaztdzhilw6yqsi6m 10 1 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 10 2 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 10 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 10 4 sub sub JJ work_ayatblpinzaztdzhilw6yqsi6m 10 5 - - NN work_ayatblpinzaztdzhilw6yqsi6m 10 6 class class NN work_ayatblpinzaztdzhilw6yqsi6m 10 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 10 8 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 10 9 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 10 10 hijacks hijack VBZ work_ayatblpinzaztdzhilw6yqsi6m 10 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 10 12 device device NN work_ayatblpinzaztdzhilw6yqsi6m 10 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 10 14 blocks block VBZ work_ayatblpinzaztdzhilw6yqsi6m 10 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 10 16 victim victim NN work_ayatblpinzaztdzhilw6yqsi6m 10 17 to to TO work_ayatblpinzaztdzhilw6yqsi6m 10 18 access access VB work_ayatblpinzaztdzhilw6yqsi6m 10 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 10 20 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 10 21 until until IN work_ayatblpinzaztdzhilw6yqsi6m 10 22 a a DT work_ayatblpinzaztdzhilw6yqsi6m 10 23 compensation compensation NN work_ayatblpinzaztdzhilw6yqsi6m 10 24 of of IN work_ayatblpinzaztdzhilw6yqsi6m 10 25 some some DT work_ayatblpinzaztdzhilw6yqsi6m 10 26 form form NN work_ayatblpinzaztdzhilw6yqsi6m 10 27 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 10 28 made make VBN work_ayatblpinzaztdzhilw6yqsi6m 10 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 11 1 Typically typically RB work_ayatblpinzaztdzhilw6yqsi6m 11 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 11 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 11 4 compensation compensation NN work_ayatblpinzaztdzhilw6yqsi6m 11 5 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 11 6 in in IN work_ayatblpinzaztdzhilw6yqsi6m 11 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 11 8 form form NN work_ayatblpinzaztdzhilw6yqsi6m 11 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 11 10 money money NN work_ayatblpinzaztdzhilw6yqsi6m 11 11 to to TO work_ayatblpinzaztdzhilw6yqsi6m 11 12 concede concede VB work_ayatblpinzaztdzhilw6yqsi6m 11 13 access access NN work_ayatblpinzaztdzhilw6yqsi6m 11 14 back back RB work_ayatblpinzaztdzhilw6yqsi6m 11 15 to to IN work_ayatblpinzaztdzhilw6yqsi6m 11 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 11 17 victim victim NN work_ayatblpinzaztdzhilw6yqsi6m 11 18 . . . work_ayatblpinzaztdzhilw6yqsi6m 12 1 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 12 2 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 12 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 12 4 ability ability NN work_ayatblpinzaztdzhilw6yqsi6m 12 5 to to TO work_ayatblpinzaztdzhilw6yqsi6m 12 6 harmfully harmfully RB work_ayatblpinzaztdzhilw6yqsi6m 12 7 affect affect VB work_ayatblpinzaztdzhilw6yqsi6m 12 8 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 12 9 kinds kind NNS work_ayatblpinzaztdzhilw6yqsi6m 12 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 12 11 devices device NNS work_ayatblpinzaztdzhilw6yqsi6m 12 12 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 12 13 as as IN work_ayatblpinzaztdzhilw6yqsi6m 12 14 personal personal JJ work_ayatblpinzaztdzhilw6yqsi6m 12 15 computers computer NNS work_ayatblpinzaztdzhilw6yqsi6m 12 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 12 17 servers server NNS work_ayatblpinzaztdzhilw6yqsi6m 12 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 12 19 smartphones smartphone NNS work_ayatblpinzaztdzhilw6yqsi6m 12 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 12 21 tablets tablet NNS work_ayatblpinzaztdzhilw6yqsi6m 12 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 12 23 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 12 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 13 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 13 2 instance instance NN work_ayatblpinzaztdzhilw6yqsi6m 13 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 13 4 multiple multiple JJ work_ayatblpinzaztdzhilw6yqsi6m 13 5 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 13 6 variants variant NNS work_ayatblpinzaztdzhilw6yqsi6m 13 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 13 8 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 13 9 including include VBG work_ayatblpinzaztdzhilw6yqsi6m 13 10 WannaCry WannaCry NNP work_ayatblpinzaztdzhilw6yqsi6m 13 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 13 12 JAFF JAFF NNP work_ayatblpinzaztdzhilw6yqsi6m 13 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 13 14 Petya Petya NNP work_ayatblpinzaztdzhilw6yqsi6m 13 15 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 13 16 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 13 17 reported report VBN work_ayatblpinzaztdzhilw6yqsi6m 13 18 in in IN work_ayatblpinzaztdzhilw6yqsi6m 13 19 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 13 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 13 21 Hampton Hampton NNP work_ayatblpinzaztdzhilw6yqsi6m 13 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 13 23 Baig Baig NNP work_ayatblpinzaztdzhilw6yqsi6m 13 24 & & CC work_ayatblpinzaztdzhilw6yqsi6m 13 25 Zeadall Zeadall NNP work_ayatblpinzaztdzhilw6yqsi6m 13 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 13 27 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 13 28 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 13 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 14 1 How how WRB work_ayatblpinzaztdzhilw6yqsi6m 14 2 to to TO work_ayatblpinzaztdzhilw6yqsi6m 14 3 cite cite VB work_ayatblpinzaztdzhilw6yqsi6m 14 4 this this DT work_ayatblpinzaztdzhilw6yqsi6m 14 5 article article NN work_ayatblpinzaztdzhilw6yqsi6m 14 6 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 14 7 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 14 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 14 9 Rais Rais NNP work_ayatblpinzaztdzhilw6yqsi6m 14 10 RNB RNB NNP work_ayatblpinzaztdzhilw6yqsi6m 14 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 14 12 Aleem Aleem NNP work_ayatblpinzaztdzhilw6yqsi6m 14 13 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 14 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 14 15 Islam Islam NNP work_ayatblpinzaztdzhilw6yqsi6m 14 16 MA MA NNP work_ayatblpinzaztdzhilw6yqsi6m 14 17 , , , work_ayatblpinzaztdzhilw6yqsi6m 14 18 Iqbal Iqbal NNP work_ayatblpinzaztdzhilw6yqsi6m 14 19 MA MA NNP work_ayatblpinzaztdzhilw6yqsi6m 14 20 . . . work_ayatblpinzaztdzhilw6yqsi6m 15 1 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 15 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 16 1 On on IN work_ayatblpinzaztdzhilw6yqsi6m 16 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 16 3 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 16 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 16 5 Microsoft Microsoft NNP work_ayatblpinzaztdzhilw6yqsi6m 16 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 16 7 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 16 8 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 16 9 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 16 10 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 16 11 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 16 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 17 1 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 17 2 Comput comput NN work_ayatblpinzaztdzhilw6yqsi6m 17 3 . . . work_ayatblpinzaztdzhilw6yqsi6m 18 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 18 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 19 1 7 7 LS work_ayatblpinzaztdzhilw6yqsi6m 19 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 19 3 e361 e361 NNP work_ayatblpinzaztdzhilw6yqsi6m 19 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 19 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 19 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 19 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 19 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 19 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 19 10 Submitted submit VBD work_ayatblpinzaztdzhilw6yqsi6m 19 11 21 21 CD work_ayatblpinzaztdzhilw6yqsi6m 19 12 September September NNP work_ayatblpinzaztdzhilw6yqsi6m 19 13 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 19 14 Accepted accept VBN work_ayatblpinzaztdzhilw6yqsi6m 19 15 28 28 CD work_ayatblpinzaztdzhilw6yqsi6m 19 16 December December NNP work_ayatblpinzaztdzhilw6yqsi6m 19 17 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 19 18 Published publish VBN work_ayatblpinzaztdzhilw6yqsi6m 19 19 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 19 20 February February NNP work_ayatblpinzaztdzhilw6yqsi6m 19 21 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 19 22 Corresponding Corresponding NNP work_ayatblpinzaztdzhilw6yqsi6m 19 23 author author NN work_ayatblpinzaztdzhilw6yqsi6m 19 24 Rao Rao NNP work_ayatblpinzaztdzhilw6yqsi6m 19 25 Naveed Naveed NNP work_ayatblpinzaztdzhilw6yqsi6m 19 26 Bin Bin NNP work_ayatblpinzaztdzhilw6yqsi6m 19 27 Rais Rais NNP work_ayatblpinzaztdzhilw6yqsi6m 19 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 19 29 r.rais@ajman.ac.ae r.rais@ajman.ac.ae . work_ayatblpinzaztdzhilw6yqsi6m 19 30 Academic academic JJ work_ayatblpinzaztdzhilw6yqsi6m 19 31 editor editor NN work_ayatblpinzaztdzhilw6yqsi6m 19 32 Yu Yu NNP work_ayatblpinzaztdzhilw6yqsi6m 19 33 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 19 34 Dong Dong NNP work_ayatblpinzaztdzhilw6yqsi6m 19 35 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 19 36 Additional Additional NNP work_ayatblpinzaztdzhilw6yqsi6m 19 37 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 19 38 and and CC work_ayatblpinzaztdzhilw6yqsi6m 19 39 Declarations declaration NNS work_ayatblpinzaztdzhilw6yqsi6m 19 40 can can MD work_ayatblpinzaztdzhilw6yqsi6m 19 41 be be VB work_ayatblpinzaztdzhilw6yqsi6m 19 42 found find VBN work_ayatblpinzaztdzhilw6yqsi6m 19 43 on on IN work_ayatblpinzaztdzhilw6yqsi6m 19 44 page page NN work_ayatblpinzaztdzhilw6yqsi6m 19 45 19 19 CD work_ayatblpinzaztdzhilw6yqsi6m 19 46 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 19 47 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 19 48 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 19 49 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 19 50 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 19 51 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 19 52 Copyright copyright NN work_ayatblpinzaztdzhilw6yqsi6m 19 53 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 19 54 Aurangzeb Aurangzeb NNPS work_ayatblpinzaztdzhilw6yqsi6m 19 55 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 19 56 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 19 57 . . . work_ayatblpinzaztdzhilw6yqsi6m 20 1 Distributed distribute VBN work_ayatblpinzaztdzhilw6yqsi6m 20 2 under under IN work_ayatblpinzaztdzhilw6yqsi6m 20 3 Creative Creative NNP work_ayatblpinzaztdzhilw6yqsi6m 20 4 Commons Commons NNP work_ayatblpinzaztdzhilw6yqsi6m 20 5 CC CC NNP work_ayatblpinzaztdzhilw6yqsi6m 20 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 20 7 BY BY NNP work_ayatblpinzaztdzhilw6yqsi6m 20 8 4.0 4.0 CD work_ayatblpinzaztdzhilw6yqsi6m 20 9 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 20 10 mailto mailto NN work_ayatblpinzaztdzhilw6yqsi6m 20 11 : : : work_ayatblpinzaztdzhilw6yqsi6m 20 12 r. r. NNP work_ayatblpinzaztdzhilw6yqsi6m 20 13 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 20 14 rais@ rais@ NNP work_ayatblpinzaztdzhilw6yqsi6m 20 15 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 20 16 ajman. ajman. NN work_ayatblpinzaztdzhilw6yqsi6m 20 17 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 20 18 ac. ac. NN work_ayatblpinzaztdzhilw6yqsi6m 20 19 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 20 20 ae ae NN work_ayatblpinzaztdzhilw6yqsi6m 20 21 https://peerj.com/academic-boards/editors/ https://peerj.com/academic-boards/editors/ NNP work_ayatblpinzaztdzhilw6yqsi6m 20 22 https://peerj.com/academic-boards/editors/ https://peerj.com/academic-boards/editors/ NNP work_ayatblpinzaztdzhilw6yqsi6m 20 23 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 20 24 http://www.creativecommons.org/licenses/by/4.0/ http://www.creativecommons.org/licenses/by/4.0/ NNP work_ayatblpinzaztdzhilw6yqsi6m 20 25 http://www.creativecommons.org/licenses/by/4.0/ http://www.creativecommons.org/licenses/by/4.0/ XX work_ayatblpinzaztdzhilw6yqsi6m 20 26 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_ayatblpinzaztdzhilw6yqsi6m 20 27 On on IN work_ayatblpinzaztdzhilw6yqsi6m 20 28 12 12 CD work_ayatblpinzaztdzhilw6yqsi6m 20 29 May May NNP work_ayatblpinzaztdzhilw6yqsi6m 20 30 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 20 31 , , , work_ayatblpinzaztdzhilw6yqsi6m 20 32 within within IN work_ayatblpinzaztdzhilw6yqsi6m 20 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 20 34 span span NN work_ayatblpinzaztdzhilw6yqsi6m 20 35 of of IN work_ayatblpinzaztdzhilw6yqsi6m 20 36 a a DT work_ayatblpinzaztdzhilw6yqsi6m 20 37 few few JJ work_ayatblpinzaztdzhilw6yqsi6m 20 38 hours hour NNS work_ayatblpinzaztdzhilw6yqsi6m 20 39 , , , work_ayatblpinzaztdzhilw6yqsi6m 20 40 the the DT work_ayatblpinzaztdzhilw6yqsi6m 20 41 WannaCry WannaCry NNP work_ayatblpinzaztdzhilw6yqsi6m 20 42 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 20 43 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 20 44 Maurya Maurya NNP work_ayatblpinzaztdzhilw6yqsi6m 20 45 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 20 46 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 20 47 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 20 48 , , , work_ayatblpinzaztdzhilw6yqsi6m 20 49 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 20 50 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 20 51 infected infect VBD work_ayatblpinzaztdzhilw6yqsi6m 20 52 more more JJR work_ayatblpinzaztdzhilw6yqsi6m 20 53 than than IN work_ayatblpinzaztdzhilw6yqsi6m 20 54 70,000 70,000 CD work_ayatblpinzaztdzhilw6yqsi6m 20 55 desktop desktop NN work_ayatblpinzaztdzhilw6yqsi6m 20 56 devices device NNS work_ayatblpinzaztdzhilw6yqsi6m 20 57 in in IN work_ayatblpinzaztdzhilw6yqsi6m 20 58 over over IN work_ayatblpinzaztdzhilw6yqsi6m 20 59 150 150 CD work_ayatblpinzaztdzhilw6yqsi6m 20 60 countries country NNS work_ayatblpinzaztdzhilw6yqsi6m 20 61 across across IN work_ayatblpinzaztdzhilw6yqsi6m 20 62 the the DT work_ayatblpinzaztdzhilw6yqsi6m 20 63 globe globe NN work_ayatblpinzaztdzhilw6yqsi6m 20 64 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 20 65 Grant Grant NNP work_ayatblpinzaztdzhilw6yqsi6m 20 66 & & CC work_ayatblpinzaztdzhilw6yqsi6m 20 67 Parkinson Parkinson NNP work_ayatblpinzaztdzhilw6yqsi6m 20 68 , , , work_ayatblpinzaztdzhilw6yqsi6m 20 69 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 20 70 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 20 71 . . . work_ayatblpinzaztdzhilw6yqsi6m 21 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 21 2 financial financial JJ work_ayatblpinzaztdzhilw6yqsi6m 21 3 loss loss NN work_ayatblpinzaztdzhilw6yqsi6m 21 4 incurred incur VBN work_ayatblpinzaztdzhilw6yqsi6m 21 5 due due JJ work_ayatblpinzaztdzhilw6yqsi6m 21 6 to to IN work_ayatblpinzaztdzhilw6yqsi6m 21 7 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 21 8 can can MD work_ayatblpinzaztdzhilw6yqsi6m 21 9 be be VB work_ayatblpinzaztdzhilw6yqsi6m 21 10 quite quite RB work_ayatblpinzaztdzhilw6yqsi6m 21 11 devastating devastating JJ work_ayatblpinzaztdzhilw6yqsi6m 21 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 22 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 22 2 instance instance NN work_ayatblpinzaztdzhilw6yqsi6m 22 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 22 4 CryptoWall_v3 CryptoWall_v3 NNP work_ayatblpinzaztdzhilw6yqsi6m 22 5 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 22 6 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 22 7 Ali Ali NNP work_ayatblpinzaztdzhilw6yqsi6m 22 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 22 9 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 22 10 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 22 11 Sgandurra Sgandurra NNP work_ayatblpinzaztdzhilw6yqsi6m 22 12 et et FW work_ayatblpinzaztdzhilw6yqsi6m 22 13 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 22 14 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 22 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 22 16 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 22 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 22 18 caused cause VBD work_ayatblpinzaztdzhilw6yqsi6m 22 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 22 20 loss loss NN work_ayatblpinzaztdzhilw6yqsi6m 22 21 of of IN work_ayatblpinzaztdzhilw6yqsi6m 22 22 an an DT work_ayatblpinzaztdzhilw6yqsi6m 22 23 estimated estimate VBN work_ayatblpinzaztdzhilw6yqsi6m 22 24 $ $ $ work_ayatblpinzaztdzhilw6yqsi6m 22 25 325 325 CD work_ayatblpinzaztdzhilw6yqsi6m 22 26 million million CD work_ayatblpinzaztdzhilw6yqsi6m 22 27 in in IN work_ayatblpinzaztdzhilw6yqsi6m 22 28 the the DT work_ayatblpinzaztdzhilw6yqsi6m 22 29 US US NNP work_ayatblpinzaztdzhilw6yqsi6m 22 30 from from IN work_ayatblpinzaztdzhilw6yqsi6m 22 31 November November NNP work_ayatblpinzaztdzhilw6yqsi6m 22 32 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 22 33 to to IN work_ayatblpinzaztdzhilw6yqsi6m 22 34 June June NNP work_ayatblpinzaztdzhilw6yqsi6m 22 35 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 22 36 . . . work_ayatblpinzaztdzhilw6yqsi6m 22 37 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 22 38 . . . work_ayatblpinzaztdzhilw6yqsi6m 23 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 23 2 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 23 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 23 4 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 23 5 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 23 6 reported report VBN work_ayatblpinzaztdzhilw6yqsi6m 23 7 that that IN work_ayatblpinzaztdzhilw6yqsi6m 23 8 45 45 CD work_ayatblpinzaztdzhilw6yqsi6m 23 9 % % NN work_ayatblpinzaztdzhilw6yqsi6m 23 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 23 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 23 12 companies company NNS work_ayatblpinzaztdzhilw6yqsi6m 23 13 paid pay VBD work_ayatblpinzaztdzhilw6yqsi6m 23 14 a a DT work_ayatblpinzaztdzhilw6yqsi6m 23 15 ransom ransom NN work_ayatblpinzaztdzhilw6yqsi6m 23 16 to to TO work_ayatblpinzaztdzhilw6yqsi6m 23 17 recover recover VB work_ayatblpinzaztdzhilw6yqsi6m 23 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 23 19 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 23 20 stored store VBN work_ayatblpinzaztdzhilw6yqsi6m 23 21 on on IN work_ayatblpinzaztdzhilw6yqsi6m 23 22 infected infected JJ work_ayatblpinzaztdzhilw6yqsi6m 23 23 machines machine NNS work_ayatblpinzaztdzhilw6yqsi6m 23 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 23 25 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 23 26 increased increase VBD work_ayatblpinzaztdzhilw6yqsi6m 23 27 to to IN work_ayatblpinzaztdzhilw6yqsi6m 23 28 58 58 CD work_ayatblpinzaztdzhilw6yqsi6m 23 29 % % NN work_ayatblpinzaztdzhilw6yqsi6m 23 30 in in IN work_ayatblpinzaztdzhilw6yqsi6m 23 31 the the DT work_ayatblpinzaztdzhilw6yqsi6m 23 32 year year NN work_ayatblpinzaztdzhilw6yqsi6m 23 33 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 23 34 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 23 35 Ramesh Ramesh NNP work_ayatblpinzaztdzhilw6yqsi6m 23 36 & & CC work_ayatblpinzaztdzhilw6yqsi6m 23 37 Menen Menen NNP work_ayatblpinzaztdzhilw6yqsi6m 23 38 , , , work_ayatblpinzaztdzhilw6yqsi6m 23 39 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 23 40 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 23 41 . . . work_ayatblpinzaztdzhilw6yqsi6m 24 1 Another another DT work_ayatblpinzaztdzhilw6yqsi6m 24 2 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 24 3 attack attack NN work_ayatblpinzaztdzhilw6yqsi6m 24 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 24 5 triggered trigger VBN work_ayatblpinzaztdzhilw6yqsi6m 24 6 by by IN work_ayatblpinzaztdzhilw6yqsi6m 24 7 CryptoWall_v4 CryptoWall_v4 NNP work_ayatblpinzaztdzhilw6yqsi6m 24 8 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 24 9 resulted result VBD work_ayatblpinzaztdzhilw6yqsi6m 24 10 in in IN work_ayatblpinzaztdzhilw6yqsi6m 24 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 24 12 loss loss NN work_ayatblpinzaztdzhilw6yqsi6m 24 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 24 14 $ $ $ work_ayatblpinzaztdzhilw6yqsi6m 24 15 7.1 7.1 CD work_ayatblpinzaztdzhilw6yqsi6m 24 16 million million CD work_ayatblpinzaztdzhilw6yqsi6m 24 17 worldwide worldwide RB work_ayatblpinzaztdzhilw6yqsi6m 24 18 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 24 19 Ali Ali NNP work_ayatblpinzaztdzhilw6yqsi6m 24 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 24 21 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 24 22 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 24 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 25 1 Recently recently RB work_ayatblpinzaztdzhilw6yqsi6m 25 2 reported report VBN work_ayatblpinzaztdzhilw6yqsi6m 25 3 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 25 4 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 25 5 involving involve VBG work_ayatblpinzaztdzhilw6yqsi6m 25 6 NotPetya NotPetya NNP work_ayatblpinzaztdzhilw6yqsi6m 25 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 25 8 WannaCry WannaCry NNP work_ayatblpinzaztdzhilw6yqsi6m 25 9 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 25 10 estimated estimate VBN work_ayatblpinzaztdzhilw6yqsi6m 25 11 to to TO work_ayatblpinzaztdzhilw6yqsi6m 25 12 inflict inflict VB work_ayatblpinzaztdzhilw6yqsi6m 25 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 25 14 costs cost NNS work_ayatblpinzaztdzhilw6yqsi6m 25 15 around around IN work_ayatblpinzaztdzhilw6yqsi6m 25 16 $ $ $ work_ayatblpinzaztdzhilw6yqsi6m 25 17 18 18 CD work_ayatblpinzaztdzhilw6yqsi6m 25 18 billion billion CD work_ayatblpinzaztdzhilw6yqsi6m 25 19 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 25 20 Davies Davies NNPS work_ayatblpinzaztdzhilw6yqsi6m 25 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 25 22 Macfarlane Macfarlane NNP work_ayatblpinzaztdzhilw6yqsi6m 25 23 & & CC work_ayatblpinzaztdzhilw6yqsi6m 25 24 Buchanan Buchanan NNP work_ayatblpinzaztdzhilw6yqsi6m 25 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 25 26 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 25 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 25 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 26 1 These these DT work_ayatblpinzaztdzhilw6yqsi6m 26 2 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 26 3 wreaked wreak VBD work_ayatblpinzaztdzhilw6yqsi6m 26 4 havoc havoc NN work_ayatblpinzaztdzhilw6yqsi6m 26 5 in in IN work_ayatblpinzaztdzhilw6yqsi6m 26 6 systems system NNS work_ayatblpinzaztdzhilw6yqsi6m 26 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 26 8 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 26 9 world world NN work_ayatblpinzaztdzhilw6yqsi6m 26 10 organizations organization NNS work_ayatblpinzaztdzhilw6yqsi6m 26 11 by by IN work_ayatblpinzaztdzhilw6yqsi6m 26 12 halting halt VBG work_ayatblpinzaztdzhilw6yqsi6m 26 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 26 14 damaging damage VBG work_ayatblpinzaztdzhilw6yqsi6m 26 15 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 26 16 daily daily JJ work_ayatblpinzaztdzhilw6yqsi6m 26 17 operations operation NNS work_ayatblpinzaztdzhilw6yqsi6m 26 18 . . . work_ayatblpinzaztdzhilw6yqsi6m 27 1 It -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 27 2 seems seem VBZ work_ayatblpinzaztdzhilw6yqsi6m 27 3 that that IN work_ayatblpinzaztdzhilw6yqsi6m 27 4 losses loss NNS work_ayatblpinzaztdzhilw6yqsi6m 27 5 caused cause VBN work_ayatblpinzaztdzhilw6yqsi6m 27 6 by by IN work_ayatblpinzaztdzhilw6yqsi6m 27 7 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 27 8 will will MD work_ayatblpinzaztdzhilw6yqsi6m 27 9 probably probably RB work_ayatblpinzaztdzhilw6yqsi6m 27 10 exceed exceed VB work_ayatblpinzaztdzhilw6yqsi6m 27 11 $ $ $ work_ayatblpinzaztdzhilw6yqsi6m 27 12 20 20 CD work_ayatblpinzaztdzhilw6yqsi6m 27 13 billion billion CD work_ayatblpinzaztdzhilw6yqsi6m 27 14 by by IN work_ayatblpinzaztdzhilw6yqsi6m 27 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 27 16 end end NN work_ayatblpinzaztdzhilw6yqsi6m 27 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 27 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 27 19 year year NN work_ayatblpinzaztdzhilw6yqsi6m 27 20 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 27 21 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 27 22 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 27 23 in in IN work_ayatblpinzaztdzhilw6yqsi6m 27 24 Fig Fig NNP work_ayatblpinzaztdzhilw6yqsi6m 27 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 28 1 1 1 LS work_ayatblpinzaztdzhilw6yqsi6m 28 2 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 28 3 as as IN work_ayatblpinzaztdzhilw6yqsi6m 28 4 reported report VBN work_ayatblpinzaztdzhilw6yqsi6m 28 5 by by IN work_ayatblpinzaztdzhilw6yqsi6m 28 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 28 7 Global global JJ work_ayatblpinzaztdzhilw6yqsi6m 28 8 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 28 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 28 10 protection protection NN work_ayatblpinzaztdzhilw6yqsi6m 28 11 report report NN work_ayatblpinzaztdzhilw6yqsi6m 28 12 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 28 13 Ramesh Ramesh NNP work_ayatblpinzaztdzhilw6yqsi6m 28 14 & & CC work_ayatblpinzaztdzhilw6yqsi6m 28 15 Menen Menen NNP work_ayatblpinzaztdzhilw6yqsi6m 28 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 28 17 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 28 18 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 28 19 Chung Chung NNP work_ayatblpinzaztdzhilw6yqsi6m 28 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 28 21 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 28 22 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 28 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 29 1 Although although IN work_ayatblpinzaztdzhilw6yqsi6m 29 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 29 3 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 29 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 29 5 deemed deem VBN work_ayatblpinzaztdzhilw6yqsi6m 29 6 a a DT work_ayatblpinzaztdzhilw6yqsi6m 29 7 great great JJ work_ayatblpinzaztdzhilw6yqsi6m 29 8 threat threat NN work_ayatblpinzaztdzhilw6yqsi6m 29 9 over over IN work_ayatblpinzaztdzhilw6yqsi6m 29 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 29 11 years year NNS work_ayatblpinzaztdzhilw6yqsi6m 29 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 29 13 yet yet CC work_ayatblpinzaztdzhilw6yqsi6m 29 14 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 29 15 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 29 16 an an DT work_ayatblpinzaztdzhilw6yqsi6m 29 17 even even RB work_ayatblpinzaztdzhilw6yqsi6m 29 18 more more RBR work_ayatblpinzaztdzhilw6yqsi6m 29 19 daunting daunting JJ work_ayatblpinzaztdzhilw6yqsi6m 29 20 threat threat NN work_ayatblpinzaztdzhilw6yqsi6m 29 21 compared compare VBN work_ayatblpinzaztdzhilw6yqsi6m 29 22 to to IN work_ayatblpinzaztdzhilw6yqsi6m 29 23 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 29 24 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 29 25 due due IN work_ayatblpinzaztdzhilw6yqsi6m 29 26 to to IN work_ayatblpinzaztdzhilw6yqsi6m 29 27 its -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 29 28 attacking attack VBG work_ayatblpinzaztdzhilw6yqsi6m 29 29 and and CC work_ayatblpinzaztdzhilw6yqsi6m 29 30 demanding demand VBG work_ayatblpinzaztdzhilw6yqsi6m 29 31 nature nature NN work_ayatblpinzaztdzhilw6yqsi6m 29 32 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 29 33 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 29 34 , , , work_ayatblpinzaztdzhilw6yqsi6m 29 35 expecting expect VBG work_ayatblpinzaztdzhilw6yqsi6m 29 36 a a DT work_ayatblpinzaztdzhilw6yqsi6m 29 37 ransom ransom NN work_ayatblpinzaztdzhilw6yqsi6m 29 38 in in IN work_ayatblpinzaztdzhilw6yqsi6m 29 39 return return NN work_ayatblpinzaztdzhilw6yqsi6m 29 40 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 29 41 . . . work_ayatblpinzaztdzhilw6yqsi6m 30 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 30 2 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 30 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 30 4 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 30 5 from from IN work_ayatblpinzaztdzhilw6yqsi6m 30 6 traditional traditional JJ work_ayatblpinzaztdzhilw6yqsi6m 30 7 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 30 8 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 30 9 essential essential JJ work_ayatblpinzaztdzhilw6yqsi6m 30 10 because because IN work_ayatblpinzaztdzhilw6yqsi6m 30 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 30 12 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 30 13 higher high JJR work_ayatblpinzaztdzhilw6yqsi6m 30 14 damaging damaging JJ work_ayatblpinzaztdzhilw6yqsi6m 30 15 impact impact NN work_ayatblpinzaztdzhilw6yqsi6m 30 16 in in IN work_ayatblpinzaztdzhilw6yqsi6m 30 17 terms term NNS work_ayatblpinzaztdzhilw6yqsi6m 30 18 of of IN work_ayatblpinzaztdzhilw6yqsi6m 30 19 informative informative JJ work_ayatblpinzaztdzhilw6yqsi6m 30 20 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 30 21 and and CC work_ayatblpinzaztdzhilw6yqsi6m 30 22 financial financial JJ work_ayatblpinzaztdzhilw6yqsi6m 30 23 loss loss NN work_ayatblpinzaztdzhilw6yqsi6m 30 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 31 1 Compared compare VBN work_ayatblpinzaztdzhilw6yqsi6m 31 2 to to IN work_ayatblpinzaztdzhilw6yqsi6m 31 3 typical typical JJ work_ayatblpinzaztdzhilw6yqsi6m 31 4 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 31 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 31 6 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 31 7 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 31 8 challenging challenge VBG work_ayatblpinzaztdzhilw6yqsi6m 31 9 to to TO work_ayatblpinzaztdzhilw6yqsi6m 31 10 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 31 11 and and CC work_ayatblpinzaztdzhilw6yqsi6m 31 12 kill kill VB work_ayatblpinzaztdzhilw6yqsi6m 31 13 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 31 14 even even RB work_ayatblpinzaztdzhilw6yqsi6m 31 15 when when WRB work_ayatblpinzaztdzhilw6yqsi6m 31 16 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 31 17 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 31 18 discovered discover VBN work_ayatblpinzaztdzhilw6yqsi6m 31 19 , , , work_ayatblpinzaztdzhilw6yqsi6m 31 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 31 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 31 22 damage damage NN work_ayatblpinzaztdzhilw6yqsi6m 31 23 can can MD work_ayatblpinzaztdzhilw6yqsi6m 31 24 be be VB work_ayatblpinzaztdzhilw6yqsi6m 31 25 potentially potentially RB work_ayatblpinzaztdzhilw6yqsi6m 31 26 irreparable irreparable JJ work_ayatblpinzaztdzhilw6yqsi6m 31 27 even even RB work_ayatblpinzaztdzhilw6yqsi6m 31 28 after after IN work_ayatblpinzaztdzhilw6yqsi6m 31 29 its -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 31 30 deletion deletion NN work_ayatblpinzaztdzhilw6yqsi6m 31 31 Al Al NNP work_ayatblpinzaztdzhilw6yqsi6m 31 32 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 31 33 rimy rimy NNP work_ayatblpinzaztdzhilw6yqsi6m 31 34 , , , work_ayatblpinzaztdzhilw6yqsi6m 31 35 Maarof Maarof NNP work_ayatblpinzaztdzhilw6yqsi6m 31 36 & & CC work_ayatblpinzaztdzhilw6yqsi6m 31 37 Shaid Shaid NNP work_ayatblpinzaztdzhilw6yqsi6m 31 38 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 31 39 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 31 40 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 31 41 and and CC work_ayatblpinzaztdzhilw6yqsi6m 31 42 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 31 43 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 31 44 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 31 45 . . . work_ayatblpinzaztdzhilw6yqsi6m 32 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 32 2 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 32 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 32 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 33 1 Hence hence RB work_ayatblpinzaztdzhilw6yqsi6m 33 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 33 3 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 33 4 require require VBP work_ayatblpinzaztdzhilw6yqsi6m 33 5 proactive proactive JJ work_ayatblpinzaztdzhilw6yqsi6m 33 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 33 7 aggressive aggressive JJ work_ayatblpinzaztdzhilw6yqsi6m 33 8 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 33 9 to to TO work_ayatblpinzaztdzhilw6yqsi6m 33 10 handle handle VB work_ayatblpinzaztdzhilw6yqsi6m 33 11 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 33 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 34 1 Figure figure NN work_ayatblpinzaztdzhilw6yqsi6m 34 2 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 34 3 Estimation estimation NN work_ayatblpinzaztdzhilw6yqsi6m 34 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 34 5 projection projection NN work_ayatblpinzaztdzhilw6yqsi6m 34 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 34 7 losses loss NNS work_ayatblpinzaztdzhilw6yqsi6m 34 8 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 34 9 in in IN work_ayatblpinzaztdzhilw6yqsi6m 34 10 Billions Billions NNP work_ayatblpinzaztdzhilw6yqsi6m 34 11 USD USD NNP work_ayatblpinzaztdzhilw6yqsi6m 34 12 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 34 13 caused cause VBN work_ayatblpinzaztdzhilw6yqsi6m 34 14 by by IN work_ayatblpinzaztdzhilw6yqsi6m 34 15 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 34 16 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 34 17 between between IN work_ayatblpinzaztdzhilw6yqsi6m 34 18 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 34 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 34 20 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 34 21 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 34 22 Ramesh Ramesh NNP work_ayatblpinzaztdzhilw6yqsi6m 34 23 & & CC work_ayatblpinzaztdzhilw6yqsi6m 34 24 Menen Menen NNP work_ayatblpinzaztdzhilw6yqsi6m 34 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 34 26 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 34 27 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 34 28 Chung Chung NNP work_ayatblpinzaztdzhilw6yqsi6m 34 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 34 30 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 34 31 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 34 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 35 1 Full full JJ work_ayatblpinzaztdzhilw6yqsi6m 35 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 35 3 size size NN work_ayatblpinzaztdzhilw6yqsi6m 35 4 DOI doi NN work_ayatblpinzaztdzhilw6yqsi6m 35 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 35 6 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 35 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 35 8 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 35 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 35 10 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 35 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 35 12 fig-1 fig-1 NNP work_ayatblpinzaztdzhilw6yqsi6m 35 13 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 35 14 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 35 15 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 35 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 36 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 36 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 36 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 36 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 36 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 36 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 36 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 37 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 37 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 37 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 37 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 37 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 37 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 37 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 37 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 37 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 37 10 2/24 2/24 CD work_ayatblpinzaztdzhilw6yqsi6m 37 11 http://dx.doi.org/10.7717/peerj-cs.361/fig-1 http://dx.doi.org/10.7717/peerj-cs.361/fig-1 NN work_ayatblpinzaztdzhilw6yqsi6m 37 12 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 37 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 37 14 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 37 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 37 16 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 37 17 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 37 18 very very RB work_ayatblpinzaztdzhilw6yqsi6m 37 19 challenging challenging JJ work_ayatblpinzaztdzhilw6yqsi6m 37 20 to to TO work_ayatblpinzaztdzhilw6yqsi6m 37 21 recognize recognize VB work_ayatblpinzaztdzhilw6yqsi6m 37 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 37 23 isolate isolate VB work_ayatblpinzaztdzhilw6yqsi6m 37 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 37 25 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 37 26 from from IN work_ayatblpinzaztdzhilw6yqsi6m 37 27 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 37 28 due due IN work_ayatblpinzaztdzhilw6yqsi6m 37 29 to to IN work_ayatblpinzaztdzhilw6yqsi6m 37 30 the the DT work_ayatblpinzaztdzhilw6yqsi6m 37 31 similarity similarity NN work_ayatblpinzaztdzhilw6yqsi6m 37 32 in in IN work_ayatblpinzaztdzhilw6yqsi6m 37 33 nature nature NN work_ayatblpinzaztdzhilw6yqsi6m 37 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 38 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 38 2 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 38 3 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 38 4 more more RBR work_ayatblpinzaztdzhilw6yqsi6m 38 5 menacing menacing JJ work_ayatblpinzaztdzhilw6yqsi6m 38 6 than than IN work_ayatblpinzaztdzhilw6yqsi6m 38 7 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 38 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 38 9 as as IN work_ayatblpinzaztdzhilw6yqsi6m 38 10 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 38 11 not not RB work_ayatblpinzaztdzhilw6yqsi6m 38 12 only only RB work_ayatblpinzaztdzhilw6yqsi6m 38 13 damages damage VBZ work_ayatblpinzaztdzhilw6yqsi6m 38 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 38 15 system system NN work_ayatblpinzaztdzhilw6yqsi6m 38 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 38 17 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 38 18 in in IN work_ayatblpinzaztdzhilw6yqsi6m 38 19 loss loss NN work_ayatblpinzaztdzhilw6yqsi6m 38 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 38 21 control control NN work_ayatblpinzaztdzhilw6yqsi6m 38 22 from from IN work_ayatblpinzaztdzhilw6yqsi6m 38 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 38 24 system system NN work_ayatblpinzaztdzhilw6yqsi6m 38 25 but but CC work_ayatblpinzaztdzhilw6yqsi6m 38 26 also also RB work_ayatblpinzaztdzhilw6yqsi6m 38 27 demands demand VBZ work_ayatblpinzaztdzhilw6yqsi6m 38 28 compensation compensation NN work_ayatblpinzaztdzhilw6yqsi6m 38 29 in in IN work_ayatblpinzaztdzhilw6yqsi6m 38 30 return return NN work_ayatblpinzaztdzhilw6yqsi6m 38 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 39 1 Therefore therefore RB work_ayatblpinzaztdzhilw6yqsi6m 39 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 39 3 there there EX work_ayatblpinzaztdzhilw6yqsi6m 39 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 39 5 a a DT work_ayatblpinzaztdzhilw6yqsi6m 39 6 need need NN work_ayatblpinzaztdzhilw6yqsi6m 39 7 to to TO work_ayatblpinzaztdzhilw6yqsi6m 39 8 have have VB work_ayatblpinzaztdzhilw6yqsi6m 39 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 39 10 proper proper JJ work_ayatblpinzaztdzhilw6yqsi6m 39 11 distinction distinction NN work_ayatblpinzaztdzhilw6yqsi6m 39 12 of of IN work_ayatblpinzaztdzhilw6yqsi6m 39 13 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 39 14 from from IN work_ayatblpinzaztdzhilw6yqsi6m 39 15 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 39 16 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 39 17 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 39 18 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 39 19 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 39 20 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 39 21 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 39 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 39 23 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 39 24 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 39 25 Kok Kok NNP work_ayatblpinzaztdzhilw6yqsi6m 39 26 et et FW work_ayatblpinzaztdzhilw6yqsi6m 39 27 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 39 28 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 39 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 39 30 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 39 31 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 39 32 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 39 33 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 39 34 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 39 35 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 39 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 39 37 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 39 38 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 39 39 to to TO work_ayatblpinzaztdzhilw6yqsi6m 39 40 save save VB work_ayatblpinzaztdzhilw6yqsi6m 39 41 billions billion NNS work_ayatblpinzaztdzhilw6yqsi6m 39 42 of of IN work_ayatblpinzaztdzhilw6yqsi6m 39 43 dollars dollar NNS work_ayatblpinzaztdzhilw6yqsi6m 39 44 in in IN work_ayatblpinzaztdzhilw6yqsi6m 39 45 financial financial JJ work_ayatblpinzaztdzhilw6yqsi6m 39 46 losses loss NNS work_ayatblpinzaztdzhilw6yqsi6m 39 47 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 39 48 Davies Davies NNPS work_ayatblpinzaztdzhilw6yqsi6m 39 49 , , , work_ayatblpinzaztdzhilw6yqsi6m 39 50 Macfarlane Macfarlane NNP work_ayatblpinzaztdzhilw6yqsi6m 39 51 & & CC work_ayatblpinzaztdzhilw6yqsi6m 39 52 Buchanan Buchanan NNP work_ayatblpinzaztdzhilw6yqsi6m 39 53 , , , work_ayatblpinzaztdzhilw6yqsi6m 39 54 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 39 55 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 39 56 . . . work_ayatblpinzaztdzhilw6yqsi6m 40 1 Before before IN work_ayatblpinzaztdzhilw6yqsi6m 40 2 analyzing analyze VBG work_ayatblpinzaztdzhilw6yqsi6m 40 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 40 4 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 40 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 40 6 one one CD work_ayatblpinzaztdzhilw6yqsi6m 40 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 40 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 40 9 mandatory mandatory JJ work_ayatblpinzaztdzhilw6yqsi6m 40 10 steps step NNS work_ayatblpinzaztdzhilw6yqsi6m 40 11 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 40 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 40 13 accurate accurate JJ work_ayatblpinzaztdzhilw6yqsi6m 40 14 identification identification NN work_ayatblpinzaztdzhilw6yqsi6m 40 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 40 16 a a DT work_ayatblpinzaztdzhilw6yqsi6m 40 17 particular particular JJ work_ayatblpinzaztdzhilw6yqsi6m 40 18 type type NN work_ayatblpinzaztdzhilw6yqsi6m 40 19 of of IN work_ayatblpinzaztdzhilw6yqsi6m 40 20 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 40 21 and and CC work_ayatblpinzaztdzhilw6yqsi6m 40 22 differentiating differentiate VBG work_ayatblpinzaztdzhilw6yqsi6m 40 23 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 40 24 from from IN work_ayatblpinzaztdzhilw6yqsi6m 40 25 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 40 26 typical typical JJ work_ayatblpinzaztdzhilw6yqsi6m 40 27 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 40 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 41 1 Broadly broadly RB work_ayatblpinzaztdzhilw6yqsi6m 41 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 41 3 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 41 4 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 41 5 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 41 6 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 41 7 categorized categorize VBN work_ayatblpinzaztdzhilw6yqsi6m 41 8 as as IN work_ayatblpinzaztdzhilw6yqsi6m 41 9 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 41 10 1 1 LS work_ayatblpinzaztdzhilw6yqsi6m 41 11 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 41 12 static static NN work_ayatblpinzaztdzhilw6yqsi6m 41 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 41 14 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 41 15 2 2 LS work_ayatblpinzaztdzhilw6yqsi6m 41 16 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 41 17 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 41 18 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 41 19 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 41 20 Chen Chen NNP work_ayatblpinzaztdzhilw6yqsi6m 41 21 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 41 22 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 41 23 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 41 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 41 25 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 41 26 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 41 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 42 1 Besides besides IN work_ayatblpinzaztdzhilw6yqsi6m 42 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 42 3 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 42 4 researchers researcher NNS work_ayatblpinzaztdzhilw6yqsi6m 42 5 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 42 6 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 42 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 42 8 combinations combination NNS work_ayatblpinzaztdzhilw6yqsi6m 42 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 42 10 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 42 11 and and CC work_ayatblpinzaztdzhilw6yqsi6m 42 12 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 42 13 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 42 14 in in IN work_ayatblpinzaztdzhilw6yqsi6m 42 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 42 16 form form NN work_ayatblpinzaztdzhilw6yqsi6m 42 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 42 18 hybrid hybrid JJ work_ayatblpinzaztdzhilw6yqsi6m 42 19 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 42 20 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 42 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 43 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 43 2 procedure procedure NN work_ayatblpinzaztdzhilw6yqsi6m 43 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 43 4 scrutinizing scrutinize VBG work_ayatblpinzaztdzhilw6yqsi6m 43 5 a a DT work_ayatblpinzaztdzhilw6yqsi6m 43 6 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 43 7 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 43 8 without without IN work_ayatblpinzaztdzhilw6yqsi6m 43 9 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 43 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 43 11 program program NN work_ayatblpinzaztdzhilw6yqsi6m 43 12 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 43 13 referred refer VBN work_ayatblpinzaztdzhilw6yqsi6m 43 14 to to IN work_ayatblpinzaztdzhilw6yqsi6m 43 15 as as IN work_ayatblpinzaztdzhilw6yqsi6m 43 16 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 43 17 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 43 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 43 19 whereas whereas IN work_ayatblpinzaztdzhilw6yqsi6m 43 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 43 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 43 22 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 43 23 performed perform VBN work_ayatblpinzaztdzhilw6yqsi6m 43 24 via via IN work_ayatblpinzaztdzhilw6yqsi6m 43 25 observing observe VBG work_ayatblpinzaztdzhilw6yqsi6m 43 26 the the DT work_ayatblpinzaztdzhilw6yqsi6m 43 27 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 43 28 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 43 29 of of IN work_ayatblpinzaztdzhilw6yqsi6m 43 30 a a DT work_ayatblpinzaztdzhilw6yqsi6m 43 31 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 43 32 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 43 33 known know VBN work_ayatblpinzaztdzhilw6yqsi6m 43 34 as as IN work_ayatblpinzaztdzhilw6yqsi6m 43 35 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 43 36 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 43 37 . . . work_ayatblpinzaztdzhilw6yqsi6m 44 1 Most Most JJS work_ayatblpinzaztdzhilw6yqsi6m 44 2 contemporary contemporary JJ work_ayatblpinzaztdzhilw6yqsi6m 44 3 state state NN work_ayatblpinzaztdzhilw6yqsi6m 44 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 44 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 44 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 44 7 the- the- NN work_ayatblpinzaztdzhilw6yqsi6m 44 8 art art NN work_ayatblpinzaztdzhilw6yqsi6m 44 9 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 44 10 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 44 11 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 44 12 detect detect VBP work_ayatblpinzaztdzhilw6yqsi6m 44 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 44 14 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 44 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 44 16 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 44 17 hides hide VBZ work_ayatblpinzaztdzhilw6yqsi6m 44 18 itself -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 44 19 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 44 20 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 44 21 obfuscation obfuscation NN work_ayatblpinzaztdzhilw6yqsi6m 44 22 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 44 23 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 44 24 as as IN work_ayatblpinzaztdzhilw6yqsi6m 44 25 packed pack VBN work_ayatblpinzaztdzhilw6yqsi6m 44 26 programs program NNS work_ayatblpinzaztdzhilw6yqsi6m 44 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 44 28 compressed compress VBN work_ayatblpinzaztdzhilw6yqsi6m 44 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 44 30 or or CC work_ayatblpinzaztdzhilw6yqsi6m 44 31 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 44 32 transformation transformation NN work_ayatblpinzaztdzhilw6yqsi6m 44 33 , , , work_ayatblpinzaztdzhilw6yqsi6m 44 34 indirect indirect JJ work_ayatblpinzaztdzhilw6yqsi6m 44 35 addressing addressing NN work_ayatblpinzaztdzhilw6yqsi6m 44 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 44 37 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 44 38 . . . work_ayatblpinzaztdzhilw6yqsi6m 45 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 45 2 Behera Behera NNP work_ayatblpinzaztdzhilw6yqsi6m 45 3 & & CC work_ayatblpinzaztdzhilw6yqsi6m 45 4 Bhaskari Bhaskari NNP work_ayatblpinzaztdzhilw6yqsi6m 45 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 45 6 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 45 7 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 45 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 46 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 46 2 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 46 3 employs employ VBZ work_ayatblpinzaztdzhilw6yqsi6m 46 4 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 46 5 hijacking hijacking NN work_ayatblpinzaztdzhilw6yqsi6m 46 6 strategies strategy NNS work_ayatblpinzaztdzhilw6yqsi6m 46 7 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 46 8 as as IN work_ayatblpinzaztdzhilw6yqsi6m 46 9 behaving behave VBG work_ayatblpinzaztdzhilw6yqsi6m 46 10 like like IN work_ayatblpinzaztdzhilw6yqsi6m 46 11 an an DT work_ayatblpinzaztdzhilw6yqsi6m 46 12 adware adware NN work_ayatblpinzaztdzhilw6yqsi6m 46 13 resulting result VBG work_ayatblpinzaztdzhilw6yqsi6m 46 14 in in IN work_ayatblpinzaztdzhilw6yqsi6m 46 15 unwanted unwanted JJ work_ayatblpinzaztdzhilw6yqsi6m 46 16 advertisements advertisement NNS work_ayatblpinzaztdzhilw6yqsi6m 46 17 or or CC work_ayatblpinzaztdzhilw6yqsi6m 46 18 hiding hide VBG work_ayatblpinzaztdzhilw6yqsi6m 46 19 itself -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 46 20 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 46 21 rootkits rootkit NNS work_ayatblpinzaztdzhilw6yqsi6m 46 22 to to TO work_ayatblpinzaztdzhilw6yqsi6m 46 23 bypass bypass VB work_ayatblpinzaztdzhilw6yqsi6m 46 24 Anti Anti NNP work_ayatblpinzaztdzhilw6yqsi6m 46 25 - - NNP work_ayatblpinzaztdzhilw6yqsi6m 46 26 Viruses Viruses NNP work_ayatblpinzaztdzhilw6yqsi6m 46 27 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 46 28 AV AV NNP work_ayatblpinzaztdzhilw6yqsi6m 46 29 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 46 30 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 46 31 Demme Demme NNP work_ayatblpinzaztdzhilw6yqsi6m 46 32 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 46 33 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 46 34 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 46 35 , , , work_ayatblpinzaztdzhilw6yqsi6m 46 36 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 46 37 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 46 38 . . . work_ayatblpinzaztdzhilw6yqsi6m 47 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 47 2 rootkit rootkit NNS work_ayatblpinzaztdzhilw6yqsi6m 47 3 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 47 4 a a DT work_ayatblpinzaztdzhilw6yqsi6m 47 5 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 47 6 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 47 7 alters alter VBZ work_ayatblpinzaztdzhilw6yqsi6m 47 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 47 9 operating operating NN work_ayatblpinzaztdzhilw6yqsi6m 47 10 system system NN work_ayatblpinzaztdzhilw6yqsi6m 47 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 47 12 OS OS NNP work_ayatblpinzaztdzhilw6yqsi6m 47 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 47 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 47 15 resides reside VBZ work_ayatblpinzaztdzhilw6yqsi6m 47 16 in in IN work_ayatblpinzaztdzhilw6yqsi6m 47 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 47 18 system system NN work_ayatblpinzaztdzhilw6yqsi6m 47 19 for for IN work_ayatblpinzaztdzhilw6yqsi6m 47 20 a a DT work_ayatblpinzaztdzhilw6yqsi6m 47 21 prolonged prolonged JJ work_ayatblpinzaztdzhilw6yqsi6m 47 22 period period NN work_ayatblpinzaztdzhilw6yqsi6m 47 23 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 47 24 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 47 25 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 47 26 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 47 27 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 47 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 47 29 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 47 30 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 47 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 48 1 Today today NN work_ayatblpinzaztdzhilw6yqsi6m 48 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 48 3 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 48 4 anti anti NNS work_ayatblpinzaztdzhilw6yqsi6m 48 5 - - NNS work_ayatblpinzaztdzhilw6yqsi6m 48 6 viruses virus NNS work_ayatblpinzaztdzhilw6yqsi6m 48 7 tackle tackle VBP work_ayatblpinzaztdzhilw6yqsi6m 48 8 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 48 9 to to TO work_ayatblpinzaztdzhilw6yqsi6m 48 10 dampen dampen VB work_ayatblpinzaztdzhilw6yqsi6m 48 11 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 48 12 caused cause VBN work_ayatblpinzaztdzhilw6yqsi6m 48 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 48 14 expected expect VBN work_ayatblpinzaztdzhilw6yqsi6m 48 15 damages damage NNS work_ayatblpinzaztdzhilw6yqsi6m 48 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 49 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 49 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 49 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 49 4 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 49 5 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 49 6 by by IN work_ayatblpinzaztdzhilw6yqsi6m 49 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 49 8 anti anti NNS work_ayatblpinzaztdzhilw6yqsi6m 49 9 - - NNS work_ayatblpinzaztdzhilw6yqsi6m 49 10 viruses virus NNS work_ayatblpinzaztdzhilw6yqsi6m 49 11 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 49 12 often often RB work_ayatblpinzaztdzhilw6yqsi6m 49 13 limited limited JJ work_ayatblpinzaztdzhilw6yqsi6m 49 14 to to IN work_ayatblpinzaztdzhilw6yqsi6m 49 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 49 16 prior prior JJ work_ayatblpinzaztdzhilw6yqsi6m 49 17 knowledge knowledge NN work_ayatblpinzaztdzhilw6yqsi6m 49 18 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 49 19 e.g. e.g. RB work_ayatblpinzaztdzhilw6yqsi6m 49 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 49 21 signatures signature NNS work_ayatblpinzaztdzhilw6yqsi6m 49 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 49 23 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 49 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 49 25 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 50 1 and and CC work_ayatblpinzaztdzhilw6yqsi6m 50 2 there there EX work_ayatblpinzaztdzhilw6yqsi6m 50 3 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 50 4 a a DT work_ayatblpinzaztdzhilw6yqsi6m 50 5 need need NN work_ayatblpinzaztdzhilw6yqsi6m 50 6 to to TO work_ayatblpinzaztdzhilw6yqsi6m 50 7 have have VB work_ayatblpinzaztdzhilw6yqsi6m 50 8 more more RBR work_ayatblpinzaztdzhilw6yqsi6m 50 9 comprehensive comprehensive JJ work_ayatblpinzaztdzhilw6yqsi6m 50 10 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 50 11 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 50 12 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 50 13 could could MD work_ayatblpinzaztdzhilw6yqsi6m 50 14 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 50 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 50 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 50 17 employing employ VBG work_ayatblpinzaztdzhilw6yqsi6m 50 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 50 19 obfuscation obfuscation NN work_ayatblpinzaztdzhilw6yqsi6m 50 20 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 50 21 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 50 22 Demme Demme NNP work_ayatblpinzaztdzhilw6yqsi6m 50 23 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 50 24 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 50 25 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 50 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 50 27 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 50 28 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 50 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 50 30 utilizing utilize VBG work_ayatblpinzaztdzhilw6yqsi6m 50 31 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 50 32 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 50 33 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 50 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 51 1 Hardware Hardware NNP work_ayatblpinzaztdzhilw6yqsi6m 51 2 Performance Performance NNP work_ayatblpinzaztdzhilw6yqsi6m 51 3 Counters Counters NNP work_ayatblpinzaztdzhilw6yqsi6m 51 4 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 51 5 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 51 6 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 51 7 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 51 8 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 51 9 typically typically RB work_ayatblpinzaztdzhilw6yqsi6m 51 10 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 51 11 by by IN work_ayatblpinzaztdzhilw6yqsi6m 51 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 51 13 programmers programmer NNS work_ayatblpinzaztdzhilw6yqsi6m 51 14 to to TO work_ayatblpinzaztdzhilw6yqsi6m 51 15 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 51 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 51 17 measure measure VB work_ayatblpinzaztdzhilw6yqsi6m 51 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 51 19 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 51 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 51 21 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 51 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 51 23 to to TO work_ayatblpinzaztdzhilw6yqsi6m 51 24 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 51 25 the the DT work_ayatblpinzaztdzhilw6yqsi6m 51 26 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 51 27 bottlenecks bottleneck NNS work_ayatblpinzaztdzhilw6yqsi6m 51 28 of of IN work_ayatblpinzaztdzhilw6yqsi6m 51 29 a a DT work_ayatblpinzaztdzhilw6yqsi6m 51 30 program program NN work_ayatblpinzaztdzhilw6yqsi6m 51 31 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 51 32 Beneventi Beneventi NNP work_ayatblpinzaztdzhilw6yqsi6m 51 33 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 51 34 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 51 35 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 51 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 51 37 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 51 38 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 51 39 Kuruvila Kuruvila NNP work_ayatblpinzaztdzhilw6yqsi6m 51 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 51 41 Kundu Kundu NNP work_ayatblpinzaztdzhilw6yqsi6m 51 42 & & CC work_ayatblpinzaztdzhilw6yqsi6m 51 43 Basu Basu NNP work_ayatblpinzaztdzhilw6yqsi6m 51 44 , , , work_ayatblpinzaztdzhilw6yqsi6m 51 45 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 51 46 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 51 47 . . . work_ayatblpinzaztdzhilw6yqsi6m 52 1 Initially initially RB work_ayatblpinzaztdzhilw6yqsi6m 52 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 52 3 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 52 4 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 52 5 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 52 6 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 52 7 for for IN work_ayatblpinzaztdzhilw6yqsi6m 52 8 investigating investigate VBG work_ayatblpinzaztdzhilw6yqsi6m 52 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 52 10 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 52 11 and and CC work_ayatblpinzaztdzhilw6yqsi6m 52 12 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 52 13 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 52 14 of of IN work_ayatblpinzaztdzhilw6yqsi6m 52 15 programs program NNS work_ayatblpinzaztdzhilw6yqsi6m 52 16 to to TO work_ayatblpinzaztdzhilw6yqsi6m 52 17 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 52 18 any any DT work_ayatblpinzaztdzhilw6yqsi6m 52 19 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 52 20 amendments amendment NNS work_ayatblpinzaztdzhilw6yqsi6m 52 21 as as IN work_ayatblpinzaztdzhilw6yqsi6m 52 22 mentioned mention VBN work_ayatblpinzaztdzhilw6yqsi6m 52 23 in in IN work_ayatblpinzaztdzhilw6yqsi6m 52 24 Alam Alam NNP work_ayatblpinzaztdzhilw6yqsi6m 52 25 et et FW work_ayatblpinzaztdzhilw6yqsi6m 52 26 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 52 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 53 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 53 2 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 53 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 53 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 53 5 Malone Malone NNP work_ayatblpinzaztdzhilw6yqsi6m 53 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 53 7 Zahran Zahran NNP work_ayatblpinzaztdzhilw6yqsi6m 53 8 & & CC work_ayatblpinzaztdzhilw6yqsi6m 53 9 Karri Karri NNP work_ayatblpinzaztdzhilw6yqsi6m 53 10 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 53 11 2011 2011 CD work_ayatblpinzaztdzhilw6yqsi6m 53 12 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 53 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 54 1 Several several JJ work_ayatblpinzaztdzhilw6yqsi6m 54 2 studies study NNS work_ayatblpinzaztdzhilw6yqsi6m 54 3 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 54 4 Das Das NNP work_ayatblpinzaztdzhilw6yqsi6m 54 5 et et FW work_ayatblpinzaztdzhilw6yqsi6m 54 6 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 54 7 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 54 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 9 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 54 10 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 54 11 Demme Demme NNP work_ayatblpinzaztdzhilw6yqsi6m 54 12 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 54 13 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 54 14 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 54 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 16 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 54 17 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 54 18 Singh Singh NNP work_ayatblpinzaztdzhilw6yqsi6m 54 19 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 54 20 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 54 21 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 54 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 23 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 54 24 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 54 25 Wang Wang NNP work_ayatblpinzaztdzhilw6yqsi6m 54 26 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 54 27 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 54 28 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 54 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 30 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 54 31 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 54 32 discuss discuss VBP work_ayatblpinzaztdzhilw6yqsi6m 54 33 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 54 34 implications implication NNS work_ayatblpinzaztdzhilw6yqsi6m 54 35 of of IN work_ayatblpinzaztdzhilw6yqsi6m 54 36 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 54 37 HPC HPC NNP work_ayatblpinzaztdzhilw6yqsi6m 54 38 for for IN work_ayatblpinzaztdzhilw6yqsi6m 54 39 application application NN work_ayatblpinzaztdzhilw6yqsi6m 54 40 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 54 41 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 42 and and CC work_ayatblpinzaztdzhilw6yqsi6m 54 43 the the DT work_ayatblpinzaztdzhilw6yqsi6m 54 44 majority majority NN work_ayatblpinzaztdzhilw6yqsi6m 54 45 of of IN work_ayatblpinzaztdzhilw6yqsi6m 54 46 them -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 54 47 suggest suggest VBP work_ayatblpinzaztdzhilw6yqsi6m 54 48 that that IN work_ayatblpinzaztdzhilw6yqsi6m 54 49 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 54 50 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 54 51 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 54 52 can can MD work_ayatblpinzaztdzhilw6yqsi6m 54 53 effectuate effectuate VB work_ayatblpinzaztdzhilw6yqsi6m 54 54 the the DT work_ayatblpinzaztdzhilw6yqsi6m 54 55 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 54 56 of of IN work_ayatblpinzaztdzhilw6yqsi6m 54 57 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 54 58 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 54 59 Demme Demme NNP work_ayatblpinzaztdzhilw6yqsi6m 54 60 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 54 61 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 54 62 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 54 63 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 64 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 54 65 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 54 66 Singh Singh NNP work_ayatblpinzaztdzhilw6yqsi6m 54 67 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 54 68 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 54 69 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 54 70 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 71 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 54 72 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 54 73 Wang Wang NNP work_ayatblpinzaztdzhilw6yqsi6m 54 74 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 54 75 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 54 76 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 54 77 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 78 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 54 79 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 54 80 Kuruvila Kuruvila NNP work_ayatblpinzaztdzhilw6yqsi6m 54 81 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 82 Kundu Kundu NNP work_ayatblpinzaztdzhilw6yqsi6m 54 83 & & CC work_ayatblpinzaztdzhilw6yqsi6m 54 84 Basu Basu NNP work_ayatblpinzaztdzhilw6yqsi6m 54 85 , , , work_ayatblpinzaztdzhilw6yqsi6m 54 86 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 54 87 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 54 88 . . . work_ayatblpinzaztdzhilw6yqsi6m 55 1 Another another DT work_ayatblpinzaztdzhilw6yqsi6m 55 2 study study NN work_ayatblpinzaztdzhilw6yqsi6m 55 3 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 55 4 Xu Xu NNP work_ayatblpinzaztdzhilw6yqsi6m 55 5 et et FW work_ayatblpinzaztdzhilw6yqsi6m 55 6 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 55 7 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 55 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 55 9 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 55 10 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 55 11 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 55 12 utilized utilize VBN work_ayatblpinzaztdzhilw6yqsi6m 55 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 55 14 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 55 15 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 55 16 profiles profile NNS work_ayatblpinzaztdzhilw6yqsi6m 55 17 to to TO work_ayatblpinzaztdzhilw6yqsi6m 55 18 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 55 19 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 55 20 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 55 21 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 55 22 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 55 23 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 55 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 55 25 as as IN work_ayatblpinzaztdzhilw6yqsi6m 55 26 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 55 27 changes change VBZ work_ayatblpinzaztdzhilw6yqsi6m 55 28 data data NN work_ayatblpinzaztdzhilw6yqsi6m 55 29 structures structure NNS work_ayatblpinzaztdzhilw6yqsi6m 55 30 and and CC work_ayatblpinzaztdzhilw6yqsi6m 55 31 control control NN work_ayatblpinzaztdzhilw6yqsi6m 55 32 flow flow NN work_ayatblpinzaztdzhilw6yqsi6m 55 33 , , , work_ayatblpinzaztdzhilw6yqsi6m 55 34 leaving leave VBG work_ayatblpinzaztdzhilw6yqsi6m 55 35 fingerprints fingerprint NNS work_ayatblpinzaztdzhilw6yqsi6m 55 36 on on IN work_ayatblpinzaztdzhilw6yqsi6m 55 37 accesses access NNS work_ayatblpinzaztdzhilw6yqsi6m 55 38 to to TO work_ayatblpinzaztdzhilw6yqsi6m 55 39 program program NN work_ayatblpinzaztdzhilw6yqsi6m 55 40 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 55 41 . . . work_ayatblpinzaztdzhilw6yqsi6m 56 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 56 2 this this DT work_ayatblpinzaztdzhilw6yqsi6m 56 3 respect respect NN work_ayatblpinzaztdzhilw6yqsi6m 56 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 56 5 they -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 56 6 proposed propose VBD work_ayatblpinzaztdzhilw6yqsi6m 56 7 a a DT work_ayatblpinzaztdzhilw6yqsi6m 56 8 framework framework NN work_ayatblpinzaztdzhilw6yqsi6m 56 9 for for IN work_ayatblpinzaztdzhilw6yqsi6m 56 10 detecting detect VBG work_ayatblpinzaztdzhilw6yqsi6m 56 11 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 56 12 from from IN work_ayatblpinzaztdzhilw6yqsi6m 56 13 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 56 14 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 56 15 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 56 16 uses use VBZ work_ayatblpinzaztdzhilw6yqsi6m 56 17 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 56 18 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 56 19 to to TO work_ayatblpinzaztdzhilw6yqsi6m 56 20 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 56 21 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 56 22 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 56 23 of of IN work_ayatblpinzaztdzhilw6yqsi6m 56 24 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 56 25 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 56 26 on on IN work_ayatblpinzaztdzhilw6yqsi6m 56 27 access access NN work_ayatblpinzaztdzhilw6yqsi6m 56 28 patterns pattern NNS work_ayatblpinzaztdzhilw6yqsi6m 56 29 of of IN work_ayatblpinzaztdzhilw6yqsi6m 56 30 virtual virtual JJ work_ayatblpinzaztdzhilw6yqsi6m 56 31 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 56 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 57 1 Zhou Zhou NNP work_ayatblpinzaztdzhilw6yqsi6m 57 2 et et FW work_ayatblpinzaztdzhilw6yqsi6m 57 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 57 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 58 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 58 2 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 58 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 58 4 investigated investigate VBD work_ayatblpinzaztdzhilw6yqsi6m 58 5 whether whether IN work_ayatblpinzaztdzhilw6yqsi6m 58 6 HPCs HPCs NNP work_ayatblpinzaztdzhilw6yqsi6m 58 7 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 58 8 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 58 9 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 58 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 59 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 59 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 59 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 59 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 59 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 59 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 59 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 60 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 60 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 60 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 60 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 60 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 60 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 60 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 60 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 60 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 60 10 3/24 3/24 CD work_ayatblpinzaztdzhilw6yqsi6m 60 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 60 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ : work_ayatblpinzaztdzhilw6yqsi6m 60 13 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 60 14 useful useful JJ work_ayatblpinzaztdzhilw6yqsi6m 60 15 in in IN work_ayatblpinzaztdzhilw6yqsi6m 60 16 differentiating differentiate VBG work_ayatblpinzaztdzhilw6yqsi6m 60 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 60 18 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 60 19 from from IN work_ayatblpinzaztdzhilw6yqsi6m 60 20 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 60 21 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 60 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 61 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 61 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 61 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 61 4 study study NN work_ayatblpinzaztdzhilw6yqsi6m 61 5 did do VBD work_ayatblpinzaztdzhilw6yqsi6m 61 6 not not RB work_ayatblpinzaztdzhilw6yqsi6m 61 7 consider consider VB work_ayatblpinzaztdzhilw6yqsi6m 61 8 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 61 9 as as IN work_ayatblpinzaztdzhilw6yqsi6m 61 10 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 61 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 62 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 62 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 62 3 utilizing utilize VBG work_ayatblpinzaztdzhilw6yqsi6m 62 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 62 5 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 62 6 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 62 7 measurements measurement NNS work_ayatblpinzaztdzhilw6yqsi6m 62 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 62 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 62 10 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 62 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 62 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 62 13 low low JJ work_ayatblpinzaztdzhilw6yqsi6m 62 14 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 62 15 level level NN work_ayatblpinzaztdzhilw6yqsi6m 62 16 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 62 17 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 62 18 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 62 19 not not RB work_ayatblpinzaztdzhilw6yqsi6m 62 20 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 62 21 previously previously RB work_ayatblpinzaztdzhilw6yqsi6m 62 22 studied study VBN work_ayatblpinzaztdzhilw6yqsi6m 62 23 for for IN work_ayatblpinzaztdzhilw6yqsi6m 62 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 62 25 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 62 26 and and CC work_ayatblpinzaztdzhilw6yqsi6m 62 27 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 62 28 of of IN work_ayatblpinzaztdzhilw6yqsi6m 62 29 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 62 30 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 62 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 63 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 63 2 argue argue VBP work_ayatblpinzaztdzhilw6yqsi6m 63 3 that that IN work_ayatblpinzaztdzhilw6yqsi6m 63 4 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 63 5 reveals reveal VBZ work_ayatblpinzaztdzhilw6yqsi6m 63 6 itself -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 63 7 by by IN work_ayatblpinzaztdzhilw6yqsi6m 63 8 exhibiting exhibit VBG work_ayatblpinzaztdzhilw6yqsi6m 63 9 peculiar peculiar JJ work_ayatblpinzaztdzhilw6yqsi6m 63 10 patterns pattern NNS work_ayatblpinzaztdzhilw6yqsi6m 63 11 in in IN work_ayatblpinzaztdzhilw6yqsi6m 63 12 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 63 13 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 63 14 e.g. e.g. RB work_ayatblpinzaztdzhilw6yqsi6m 63 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 63 16 through through IN work_ayatblpinzaztdzhilw6yqsi6m 63 17 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 63 18 cycles cycle NNS work_ayatblpinzaztdzhilw6yqsi6m 63 19 , , , work_ayatblpinzaztdzhilw6yqsi6m 63 20 cache cache NNP work_ayatblpinzaztdzhilw6yqsi6m 63 21 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 63 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 63 23 hits hit NNS work_ayatblpinzaztdzhilw6yqsi6m 63 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 63 25 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 63 26 instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 63 27 and and CC work_ayatblpinzaztdzhilw6yqsi6m 63 28 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 63 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 63 30 retired retire VBN work_ayatblpinzaztdzhilw6yqsi6m 63 31 instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 63 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 63 33 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 63 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 63 35 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 63 36 . . . work_ayatblpinzaztdzhilw6yqsi6m 64 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 64 2 this this DT work_ayatblpinzaztdzhilw6yqsi6m 64 3 article article NN work_ayatblpinzaztdzhilw6yqsi6m 64 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 64 5 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 64 6 present present VBP work_ayatblpinzaztdzhilw6yqsi6m 64 7 a a DT work_ayatblpinzaztdzhilw6yqsi6m 64 8 framework framework NN work_ayatblpinzaztdzhilw6yqsi6m 64 9 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 64 10 on on IN work_ayatblpinzaztdzhilw6yqsi6m 64 11 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 64 12 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 64 13 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 64 14 mainly mainly RB work_ayatblpinzaztdzhilw6yqsi6m 64 15 focuses focus VBZ work_ayatblpinzaztdzhilw6yqsi6m 64 16 on on IN work_ayatblpinzaztdzhilw6yqsi6m 64 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 64 18 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 64 19 of of IN work_ayatblpinzaztdzhilw6yqsi6m 64 20 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 64 21 from from IN work_ayatblpinzaztdzhilw6yqsi6m 64 22 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 64 23 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 64 24 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 64 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 65 1 This this DT work_ayatblpinzaztdzhilw6yqsi6m 65 2 article article NN work_ayatblpinzaztdzhilw6yqsi6m 65 3 contemplates contemplate VBZ work_ayatblpinzaztdzhilw6yqsi6m 65 4 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 65 5 to to TO work_ayatblpinzaztdzhilw6yqsi6m 65 6 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 65 7 Microsoft Microsoft NNP work_ayatblpinzaztdzhilw6yqsi6m 65 8 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 65 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 65 10 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 65 11 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 65 12 by by IN work_ayatblpinzaztdzhilw6yqsi6m 65 13 analyzing analyze VBG work_ayatblpinzaztdzhilw6yqsi6m 65 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 65 15 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 65 16 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 65 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 65 18 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 65 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 66 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 66 2 primarily primarily RB work_ayatblpinzaztdzhilw6yqsi6m 66 3 focus focus VBP work_ayatblpinzaztdzhilw6yqsi6m 66 4 to to TO work_ayatblpinzaztdzhilw6yqsi6m 66 5 determine determine VB work_ayatblpinzaztdzhilw6yqsi6m 66 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 66 7 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 66 8 use use NN work_ayatblpinzaztdzhilw6yqsi6m 66 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 66 10 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 66 11 in in IN work_ayatblpinzaztdzhilw6yqsi6m 66 12 analyzing analyze VBG work_ayatblpinzaztdzhilw6yqsi6m 66 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 66 14 proactively proactively RB work_ayatblpinzaztdzhilw6yqsi6m 66 15 detecting detect VBG work_ayatblpinzaztdzhilw6yqsi6m 66 16 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 66 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 67 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 67 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 67 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 67 4 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 67 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 67 6 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 67 7 from from IN work_ayatblpinzaztdzhilw6yqsi6m 67 8 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 67 9 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 67 10 imperative imperative JJ work_ayatblpinzaztdzhilw6yqsi6m 67 11 because because IN work_ayatblpinzaztdzhilw6yqsi6m 67 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 67 13 damages damage NNS work_ayatblpinzaztdzhilw6yqsi6m 67 14 caused cause VBN work_ayatblpinzaztdzhilw6yqsi6m 67 15 by by IN work_ayatblpinzaztdzhilw6yqsi6m 67 16 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 67 17 drastically drastically RB work_ayatblpinzaztdzhilw6yqsi6m 67 18 ensure ensure VB work_ayatblpinzaztdzhilw6yqsi6m 67 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 67 20 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 67 21 and and CC work_ayatblpinzaztdzhilw6yqsi6m 67 22 monetary monetary JJ work_ayatblpinzaztdzhilw6yqsi6m 67 23 loss loss NN work_ayatblpinzaztdzhilw6yqsi6m 67 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 68 1 To to TO work_ayatblpinzaztdzhilw6yqsi6m 68 2 address address VB work_ayatblpinzaztdzhilw6yqsi6m 68 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 68 4 concern concern NN work_ayatblpinzaztdzhilw6yqsi6m 68 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 68 6 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 68 7 propose propose VBP work_ayatblpinzaztdzhilw6yqsi6m 68 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 68 9 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 68 10 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 68 11 utilizes utilize VBZ work_ayatblpinzaztdzhilw6yqsi6m 68 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 68 13 application application NN work_ayatblpinzaztdzhilw6yqsi6m 68 14 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 68 15 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 68 16 for for IN work_ayatblpinzaztdzhilw6yqsi6m 68 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 68 18 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 68 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 68 20 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 68 21 of of IN work_ayatblpinzaztdzhilw6yqsi6m 68 22 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 68 23 from from IN work_ayatblpinzaztdzhilw6yqsi6m 68 24 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 68 25 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 68 26 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 68 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 69 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 69 2 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 69 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 69 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 69 5 application application NN work_ayatblpinzaztdzhilw6yqsi6m 69 6 ’s ’s POS work_ayatblpinzaztdzhilw6yqsi6m 69 7 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 69 8 related related JJ work_ayatblpinzaztdzhilw6yqsi6m 69 9 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 69 10 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 69 11 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 69 12 extracted extract VBN work_ayatblpinzaztdzhilw6yqsi6m 69 13 from from IN work_ayatblpinzaztdzhilw6yqsi6m 69 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 69 15 data data NN work_ayatblpinzaztdzhilw6yqsi6m 69 16 set set NN work_ayatblpinzaztdzhilw6yqsi6m 69 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 69 18 160 160 CD work_ayatblpinzaztdzhilw6yqsi6m 69 19 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 69 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 69 21 consisting consist VBG work_ayatblpinzaztdzhilw6yqsi6m 69 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 69 23 80 80 CD work_ayatblpinzaztdzhilw6yqsi6m 69 24 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 69 25 and and CC work_ayatblpinzaztdzhilw6yqsi6m 69 26 80 80 CD work_ayatblpinzaztdzhilw6yqsi6m 69 27 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 69 28 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 69 29 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 69 30 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 69 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 70 1 Afterward afterward RB work_ayatblpinzaztdzhilw6yqsi6m 70 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 70 3 these these DT work_ayatblpinzaztdzhilw6yqsi6m 70 4 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 70 5 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 70 6 fed feed VBN work_ayatblpinzaztdzhilw6yqsi6m 70 7 to to IN work_ayatblpinzaztdzhilw6yqsi6m 70 8 some some DT work_ayatblpinzaztdzhilw6yqsi6m 70 9 well well RB work_ayatblpinzaztdzhilw6yqsi6m 70 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 70 11 known know VBN work_ayatblpinzaztdzhilw6yqsi6m 70 12 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 70 13 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 70 14 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 70 15 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 70 16 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 70 17 as as IN work_ayatblpinzaztdzhilw6yqsi6m 70 18 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 70 19 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 70 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 70 21 Kohavi Kohavi NNP work_ayatblpinzaztdzhilw6yqsi6m 70 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 70 23 1996 1996 CD work_ayatblpinzaztdzhilw6yqsi6m 70 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 70 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 70 26 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 70 27 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 70 28 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 70 29 Liaw Liaw NNP work_ayatblpinzaztdzhilw6yqsi6m 70 30 & & CC work_ayatblpinzaztdzhilw6yqsi6m 70 31 Wiener Wiener NNP work_ayatblpinzaztdzhilw6yqsi6m 70 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 70 33 2002 2002 CD work_ayatblpinzaztdzhilw6yqsi6m 70 34 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 70 35 , , , work_ayatblpinzaztdzhilw6yqsi6m 70 36 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 70 37 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 70 38 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 70 39 Friedman Friedman NNP work_ayatblpinzaztdzhilw6yqsi6m 70 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 70 41 1999 1999 CD work_ayatblpinzaztdzhilw6yqsi6m 70 42 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 70 43 and and CC work_ayatblpinzaztdzhilw6yqsi6m 70 44 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 70 45 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 70 46 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 70 47 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 70 48 XGBoost XGBoost NNP work_ayatblpinzaztdzhilw6yqsi6m 70 49 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 70 50 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 70 51 Chen Chen NNP work_ayatblpinzaztdzhilw6yqsi6m 70 52 & & CC work_ayatblpinzaztdzhilw6yqsi6m 70 53 Tong Tong NNP work_ayatblpinzaztdzhilw6yqsi6m 70 54 , , , work_ayatblpinzaztdzhilw6yqsi6m 70 55 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 70 56 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 70 57 . . . work_ayatblpinzaztdzhilw6yqsi6m 71 1 These these DT work_ayatblpinzaztdzhilw6yqsi6m 71 2 four four CD work_ayatblpinzaztdzhilw6yqsi6m 71 3 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 71 4 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 71 5 generally generally RB work_ayatblpinzaztdzhilw6yqsi6m 71 6 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 71 7 for for IN work_ayatblpinzaztdzhilw6yqsi6m 71 8 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 71 9 tasks task NNS work_ayatblpinzaztdzhilw6yqsi6m 71 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 71 11 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 71 12 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 71 13 including include VBG work_ayatblpinzaztdzhilw6yqsi6m 71 14 spam spam NN work_ayatblpinzaztdzhilw6yqsi6m 71 15 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 71 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 71 17 face face NN work_ayatblpinzaztdzhilw6yqsi6m 71 18 recognition recognition NN work_ayatblpinzaztdzhilw6yqsi6m 71 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 71 20 financial financial JJ work_ayatblpinzaztdzhilw6yqsi6m 71 21 predictions prediction NNS work_ayatblpinzaztdzhilw6yqsi6m 71 22 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 71 23 Jordan Jordan NNP work_ayatblpinzaztdzhilw6yqsi6m 71 24 & & CC work_ayatblpinzaztdzhilw6yqsi6m 71 25 Mitchell Mitchell NNP work_ayatblpinzaztdzhilw6yqsi6m 71 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 71 27 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 71 28 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 71 29 Kuruvila Kuruvila NNP work_ayatblpinzaztdzhilw6yqsi6m 71 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 71 31 Kundu Kundu NNP work_ayatblpinzaztdzhilw6yqsi6m 71 32 & & CC work_ayatblpinzaztdzhilw6yqsi6m 71 33 Basu Basu NNP work_ayatblpinzaztdzhilw6yqsi6m 71 34 , , , work_ayatblpinzaztdzhilw6yqsi6m 71 35 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 71 36 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 71 37 , , , work_ayatblpinzaztdzhilw6yqsi6m 71 38 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 71 39 . . . work_ayatblpinzaztdzhilw6yqsi6m 72 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 72 2 employ employ VBP work_ayatblpinzaztdzhilw6yqsi6m 72 3 these these DT work_ayatblpinzaztdzhilw6yqsi6m 72 4 four four CD work_ayatblpinzaztdzhilw6yqsi6m 72 5 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 72 6 as as IN work_ayatblpinzaztdzhilw6yqsi6m 72 7 part part NN work_ayatblpinzaztdzhilw6yqsi6m 72 8 of of IN work_ayatblpinzaztdzhilw6yqsi6m 72 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 72 10 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 72 11 methodology methodology NN work_ayatblpinzaztdzhilw6yqsi6m 72 12 to to TO work_ayatblpinzaztdzhilw6yqsi6m 72 13 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 72 14 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 72 15 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 72 16 for for IN work_ayatblpinzaztdzhilw6yqsi6m 72 17 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 72 18 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 72 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 73 1 These these DT work_ayatblpinzaztdzhilw6yqsi6m 73 2 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 73 3 perform perform VBP work_ayatblpinzaztdzhilw6yqsi6m 73 4 binary binary JJ work_ayatblpinzaztdzhilw6yqsi6m 73 5 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 73 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 73 7 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 73 8 software software NN work_ayatblpinzaztdzhilw6yqsi6m 73 9 into into IN work_ayatblpinzaztdzhilw6yqsi6m 73 10 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 73 11 or or CC work_ayatblpinzaztdzhilw6yqsi6m 73 12 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 73 13 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 73 14 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 73 15 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 73 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 74 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 74 2 summary summary NN work_ayatblpinzaztdzhilw6yqsi6m 74 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 74 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 5 main main JJ work_ayatblpinzaztdzhilw6yqsi6m 74 6 contributions contribution NNS work_ayatblpinzaztdzhilw6yqsi6m 74 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 8 this this DT work_ayatblpinzaztdzhilw6yqsi6m 74 9 article article NN work_ayatblpinzaztdzhilw6yqsi6m 74 10 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 74 11 as as IN work_ayatblpinzaztdzhilw6yqsi6m 74 12 follows follow VBZ work_ayatblpinzaztdzhilw6yqsi6m 74 13 : : : work_ayatblpinzaztdzhilw6yqsi6m 74 14 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 74 15 In in IN work_ayatblpinzaztdzhilw6yqsi6m 74 16 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 74 17 depth depth NN work_ayatblpinzaztdzhilw6yqsi6m 74 18 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 74 19 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 20 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 21 current current JJ work_ayatblpinzaztdzhilw6yqsi6m 74 22 state state NN work_ayatblpinzaztdzhilw6yqsi6m 74 23 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 74 24 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 25 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 74 26 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 27 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 74 28 art art NN work_ayatblpinzaztdzhilw6yqsi6m 74 29 to to TO work_ayatblpinzaztdzhilw6yqsi6m 74 30 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 74 31 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 32 merits merit NNS work_ayatblpinzaztdzhilw6yqsi6m 74 33 and and CC work_ayatblpinzaztdzhilw6yqsi6m 74 34 demerits demerit NNS work_ayatblpinzaztdzhilw6yqsi6m 74 35 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 36 several several JJ work_ayatblpinzaztdzhilw6yqsi6m 74 37 existing exist VBG work_ayatblpinzaztdzhilw6yqsi6m 74 38 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 74 39 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 74 40 � � . work_ayatblpinzaztdzhilw6yqsi6m 74 41 A a DT work_ayatblpinzaztdzhilw6yqsi6m 74 42 novel novel JJ work_ayatblpinzaztdzhilw6yqsi6m 74 43 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 74 44 for for IN work_ayatblpinzaztdzhilw6yqsi6m 74 45 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 46 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 74 47 and and CC work_ayatblpinzaztdzhilw6yqsi6m 74 48 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 74 49 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 50 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 74 51 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 74 52 into into IN work_ayatblpinzaztdzhilw6yqsi6m 74 53 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 74 54 and and CC work_ayatblpinzaztdzhilw6yqsi6m 74 55 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 74 56 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 74 57 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 74 58 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 74 59 and and CC work_ayatblpinzaztdzhilw6yqsi6m 74 60 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 74 61 An an DT work_ayatblpinzaztdzhilw6yqsi6m 74 62 empirical empirical JJ work_ayatblpinzaztdzhilw6yqsi6m 74 63 investigation investigation NN work_ayatblpinzaztdzhilw6yqsi6m 74 64 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 65 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 66 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 74 67 against against IN work_ayatblpinzaztdzhilw6yqsi6m 74 68 state state NN work_ayatblpinzaztdzhilw6yqsi6m 74 69 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 74 70 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 71 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 74 72 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 73 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 74 74 art art NN work_ayatblpinzaztdzhilw6yqsi6m 74 75 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 74 76 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 74 77 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 74 78 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 74 79 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 74 80 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 74 81 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 74 82 The the DT work_ayatblpinzaztdzhilw6yqsi6m 74 83 outcomes outcome NNS work_ayatblpinzaztdzhilw6yqsi6m 74 84 revealed reveal VBD work_ayatblpinzaztdzhilw6yqsi6m 74 85 that that IN work_ayatblpinzaztdzhilw6yqsi6m 74 86 both both CC work_ayatblpinzaztdzhilw6yqsi6m 74 87 the the DT work_ayatblpinzaztdzhilw6yqsi6m 74 88 random random JJ work_ayatblpinzaztdzhilw6yqsi6m 74 89 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 74 90 and and CC work_ayatblpinzaztdzhilw6yqsi6m 74 91 extreme extreme JJ work_ayatblpinzaztdzhilw6yqsi6m 74 92 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 74 93 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 74 94 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 74 95 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 74 96 outperformed outperform VBN work_ayatblpinzaztdzhilw6yqsi6m 74 97 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 74 98 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 74 99 and and CC work_ayatblpinzaztdzhilw6yqsi6m 74 100 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 74 101 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 74 102 by by IN work_ayatblpinzaztdzhilw6yqsi6m 74 103 attaining attain VBG work_ayatblpinzaztdzhilw6yqsi6m 74 104 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 74 105 of of IN work_ayatblpinzaztdzhilw6yqsi6m 74 106 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 74 107 for for IN work_ayatblpinzaztdzhilw6yqsi6m 74 108 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 74 109 . . . work_ayatblpinzaztdzhilw6yqsi6m 75 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 75 2 rest rest NN work_ayatblpinzaztdzhilw6yqsi6m 75 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 75 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 75 5 article article NN work_ayatblpinzaztdzhilw6yqsi6m 75 6 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 75 7 organized organize VBN work_ayatblpinzaztdzhilw6yqsi6m 75 8 as as IN work_ayatblpinzaztdzhilw6yqsi6m 75 9 follows follow VBZ work_ayatblpinzaztdzhilw6yqsi6m 75 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 76 1 “ " `` work_ayatblpinzaztdzhilw6yqsi6m 76 2 Related Related NNP work_ayatblpinzaztdzhilw6yqsi6m 76 3 Work Work NNP work_ayatblpinzaztdzhilw6yqsi6m 76 4 ” " '' work_ayatblpinzaztdzhilw6yqsi6m 76 5 describes describe VBZ work_ayatblpinzaztdzhilw6yqsi6m 76 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 76 7 related related JJ work_ayatblpinzaztdzhilw6yqsi6m 76 8 work work NN work_ayatblpinzaztdzhilw6yqsi6m 76 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 77 1 “ " `` work_ayatblpinzaztdzhilw6yqsi6m 77 2 Motivation Motivation NNP work_ayatblpinzaztdzhilw6yqsi6m 77 3 and and CC work_ayatblpinzaztdzhilw6yqsi6m 77 4 Methodology Methodology NNP work_ayatblpinzaztdzhilw6yqsi6m 77 5 ” " '' work_ayatblpinzaztdzhilw6yqsi6m 77 6 presents present VBZ work_ayatblpinzaztdzhilw6yqsi6m 77 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 77 8 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 77 9 methodology methodology NN work_ayatblpinzaztdzhilw6yqsi6m 77 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 77 11 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 77 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 77 13 feature feature VB work_ayatblpinzaztdzhilw6yqsi6m 77 14 extraction extraction NN work_ayatblpinzaztdzhilw6yqsi6m 77 15 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 77 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 78 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 78 2 “ " `` work_ayatblpinzaztdzhilw6yqsi6m 78 3 Results Results NNPS work_ayatblpinzaztdzhilw6yqsi6m 78 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 78 5 Discussion Discussion NNP work_ayatblpinzaztdzhilw6yqsi6m 78 6 ” " '' work_ayatblpinzaztdzhilw6yqsi6m 78 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 78 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 78 9 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 78 10 setup setup NN work_ayatblpinzaztdzhilw6yqsi6m 78 11 details detail NNS work_ayatblpinzaztdzhilw6yqsi6m 78 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 78 13 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 78 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 78 15 related related JJ work_ayatblpinzaztdzhilw6yqsi6m 78 16 discussions discussion NNS work_ayatblpinzaztdzhilw6yqsi6m 78 17 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 78 18 presented present VBN work_ayatblpinzaztdzhilw6yqsi6m 78 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 78 20 “ " `` work_ayatblpinzaztdzhilw6yqsi6m 78 21 Conclusions Conclusions NNPS work_ayatblpinzaztdzhilw6yqsi6m 78 22 ” " '' work_ayatblpinzaztdzhilw6yqsi6m 78 23 concludes conclude VBZ work_ayatblpinzaztdzhilw6yqsi6m 78 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 78 25 article article NN work_ayatblpinzaztdzhilw6yqsi6m 78 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 79 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 79 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 79 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 79 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 80 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 80 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 80 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 80 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 80 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 80 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 80 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 81 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 81 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 81 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 81 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 81 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 81 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 81 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 81 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 81 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 81 10 4/24 4/24 CD work_ayatblpinzaztdzhilw6yqsi6m 81 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 81 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ JJ work_ayatblpinzaztdzhilw6yqsi6m 81 13 RELATED relate VBN work_ayatblpinzaztdzhilw6yqsi6m 81 14 WORK work NN work_ayatblpinzaztdzhilw6yqsi6m 81 15 For for IN work_ayatblpinzaztdzhilw6yqsi6m 81 16 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 81 17 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 81 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 81 19 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 81 20 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 81 21 necessary necessary JJ work_ayatblpinzaztdzhilw6yqsi6m 81 22 to to TO work_ayatblpinzaztdzhilw6yqsi6m 81 23 collect collect VB work_ayatblpinzaztdzhilw6yqsi6m 81 24 key key JJ work_ayatblpinzaztdzhilw6yqsi6m 81 25 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 81 26 features feature VBZ work_ayatblpinzaztdzhilw6yqsi6m 81 27 at at IN work_ayatblpinzaztdzhilw6yqsi6m 81 28 runtime runtime NN work_ayatblpinzaztdzhilw6yqsi6m 81 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 82 1 Most Most JJS work_ayatblpinzaztdzhilw6yqsi6m 82 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 82 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 82 4 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 82 5 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 82 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 82 7 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 82 8 research research NN work_ayatblpinzaztdzhilw6yqsi6m 82 9 studies study NNS work_ayatblpinzaztdzhilw6yqsi6m 82 10 exploit exploit VBP work_ayatblpinzaztdzhilw6yqsi6m 82 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 82 12 renowned renowned JJ work_ayatblpinzaztdzhilw6yqsi6m 82 13 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 82 14 databases database NNS work_ayatblpinzaztdzhilw6yqsi6m 82 15 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 82 16 www.virusshare.com www.virusshare.com ADD work_ayatblpinzaztdzhilw6yqsi6m 82 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 82 18 for for IN work_ayatblpinzaztdzhilw6yqsi6m 82 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 82 20 acquisition acquisition NN work_ayatblpinzaztdzhilw6yqsi6m 82 21 of of IN work_ayatblpinzaztdzhilw6yqsi6m 82 22 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 82 23 software software NN work_ayatblpinzaztdzhilw6yqsi6m 82 24 and and CC work_ayatblpinzaztdzhilw6yqsi6m 82 25 use use VB work_ayatblpinzaztdzhilw6yqsi6m 82 26 quarantine quarantine NN work_ayatblpinzaztdzhilw6yqsi6m 82 27 environments environment NNS work_ayatblpinzaztdzhilw6yqsi6m 82 28 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 82 29 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 82 30 as as IN work_ayatblpinzaztdzhilw6yqsi6m 82 31 Cuckoo Cuckoo NNP work_ayatblpinzaztdzhilw6yqsi6m 82 32 ’s ’s POS work_ayatblpinzaztdzhilw6yqsi6m 82 33 sandbox sandbox NN work_ayatblpinzaztdzhilw6yqsi6m 82 34 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 82 35 Kaur Kaur NNP work_ayatblpinzaztdzhilw6yqsi6m 82 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 82 37 Dhir Dhir NNP work_ayatblpinzaztdzhilw6yqsi6m 82 38 & & CC work_ayatblpinzaztdzhilw6yqsi6m 82 39 Singh Singh NNP work_ayatblpinzaztdzhilw6yqsi6m 82 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 82 41 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 82 42 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 82 43 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 82 44 to to TO work_ayatblpinzaztdzhilw6yqsi6m 82 45 execute execute VB work_ayatblpinzaztdzhilw6yqsi6m 82 46 the the DT work_ayatblpinzaztdzhilw6yqsi6m 82 47 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 82 48 . . . work_ayatblpinzaztdzhilw6yqsi6m 83 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 83 2 Zavarsky Zavarsky NNP work_ayatblpinzaztdzhilw6yqsi6m 83 3 & & CC work_ayatblpinzaztdzhilw6yqsi6m 83 4 Lindskog Lindskog NNP work_ayatblpinzaztdzhilw6yqsi6m 83 5 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 83 6 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 83 7 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 83 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 83 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 83 10 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 83 11 presented present VBD work_ayatblpinzaztdzhilw6yqsi6m 83 12 an an DT work_ayatblpinzaztdzhilw6yqsi6m 83 13 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 83 14 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 83 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 83 16 Microsoft Microsoft NNP work_ayatblpinzaztdzhilw6yqsi6m 83 17 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 83 18 and and CC work_ayatblpinzaztdzhilw6yqsi6m 83 19 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 83 20 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 83 21 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 83 22 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 83 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 84 1 This this DT work_ayatblpinzaztdzhilw6yqsi6m 84 2 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 84 3 demonstrates demonstrate VBZ work_ayatblpinzaztdzhilw6yqsi6m 84 4 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 84 5 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 84 6 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 84 7 could could MD work_ayatblpinzaztdzhilw6yqsi6m 84 8 be be VB work_ayatblpinzaztdzhilw6yqsi6m 84 9 performed perform VBN work_ayatblpinzaztdzhilw6yqsi6m 84 10 by by IN work_ayatblpinzaztdzhilw6yqsi6m 84 11 monitoring monitor VBG work_ayatblpinzaztdzhilw6yqsi6m 84 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 84 13 abnormalities abnormality NNS work_ayatblpinzaztdzhilw6yqsi6m 84 14 in in IN work_ayatblpinzaztdzhilw6yqsi6m 84 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 84 16 file file NN work_ayatblpinzaztdzhilw6yqsi6m 84 17 system system NN work_ayatblpinzaztdzhilw6yqsi6m 84 18 and and CC work_ayatblpinzaztdzhilw6yqsi6m 84 19 registry registry NN work_ayatblpinzaztdzhilw6yqsi6m 84 20 activities activity NNS work_ayatblpinzaztdzhilw6yqsi6m 84 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 85 1 It -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 85 2 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 85 3 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 85 4 that that IN work_ayatblpinzaztdzhilw6yqsi6m 85 5 a a DT work_ayatblpinzaztdzhilw6yqsi6m 85 6 significant significant JJ work_ayatblpinzaztdzhilw6yqsi6m 85 7 number number NN work_ayatblpinzaztdzhilw6yqsi6m 85 8 of of IN work_ayatblpinzaztdzhilw6yqsi6m 85 9 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 85 10 families family NNS work_ayatblpinzaztdzhilw6yqsi6m 85 11 exhibit exhibit VBP work_ayatblpinzaztdzhilw6yqsi6m 85 12 very very RB work_ayatblpinzaztdzhilw6yqsi6m 85 13 similar similar JJ work_ayatblpinzaztdzhilw6yqsi6m 85 14 characteristics characteristic NNS work_ayatblpinzaztdzhilw6yqsi6m 85 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 86 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 86 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 86 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 86 4 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 86 5 concluded conclude VBD work_ayatblpinzaztdzhilw6yqsi6m 86 6 that that IN work_ayatblpinzaztdzhilw6yqsi6m 86 7 changes change NNS work_ayatblpinzaztdzhilw6yqsi6m 86 8 in in IN work_ayatblpinzaztdzhilw6yqsi6m 86 9 a a DT work_ayatblpinzaztdzhilw6yqsi6m 86 10 particular particular JJ work_ayatblpinzaztdzhilw6yqsi6m 86 11 set set NN work_ayatblpinzaztdzhilw6yqsi6m 86 12 of of IN work_ayatblpinzaztdzhilw6yqsi6m 86 13 registry registry NN work_ayatblpinzaztdzhilw6yqsi6m 86 14 keys key NNS work_ayatblpinzaztdzhilw6yqsi6m 86 15 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 86 16 important important JJ work_ayatblpinzaztdzhilw6yqsi6m 86 17 aspects aspect NNS work_ayatblpinzaztdzhilw6yqsi6m 86 18 to to TO work_ayatblpinzaztdzhilw6yqsi6m 86 19 be be VB work_ayatblpinzaztdzhilw6yqsi6m 86 20 analyzed analyze VBN work_ayatblpinzaztdzhilw6yqsi6m 86 21 for for IN work_ayatblpinzaztdzhilw6yqsi6m 86 22 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 86 23 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 86 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 87 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 87 2 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 87 3 discovered discover VBD work_ayatblpinzaztdzhilw6yqsi6m 87 4 that that IN work_ayatblpinzaztdzhilw6yqsi6m 87 5 Microsoft Microsoft NNP work_ayatblpinzaztdzhilw6yqsi6m 87 6 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 87 7 10 10 CD work_ayatblpinzaztdzhilw6yqsi6m 87 8 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 87 9 reasonably reasonably RB work_ayatblpinzaztdzhilw6yqsi6m 87 10 effective effective JJ work_ayatblpinzaztdzhilw6yqsi6m 87 11 against against IN work_ayatblpinzaztdzhilw6yqsi6m 87 12 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 87 13 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 87 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 88 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 88 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 88 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 88 4 study study NN work_ayatblpinzaztdzhilw6yqsi6m 88 5 also also RB work_ayatblpinzaztdzhilw6yqsi6m 88 6 revealed reveal VBD work_ayatblpinzaztdzhilw6yqsi6m 88 7 that that IN work_ayatblpinzaztdzhilw6yqsi6m 88 8 for for IN work_ayatblpinzaztdzhilw6yqsi6m 88 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 88 10 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 88 11 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 88 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 88 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 88 14 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 88 15 Manifest Manifest NNP work_ayatblpinzaztdzhilw6yqsi6m 88 16 file file NN work_ayatblpinzaztdzhilw6yqsi6m 88 17 and and CC work_ayatblpinzaztdzhilw6yqsi6m 88 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 88 19 permissions permission NNS work_ayatblpinzaztdzhilw6yqsi6m 88 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 88 21 required require VBN work_ayatblpinzaztdzhilw6yqsi6m 88 22 by by IN work_ayatblpinzaztdzhilw6yqsi6m 88 23 an an DT work_ayatblpinzaztdzhilw6yqsi6m 88 24 app app NN work_ayatblpinzaztdzhilw6yqsi6m 88 25 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 88 26 should should MD work_ayatblpinzaztdzhilw6yqsi6m 88 27 also also RB work_ayatblpinzaztdzhilw6yqsi6m 88 28 be be VB work_ayatblpinzaztdzhilw6yqsi6m 88 29 considered consider VBN work_ayatblpinzaztdzhilw6yqsi6m 88 30 for for IN work_ayatblpinzaztdzhilw6yqsi6m 88 31 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 88 32 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 88 33 . . . work_ayatblpinzaztdzhilw6yqsi6m 89 1 There there EX work_ayatblpinzaztdzhilw6yqsi6m 89 2 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 89 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 89 4 lot lot NN work_ayatblpinzaztdzhilw6yqsi6m 89 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 89 6 work work NN work_ayatblpinzaztdzhilw6yqsi6m 89 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 89 8 Alzahrani Alzahrani NNP work_ayatblpinzaztdzhilw6yqsi6m 89 9 & & CC work_ayatblpinzaztdzhilw6yqsi6m 89 10 Alghazzawi Alghazzawi NNP work_ayatblpinzaztdzhilw6yqsi6m 89 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 89 12 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 89 13 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 89 14 Victoriano Victoriano NNP work_ayatblpinzaztdzhilw6yqsi6m 89 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 89 16 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 89 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 89 18 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 89 19 to to IN work_ayatblpinzaztdzhilw6yqsi6m 89 20 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 89 21 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 89 22 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 89 23 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 89 24 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 89 25 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 89 26 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 89 27 to to TO work_ayatblpinzaztdzhilw6yqsi6m 89 28 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 89 29 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 89 30 families family NNS work_ayatblpinzaztdzhilw6yqsi6m 89 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 90 1 Authors Authors NNP work_ayatblpinzaztdzhilw6yqsi6m 90 2 in in IN work_ayatblpinzaztdzhilw6yqsi6m 90 3 Scalas Scalas NNP work_ayatblpinzaztdzhilw6yqsi6m 90 4 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 90 5 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 90 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 91 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 91 2 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 91 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 91 4 focus focus VB work_ayatblpinzaztdzhilw6yqsi6m 91 5 on on IN work_ayatblpinzaztdzhilw6yqsi6m 91 6 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 91 7 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 91 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 91 9 proposed propose VBD work_ayatblpinzaztdzhilw6yqsi6m 91 10 a a DT work_ayatblpinzaztdzhilw6yqsi6m 91 11 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 91 12 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 91 13 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 91 14 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 91 15 strategy strategy NN work_ayatblpinzaztdzhilw6yqsi6m 91 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 92 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 92 2 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 92 3 scheme scheme NN work_ayatblpinzaztdzhilw6yqsi6m 92 4 relies rely VBZ work_ayatblpinzaztdzhilw6yqsi6m 92 5 on on IN work_ayatblpinzaztdzhilw6yqsi6m 92 6 system system NN work_ayatblpinzaztdzhilw6yqsi6m 92 7 ’s ’s POS work_ayatblpinzaztdzhilw6yqsi6m 92 8 API API NNP work_ayatblpinzaztdzhilw6yqsi6m 92 9 information information NN work_ayatblpinzaztdzhilw6yqsi6m 92 10 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 92 11 as as IN work_ayatblpinzaztdzhilw6yqsi6m 92 12 packages package NNS work_ayatblpinzaztdzhilw6yqsi6m 92 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 92 14 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 92 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 92 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 92 17 methods method NNS work_ayatblpinzaztdzhilw6yqsi6m 92 18 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 92 19 traces trace NNS work_ayatblpinzaztdzhilw6yqsi6m 92 20 . . . work_ayatblpinzaztdzhilw6yqsi6m 93 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 93 2 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 93 3 scheme scheme NN work_ayatblpinzaztdzhilw6yqsi6m 93 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 93 5 capable capable JJ work_ayatblpinzaztdzhilw6yqsi6m 93 6 to to TO work_ayatblpinzaztdzhilw6yqsi6m 93 7 differentiate differentiate VB work_ayatblpinzaztdzhilw6yqsi6m 93 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 93 9 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 93 10 generic generic JJ work_ayatblpinzaztdzhilw6yqsi6m 93 11 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 93 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 93 13 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 93 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 93 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 93 16 goodware goodware NN work_ayatblpinzaztdzhilw6yqsi6m 93 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 94 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 94 2 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 94 3 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 94 4 highlight highlight VBP work_ayatblpinzaztdzhilw6yqsi6m 94 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 94 6 significance significance NN work_ayatblpinzaztdzhilw6yqsi6m 94 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 94 8 effectiveness effectiveness NN work_ayatblpinzaztdzhilw6yqsi6m 94 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 94 10 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 94 11 system system NN work_ayatblpinzaztdzhilw6yqsi6m 94 12 API api NN work_ayatblpinzaztdzhilw6yqsi6m 94 13 information information NN work_ayatblpinzaztdzhilw6yqsi6m 94 14 for for IN work_ayatblpinzaztdzhilw6yqsi6m 94 15 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 94 16 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 94 17 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 94 18 . . . work_ayatblpinzaztdzhilw6yqsi6m 95 1 Several several JJ work_ayatblpinzaztdzhilw6yqsi6m 95 2 researchers researcher NNS work_ayatblpinzaztdzhilw6yqsi6m 95 3 utilized utilize VBD work_ayatblpinzaztdzhilw6yqsi6m 95 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 95 5 hash hash NN work_ayatblpinzaztdzhilw6yqsi6m 95 6 information information NN work_ayatblpinzaztdzhilw6yqsi6m 95 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 95 8 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 95 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 95 10 comparing compare VBG work_ayatblpinzaztdzhilw6yqsi6m 95 11 hash hash NN work_ayatblpinzaztdzhilw6yqsi6m 95 12 values value NNS work_ayatblpinzaztdzhilw6yqsi6m 95 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 95 14 to to TO work_ayatblpinzaztdzhilw6yqsi6m 95 15 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 95 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 95 17 CryptoLocker CryptoLocker NNP work_ayatblpinzaztdzhilw6yqsi6m 95 18 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 95 19 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 95 20 Song Song NNP work_ayatblpinzaztdzhilw6yqsi6m 95 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 95 22 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 95 23 & & CC work_ayatblpinzaztdzhilw6yqsi6m 95 24 Lee Lee NNP work_ayatblpinzaztdzhilw6yqsi6m 95 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 95 26 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 95 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 95 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 96 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 96 2 affected affect VBN work_ayatblpinzaztdzhilw6yqsi6m 96 3 systems system NNS work_ayatblpinzaztdzhilw6yqsi6m 96 4 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 96 5 recovered recover VBN work_ayatblpinzaztdzhilw6yqsi6m 96 6 by by IN work_ayatblpinzaztdzhilw6yqsi6m 96 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 96 8 following follow VBG work_ayatblpinzaztdzhilw6yqsi6m 96 9 ways way NNS work_ayatblpinzaztdzhilw6yqsi6m 96 10 : : : work_ayatblpinzaztdzhilw6yqsi6m 96 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 96 12 1 1 LS work_ayatblpinzaztdzhilw6yqsi6m 96 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 96 14 process process NN work_ayatblpinzaztdzhilw6yqsi6m 96 15 CryptoLocker CryptoLocker NNP work_ayatblpinzaztdzhilw6yqsi6m 96 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 96 17 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 96 18 2 2 LS work_ayatblpinzaztdzhilw6yqsi6m 96 19 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 96 20 comparing compare VBG work_ayatblpinzaztdzhilw6yqsi6m 96 21 hash hash NN work_ayatblpinzaztdzhilw6yqsi6m 96 22 information information NN work_ayatblpinzaztdzhilw6yqsi6m 96 23 with with IN work_ayatblpinzaztdzhilw6yqsi6m 96 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 96 25 encrypted encrypt VBN work_ayatblpinzaztdzhilw6yqsi6m 96 26 data data NN work_ayatblpinzaztdzhilw6yqsi6m 96 27 files file NNS work_ayatblpinzaztdzhilw6yqsi6m 96 28 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 96 29 3 3 LS work_ayatblpinzaztdzhilw6yqsi6m 96 30 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 96 31 validating validate VBG work_ayatblpinzaztdzhilw6yqsi6m 96 32 the the DT work_ayatblpinzaztdzhilw6yqsi6m 96 33 key key NN work_ayatblpinzaztdzhilw6yqsi6m 96 34 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 96 35 the the DT work_ayatblpinzaztdzhilw6yqsi6m 96 36 key key JJ work_ayatblpinzaztdzhilw6yqsi6m 96 37 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 96 38 index index NN work_ayatblpinzaztdzhilw6yqsi6m 96 39 information information NN work_ayatblpinzaztdzhilw6yqsi6m 96 40 stored store VBN work_ayatblpinzaztdzhilw6yqsi6m 96 41 therein therein RB work_ayatblpinzaztdzhilw6yqsi6m 96 42 and and CC work_ayatblpinzaztdzhilw6yqsi6m 96 43 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 96 44 4 4 LS work_ayatblpinzaztdzhilw6yqsi6m 96 45 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 96 46 proceeding proceeding NN work_ayatblpinzaztdzhilw6yqsi6m 96 47 to to IN work_ayatblpinzaztdzhilw6yqsi6m 96 48 decode decode NN work_ayatblpinzaztdzhilw6yqsi6m 96 49 . . . work_ayatblpinzaztdzhilw6yqsi6m 97 1 Generally generally RB work_ayatblpinzaztdzhilw6yqsi6m 97 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 97 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 97 4 type type NN work_ayatblpinzaztdzhilw6yqsi6m 97 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 97 6 process process NN work_ayatblpinzaztdzhilw6yqsi6m 97 7 consumes consume VBZ work_ayatblpinzaztdzhilw6yqsi6m 97 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 97 9 lot lot NN work_ayatblpinzaztdzhilw6yqsi6m 97 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 97 11 time time NN work_ayatblpinzaztdzhilw6yqsi6m 97 12 for for IN work_ayatblpinzaztdzhilw6yqsi6m 97 13 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 97 14 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 97 15 with with IN work_ayatblpinzaztdzhilw6yqsi6m 97 16 a a DT work_ayatblpinzaztdzhilw6yqsi6m 97 17 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 97 18 risk risk NN work_ayatblpinzaztdzhilw6yqsi6m 97 19 that that IN work_ayatblpinzaztdzhilw6yqsi6m 97 20 another another DT work_ayatblpinzaztdzhilw6yqsi6m 97 21 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 97 22 appears appear VBZ work_ayatblpinzaztdzhilw6yqsi6m 97 23 until until IN work_ayatblpinzaztdzhilw6yqsi6m 97 24 a a DT work_ayatblpinzaztdzhilw6yqsi6m 97 25 security security NN work_ayatblpinzaztdzhilw6yqsi6m 97 26 company company NN work_ayatblpinzaztdzhilw6yqsi6m 97 27 comes come VBZ work_ayatblpinzaztdzhilw6yqsi6m 97 28 up up RP work_ayatblpinzaztdzhilw6yqsi6m 97 29 with with IN work_ayatblpinzaztdzhilw6yqsi6m 97 30 decryption decryption NN work_ayatblpinzaztdzhilw6yqsi6m 97 31 keys key NNS work_ayatblpinzaztdzhilw6yqsi6m 97 32 of of IN work_ayatblpinzaztdzhilw6yqsi6m 97 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 97 34 old old JJ work_ayatblpinzaztdzhilw6yqsi6m 97 35 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 97 36 . . . work_ayatblpinzaztdzhilw6yqsi6m 98 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 98 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 98 3 additional additional JJ work_ayatblpinzaztdzhilw6yqsi6m 98 4 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 98 5 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 98 6 needed need VBN work_ayatblpinzaztdzhilw6yqsi6m 98 7 to to TO work_ayatblpinzaztdzhilw6yqsi6m 98 8 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 98 9 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 98 10 patterns pattern NNS work_ayatblpinzaztdzhilw6yqsi6m 98 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 98 12 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 98 13 as as IN work_ayatblpinzaztdzhilw6yqsi6m 98 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 98 15 hackers hacker NNS work_ayatblpinzaztdzhilw6yqsi6m 98 16 persistently persistently RB work_ayatblpinzaztdzhilw6yqsi6m 98 17 come come VBP work_ayatblpinzaztdzhilw6yqsi6m 98 18 up up RP work_ayatblpinzaztdzhilw6yqsi6m 98 19 with with IN work_ayatblpinzaztdzhilw6yqsi6m 98 20 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 98 21 variants variant NNS work_ayatblpinzaztdzhilw6yqsi6m 98 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 98 23 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 98 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 99 1 On on IN work_ayatblpinzaztdzhilw6yqsi6m 99 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 99 3 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 99 4 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 99 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 99 6 another another DT work_ayatblpinzaztdzhilw6yqsi6m 99 7 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 99 8 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 99 9 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 99 10 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 99 11 Song Song NNP work_ayatblpinzaztdzhilw6yqsi6m 99 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 99 13 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 99 14 & & CC work_ayatblpinzaztdzhilw6yqsi6m 99 15 Lee Lee NNP work_ayatblpinzaztdzhilw6yqsi6m 99 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 99 17 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 99 18 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 99 19 to to TO work_ayatblpinzaztdzhilw6yqsi6m 99 20 prevent prevent VB work_ayatblpinzaztdzhilw6yqsi6m 99 21 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 99 22 intrusion intrusion NN work_ayatblpinzaztdzhilw6yqsi6m 99 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 100 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 100 2 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 100 3 requires require VBZ work_ayatblpinzaztdzhilw6yqsi6m 100 4 intense intense JJ work_ayatblpinzaztdzhilw6yqsi6m 100 5 monitoring monitoring NN work_ayatblpinzaztdzhilw6yqsi6m 100 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 100 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 100 8 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 100 9 processes process NNS work_ayatblpinzaztdzhilw6yqsi6m 100 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 100 11 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 100 12 of of IN work_ayatblpinzaztdzhilw6yqsi6m 100 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 100 14 particular particular JJ work_ayatblpinzaztdzhilw6yqsi6m 100 15 file file NN work_ayatblpinzaztdzhilw6yqsi6m 100 16 directories directory NNS work_ayatblpinzaztdzhilw6yqsi6m 100 17 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 100 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 100 19 statistical statistical JJ work_ayatblpinzaztdzhilw6yqsi6m 100 20 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 100 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 100 22 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 100 23 as as IN work_ayatblpinzaztdzhilw6yqsi6m 100 24 Next next JJ work_ayatblpinzaztdzhilw6yqsi6m 100 25 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 100 26 generation generation NN work_ayatblpinzaztdzhilw6yqsi6m 100 27 Intrusion Intrusion NNP work_ayatblpinzaztdzhilw6yqsi6m 100 28 Detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 100 29 Expert expert NN work_ayatblpinzaztdzhilw6yqsi6m 100 30 System system NN work_ayatblpinzaztdzhilw6yqsi6m 100 31 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 100 32 NIDES NIDES NNP work_ayatblpinzaztdzhilw6yqsi6m 100 33 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 100 34 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 100 35 Anderson Anderson NNP work_ayatblpinzaztdzhilw6yqsi6m 100 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 100 37 Thane Thane NNP work_ayatblpinzaztdzhilw6yqsi6m 100 38 & & CC work_ayatblpinzaztdzhilw6yqsi6m 100 39 Alfonso Alfonso NNP work_ayatblpinzaztdzhilw6yqsi6m 100 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 100 41 1995 1995 CD work_ayatblpinzaztdzhilw6yqsi6m 100 42 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 100 43 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 100 44 the the DT work_ayatblpinzaztdzhilw6yqsi6m 100 45 processor processor NN work_ayatblpinzaztdzhilw6yqsi6m 100 46 , , , work_ayatblpinzaztdzhilw6yqsi6m 100 47 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 100 48 usage usage NN work_ayatblpinzaztdzhilw6yqsi6m 100 49 and and CC work_ayatblpinzaztdzhilw6yqsi6m 100 50 I -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 100 51 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 100 52 O o UH work_ayatblpinzaztdzhilw6yqsi6m 100 53 rates rate NNS work_ayatblpinzaztdzhilw6yqsi6m 100 54 , , , work_ayatblpinzaztdzhilw6yqsi6m 100 55 to to TO work_ayatblpinzaztdzhilw6yqsi6m 100 56 uncover uncover VB work_ayatblpinzaztdzhilw6yqsi6m 100 57 the the DT work_ayatblpinzaztdzhilw6yqsi6m 100 58 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 100 59 exhibiting exhibit VBG work_ayatblpinzaztdzhilw6yqsi6m 100 60 abnormal abnormal JJ work_ayatblpinzaztdzhilw6yqsi6m 100 61 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 100 62 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 100 63 Song Song NNP work_ayatblpinzaztdzhilw6yqsi6m 100 64 , , , work_ayatblpinzaztdzhilw6yqsi6m 100 65 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 100 66 & & CC work_ayatblpinzaztdzhilw6yqsi6m 100 67 Lee Lee NNP work_ayatblpinzaztdzhilw6yqsi6m 100 68 , , , work_ayatblpinzaztdzhilw6yqsi6m 100 69 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 100 70 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 100 71 . . . work_ayatblpinzaztdzhilw6yqsi6m 101 1 Several several JJ work_ayatblpinzaztdzhilw6yqsi6m 101 2 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 101 3 research research NN work_ayatblpinzaztdzhilw6yqsi6m 101 4 studies study NNS work_ayatblpinzaztdzhilw6yqsi6m 101 5 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 101 6 harnessed harness VBN work_ayatblpinzaztdzhilw6yqsi6m 101 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 101 8 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 101 9 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 101 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 101 11 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 101 12 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 101 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 101 14 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 101 15 or or CC work_ayatblpinzaztdzhilw6yqsi6m 101 16 runtime runtime NN work_ayatblpinzaztdzhilw6yqsi6m 101 17 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 101 18 of of IN work_ayatblpinzaztdzhilw6yqsi6m 101 19 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 101 20 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 101 21 to to TO work_ayatblpinzaztdzhilw6yqsi6m 101 22 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 101 23 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 101 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 102 1 Recently recently RB work_ayatblpinzaztdzhilw6yqsi6m 102 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 102 3 HPCs HPCs NNP work_ayatblpinzaztdzhilw6yqsi6m 102 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 102 5 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 102 6 events event NNS work_ayatblpinzaztdzhilw6yqsi6m 102 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 102 8 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 102 9 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 102 10 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 102 11 being be VBG work_ayatblpinzaztdzhilw6yqsi6m 102 12 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 102 13 widely widely RB work_ayatblpinzaztdzhilw6yqsi6m 102 14 in in IN work_ayatblpinzaztdzhilw6yqsi6m 102 15 research research NN work_ayatblpinzaztdzhilw6yqsi6m 102 16 to to TO work_ayatblpinzaztdzhilw6yqsi6m 102 17 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 102 18 side side NN work_ayatblpinzaztdzhilw6yqsi6m 102 19 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 102 20 channel channel NN work_ayatblpinzaztdzhilw6yqsi6m 102 21 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 102 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 102 23 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 102 24 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 102 25 Or or CC work_ayatblpinzaztdzhilw6yqsi6m 102 26 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 102 27 Meir Meir NNP work_ayatblpinzaztdzhilw6yqsi6m 102 28 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 102 29 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 102 30 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 102 31 , , , work_ayatblpinzaztdzhilw6yqsi6m 102 32 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 102 33 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 102 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 103 1 Alam Alam NNP work_ayatblpinzaztdzhilw6yqsi6m 103 2 et et FW work_ayatblpinzaztdzhilw6yqsi6m 103 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 103 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 104 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 104 2 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 104 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 104 4 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 104 5 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 104 6 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 104 7 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 104 8 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 104 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 105 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 105 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 105 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 105 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 105 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 105 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 105 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 106 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 106 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 106 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 106 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 106 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 106 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 106 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 106 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 106 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 106 10 5/24 5/24 CD work_ayatblpinzaztdzhilw6yqsi6m 106 11 http://www.virusshare.com http://www.virusshare.com ADD work_ayatblpinzaztdzhilw6yqsi6m 106 12 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 106 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_ayatblpinzaztdzhilw6yqsi6m 106 14 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 106 15 features feature VBZ work_ayatblpinzaztdzhilw6yqsi6m 106 16 to to TO work_ayatblpinzaztdzhilw6yqsi6m 106 17 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 106 18 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 106 19 from from IN work_ayatblpinzaztdzhilw6yqsi6m 106 20 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 106 21 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 106 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 107 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 107 2 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 107 3 proposed propose VBD work_ayatblpinzaztdzhilw6yqsi6m 107 4 an an DT work_ayatblpinzaztdzhilw6yqsi6m 107 5 anomaly anomaly JJ work_ayatblpinzaztdzhilw6yqsi6m 107 6 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 107 7 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 107 8 to to TO work_ayatblpinzaztdzhilw6yqsi6m 107 9 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 107 10 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 107 11 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 107 12 in in IN work_ayatblpinzaztdzhilw6yqsi6m 107 13 a a DT work_ayatblpinzaztdzhilw6yqsi6m 107 14 few few JJ work_ayatblpinzaztdzhilw6yqsi6m 107 15 seconds second NNS work_ayatblpinzaztdzhilw6yqsi6m 107 16 with with IN work_ayatblpinzaztdzhilw6yqsi6m 107 17 very very RB work_ayatblpinzaztdzhilw6yqsi6m 107 18 few few JJ work_ayatblpinzaztdzhilw6yqsi6m 107 19 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 107 20 positives positive NNS work_ayatblpinzaztdzhilw6yqsi6m 107 21 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 107 22 Recurrent recurrent JJ work_ayatblpinzaztdzhilw6yqsi6m 107 23 Neural neural JJ work_ayatblpinzaztdzhilw6yqsi6m 107 24 networks network NNS work_ayatblpinzaztdzhilw6yqsi6m 107 25 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 107 26 RNN RNN NNP work_ayatblpinzaztdzhilw6yqsi6m 107 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 107 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 108 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 108 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 108 3 only only RB work_ayatblpinzaztdzhilw6yqsi6m 108 4 five five CD work_ayatblpinzaztdzhilw6yqsi6m 108 5 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 108 6 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 108 7 measures measure NNS work_ayatblpinzaztdzhilw6yqsi6m 108 8 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 108 9 is is RB work_ayatblpinzaztdzhilw6yqsi6m 108 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 108 11 instruction instruction NN work_ayatblpinzaztdzhilw6yqsi6m 108 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 108 13 cache cache NN work_ayatblpinzaztdzhilw6yqsi6m 108 14 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 108 15 references reference NNS work_ayatblpinzaztdzhilw6yqsi6m 108 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 108 17 cache cache NN work_ayatblpinzaztdzhilw6yqsi6m 108 18 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 108 19 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 108 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 108 21 branches branch NNS work_ayatblpinzaztdzhilw6yqsi6m 108 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 108 23 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 108 24 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 108 25 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 108 26 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 108 27 investigated investigate VBN work_ayatblpinzaztdzhilw6yqsi6m 108 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 108 29 whereas whereas IN work_ayatblpinzaztdzhilw6yqsi6m 108 30 the the DT work_ayatblpinzaztdzhilw6yqsi6m 108 31 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 108 32 investigation investigation NN work_ayatblpinzaztdzhilw6yqsi6m 108 33 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 108 34 with with IN work_ayatblpinzaztdzhilw6yqsi6m 108 35 one one CD work_ayatblpinzaztdzhilw6yqsi6m 108 36 type type NN work_ayatblpinzaztdzhilw6yqsi6m 108 37 of of IN work_ayatblpinzaztdzhilw6yqsi6m 108 38 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 108 39 only only RB work_ayatblpinzaztdzhilw6yqsi6m 108 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 108 41 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 108 42 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 108 43 WannaCry WannaCry NNP work_ayatblpinzaztdzhilw6yqsi6m 108 44 . . . work_ayatblpinzaztdzhilw6yqsi6m 109 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 109 2 Kadiyala Kadiyala NNP work_ayatblpinzaztdzhilw6yqsi6m 109 3 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 109 4 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 109 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 110 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 110 2 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 110 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 110 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 110 5 only only RB work_ayatblpinzaztdzhilw6yqsi6m 110 6 four four CD work_ayatblpinzaztdzhilw6yqsi6m 110 7 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 110 8 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 110 9 aspects aspect NNS work_ayatblpinzaztdzhilw6yqsi6m 110 10 were be VBD work_ayatblpinzaztdzhilw6yqsi6m 110 11 considered consider VBN work_ayatblpinzaztdzhilw6yqsi6m 110 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 111 1 Maiorca Maiorca NNP work_ayatblpinzaztdzhilw6yqsi6m 111 2 et et FW work_ayatblpinzaztdzhilw6yqsi6m 111 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 111 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 112 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 112 2 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 112 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 112 4 proposed propose VBD work_ayatblpinzaztdzhilw6yqsi6m 112 5 a a DT work_ayatblpinzaztdzhilw6yqsi6m 112 6 supervised supervise VBN work_ayatblpinzaztdzhilw6yqsi6m 112 7 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 112 8 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 112 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 112 10 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 112 11 procedure procedure NN work_ayatblpinzaztdzhilw6yqsi6m 112 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 112 13 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 112 14 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 112 15 PackDroid PackDroid NNP work_ayatblpinzaztdzhilw6yqsi6m 112 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 112 17 to to TO work_ayatblpinzaztdzhilw6yqsi6m 112 18 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 112 19 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 112 20 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 112 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 112 22 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 112 23 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 112 24 a a DT work_ayatblpinzaztdzhilw6yqsi6m 112 25 light light JJ work_ayatblpinzaztdzhilw6yqsi6m 112 26 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 112 27 weight weight NN work_ayatblpinzaztdzhilw6yqsi6m 112 28 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 112 29 and and CC work_ayatblpinzaztdzhilw6yqsi6m 112 30 does do VBZ work_ayatblpinzaztdzhilw6yqsi6m 112 31 not not RB work_ayatblpinzaztdzhilw6yqsi6m 112 32 require require VB work_ayatblpinzaztdzhilw6yqsi6m 112 33 prior prior JJ work_ayatblpinzaztdzhilw6yqsi6m 112 34 knowledge knowledge NN work_ayatblpinzaztdzhilw6yqsi6m 112 35 of of IN work_ayatblpinzaztdzhilw6yqsi6m 112 36 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 112 37 ’s ’s POS work_ayatblpinzaztdzhilw6yqsi6m 112 38 encryption encryption NN work_ayatblpinzaztdzhilw6yqsi6m 112 39 mechanisms mechanism NNS work_ayatblpinzaztdzhilw6yqsi6m 112 40 . . . work_ayatblpinzaztdzhilw6yqsi6m 113 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 113 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 113 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 113 4 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 113 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 113 6 PackDroid PackDroid NNP work_ayatblpinzaztdzhilw6yqsi6m 113 7 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 113 8 uses use VBZ work_ayatblpinzaztdzhilw6yqsi6m 113 9 fully fully RB work_ayatblpinzaztdzhilw6yqsi6m 113 10 encrypted encrypt VBN work_ayatblpinzaztdzhilw6yqsi6m 113 11 code code NN work_ayatblpinzaztdzhilw6yqsi6m 113 12 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 113 13 files file NNS work_ayatblpinzaztdzhilw6yqsi6m 113 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 113 15 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 113 16 unable unable JJ work_ayatblpinzaztdzhilw6yqsi6m 113 17 to to TO work_ayatblpinzaztdzhilw6yqsi6m 113 18 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 113 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 113 20 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 113 21 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 113 22 load load VBP work_ayatblpinzaztdzhilw6yqsi6m 113 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 113 24 code code NN work_ayatblpinzaztdzhilw6yqsi6m 113 25 at at IN work_ayatblpinzaztdzhilw6yqsi6m 113 26 run run NN work_ayatblpinzaztdzhilw6yqsi6m 113 27 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 113 28 time time NN work_ayatblpinzaztdzhilw6yqsi6m 113 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 114 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 114 2 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 114 3 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 114 4 PackDroid PackDroid NNP work_ayatblpinzaztdzhilw6yqsi6m 114 5 can can MD work_ayatblpinzaztdzhilw6yqsi6m 114 6 be be VB work_ayatblpinzaztdzhilw6yqsi6m 114 7 incorporated incorporate VBN work_ayatblpinzaztdzhilw6yqsi6m 114 8 with with IN work_ayatblpinzaztdzhilw6yqsi6m 114 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 114 10 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 114 11 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 114 12 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 114 13 methods method NNS work_ayatblpinzaztdzhilw6yqsi6m 114 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 114 15 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 114 16 as as IN work_ayatblpinzaztdzhilw6yqsi6m 114 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 114 18 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 114 19 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 114 20 by by IN work_ayatblpinzaztdzhilw6yqsi6m 114 21 Kimberly Kimberly NNP work_ayatblpinzaztdzhilw6yqsi6m 114 22 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 114 23 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 114 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 115 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 115 2 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 115 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 115 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 116 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 116 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 116 3 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 116 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 116 5 PackDroid PackDroid NNP work_ayatblpinzaztdzhilw6yqsi6m 116 6 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 116 7 application application NN work_ayatblpinzaztdzhilw6yqsi6m 116 8 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 116 9 strongly strongly RB work_ayatblpinzaztdzhilw6yqsi6m 116 10 depends depend VBZ work_ayatblpinzaztdzhilw6yqsi6m 116 11 on on IN work_ayatblpinzaztdzhilw6yqsi6m 116 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 116 13 parsing parse VBG work_ayatblpinzaztdzhilw6yqsi6m 116 14 capabilities capability NNS work_ayatblpinzaztdzhilw6yqsi6m 116 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 116 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 116 17 ApkTool ApkTool NNP work_ayatblpinzaztdzhilw6yqsi6m 116 18 framework framework NN work_ayatblpinzaztdzhilw6yqsi6m 116 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 117 1 Narudin Narudin NNP work_ayatblpinzaztdzhilw6yqsi6m 117 2 et et FW work_ayatblpinzaztdzhilw6yqsi6m 117 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 117 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 118 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 118 2 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 118 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 118 4 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 118 5 presented present VBN work_ayatblpinzaztdzhilw6yqsi6m 118 6 a a DT work_ayatblpinzaztdzhilw6yqsi6m 118 7 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 118 8 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 118 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 118 10 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 118 11 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 118 12 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 118 13 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 118 14 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 118 15 on on IN work_ayatblpinzaztdzhilw6yqsi6m 118 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 118 17 anomaly anomaly NNP work_ayatblpinzaztdzhilw6yqsi6m 118 18 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 118 19 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 118 20 . . . work_ayatblpinzaztdzhilw6yqsi6m 119 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 119 2 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 119 3 indicated indicate VBD work_ayatblpinzaztdzhilw6yqsi6m 119 4 that that IN work_ayatblpinzaztdzhilw6yqsi6m 119 5 Bayes Bayes NNP work_ayatblpinzaztdzhilw6yqsi6m 119 6 network network NN work_ayatblpinzaztdzhilw6yqsi6m 119 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 119 8 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 119 9 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 119 10 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 119 11 produce produce VBP work_ayatblpinzaztdzhilw6yqsi6m 119 12 accurate accurate JJ work_ayatblpinzaztdzhilw6yqsi6m 119 13 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 119 14 by by IN work_ayatblpinzaztdzhilw6yqsi6m 119 15 attaining attain VBG work_ayatblpinzaztdzhilw6yqsi6m 119 16 99.97 99.97 CD work_ayatblpinzaztdzhilw6yqsi6m 119 17 % % NN work_ayatblpinzaztdzhilw6yqsi6m 119 18 True true JJ work_ayatblpinzaztdzhilw6yqsi6m 119 19 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 119 20 Positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 119 21 Rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 119 22 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 119 23 TPR tpr NN work_ayatblpinzaztdzhilw6yqsi6m 119 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 119 25 as as IN work_ayatblpinzaztdzhilw6yqsi6m 119 26 compared compare VBN work_ayatblpinzaztdzhilw6yqsi6m 119 27 to to IN work_ayatblpinzaztdzhilw6yqsi6m 119 28 the the DT work_ayatblpinzaztdzhilw6yqsi6m 119 29 multi multi JJ work_ayatblpinzaztdzhilw6yqsi6m 119 30 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 119 31 layer layer NN work_ayatblpinzaztdzhilw6yqsi6m 119 32 perceptron perceptron NN work_ayatblpinzaztdzhilw6yqsi6m 119 33 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 119 34 with with IN work_ayatblpinzaztdzhilw6yqsi6m 119 35 only only RB work_ayatblpinzaztdzhilw6yqsi6m 119 36 93.03 93.03 CD work_ayatblpinzaztdzhilw6yqsi6m 119 37 % % NN work_ayatblpinzaztdzhilw6yqsi6m 119 38 TPR tpr IN work_ayatblpinzaztdzhilw6yqsi6m 119 39 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 119 40 the the DT work_ayatblpinzaztdzhilw6yqsi6m 119 41 MalGenome MalGenome NNP work_ayatblpinzaztdzhilw6yqsi6m 119 42 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 119 43 set set NN work_ayatblpinzaztdzhilw6yqsi6m 119 44 . . . work_ayatblpinzaztdzhilw6yqsi6m 120 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 120 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 120 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 120 4 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 120 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 120 6 this this DT work_ayatblpinzaztdzhilw6yqsi6m 120 7 scheme scheme NN work_ayatblpinzaztdzhilw6yqsi6m 120 8 dropped drop VBD work_ayatblpinzaztdzhilw6yqsi6m 120 9 to to IN work_ayatblpinzaztdzhilw6yqsi6m 120 10 85 85 CD work_ayatblpinzaztdzhilw6yqsi6m 120 11 % % NN work_ayatblpinzaztdzhilw6yqsi6m 120 12 for for IN work_ayatblpinzaztdzhilw6yqsi6m 120 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 120 14 latest late JJS work_ayatblpinzaztdzhilw6yqsi6m 120 15 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 120 16 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 120 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 121 1 Desktop desktop NN work_ayatblpinzaztdzhilw6yqsi6m 121 2 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 121 3 can can MD work_ayatblpinzaztdzhilw6yqsi6m 121 4 easily easily RB work_ayatblpinzaztdzhilw6yqsi6m 121 5 bypass bypass VB work_ayatblpinzaztdzhilw6yqsi6m 121 6 any any DT work_ayatblpinzaztdzhilw6yqsi6m 121 7 counter counter NN work_ayatblpinzaztdzhilw6yqsi6m 121 8 - - NNS work_ayatblpinzaztdzhilw6yqsi6m 121 9 measures measure NNS work_ayatblpinzaztdzhilw6yqsi6m 121 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 121 11 thus thus RB work_ayatblpinzaztdzhilw6yqsi6m 121 12 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 121 13 in in IN work_ayatblpinzaztdzhilw6yqsi6m 121 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 121 15 seizure seizure NN work_ayatblpinzaztdzhilw6yqsi6m 121 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 121 17 personal personal JJ work_ayatblpinzaztdzhilw6yqsi6m 121 18 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 121 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 122 1 Authors Authors NNP work_ayatblpinzaztdzhilw6yqsi6m 122 2 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 122 3 Al Al NNP work_ayatblpinzaztdzhilw6yqsi6m 122 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 122 5 rimy rimy NNP work_ayatblpinzaztdzhilw6yqsi6m 122 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 122 7 Maarof Maarof NNP work_ayatblpinzaztdzhilw6yqsi6m 122 8 & & CC work_ayatblpinzaztdzhilw6yqsi6m 122 9 Shaid Shaid NNP work_ayatblpinzaztdzhilw6yqsi6m 122 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 122 11 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 122 12 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 122 13 presented present VBD work_ayatblpinzaztdzhilw6yqsi6m 122 14 an an DT work_ayatblpinzaztdzhilw6yqsi6m 122 15 effective effective JJ work_ayatblpinzaztdzhilw6yqsi6m 122 16 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 122 17 for for IN work_ayatblpinzaztdzhilw6yqsi6m 122 18 early early JJ work_ayatblpinzaztdzhilw6yqsi6m 122 19 diagnosis diagnosis NN work_ayatblpinzaztdzhilw6yqsi6m 122 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 122 21 avoidance avoidance NN work_ayatblpinzaztdzhilw6yqsi6m 122 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 122 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 122 24 crypto crypto NN work_ayatblpinzaztdzhilw6yqsi6m 122 25 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 122 26 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 122 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 122 28 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 122 29 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 122 30 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 122 31 on on IN work_ayatblpinzaztdzhilw6yqsi6m 122 32 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 122 33 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 122 34 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 122 35 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 122 36 One one CD work_ayatblpinzaztdzhilw6yqsi6m 122 37 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 122 38 Class Class NNP work_ayatblpinzaztdzhilw6yqsi6m 122 39 SVM SVM NNP work_ayatblpinzaztdzhilw6yqsi6m 122 40 and and CC work_ayatblpinzaztdzhilw6yqsi6m 122 41 n n NNP work_ayatblpinzaztdzhilw6yqsi6m 122 42 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 122 43 gram gram NN work_ayatblpinzaztdzhilw6yqsi6m 122 44 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 122 45 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 122 46 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 122 47 , , , work_ayatblpinzaztdzhilw6yqsi6m 122 48 Xu Xu NNP work_ayatblpinzaztdzhilw6yqsi6m 122 49 & & CC work_ayatblpinzaztdzhilw6yqsi6m 122 50 Wang Wang NNP work_ayatblpinzaztdzhilw6yqsi6m 122 51 , , , work_ayatblpinzaztdzhilw6yqsi6m 122 52 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 122 53 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 122 54 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 122 55 and and CC work_ayatblpinzaztdzhilw6yqsi6m 122 56 comprises comprise VBZ work_ayatblpinzaztdzhilw6yqsi6m 122 57 three three CD work_ayatblpinzaztdzhilw6yqsi6m 122 58 modules module NNS work_ayatblpinzaztdzhilw6yqsi6m 122 59 : : : work_ayatblpinzaztdzhilw6yqsi6m 122 60 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 122 61 1 1 LS work_ayatblpinzaztdzhilw6yqsi6m 122 62 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 122 63 pre pre NN work_ayatblpinzaztdzhilw6yqsi6m 122 64 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 122 65 processing processing NN work_ayatblpinzaztdzhilw6yqsi6m 122 66 , , , work_ayatblpinzaztdzhilw6yqsi6m 122 67 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 122 68 2 2 LS work_ayatblpinzaztdzhilw6yqsi6m 122 69 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 122 70 features feature VBZ work_ayatblpinzaztdzhilw6yqsi6m 122 71 engineering engineering NN work_ayatblpinzaztdzhilw6yqsi6m 122 72 and and CC work_ayatblpinzaztdzhilw6yqsi6m 122 73 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 122 74 3 3 LS work_ayatblpinzaztdzhilw6yqsi6m 122 75 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 122 76 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 122 77 module module NN work_ayatblpinzaztdzhilw6yqsi6m 122 78 . . . work_ayatblpinzaztdzhilw6yqsi6m 123 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 123 2 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 123 3 employed employ VBD work_ayatblpinzaztdzhilw6yqsi6m 123 4 an an DT work_ayatblpinzaztdzhilw6yqsi6m 123 5 adaptive adaptive JJ work_ayatblpinzaztdzhilw6yqsi6m 123 6 anomaly anomaly IN work_ayatblpinzaztdzhilw6yqsi6m 123 7 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 123 8 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 123 9 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 123 10 handles handle VBZ work_ayatblpinzaztdzhilw6yqsi6m 123 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 123 12 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 123 13 characteristics characteristic NNS work_ayatblpinzaztdzhilw6yqsi6m 123 14 of of IN work_ayatblpinzaztdzhilw6yqsi6m 123 15 systems system NNS work_ayatblpinzaztdzhilw6yqsi6m 123 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 123 17 frequently frequently RB work_ayatblpinzaztdzhilw6yqsi6m 123 18 updates update VBZ work_ayatblpinzaztdzhilw6yqsi6m 123 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 123 20 normal normal JJ work_ayatblpinzaztdzhilw6yqsi6m 123 21 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 123 22 built build VBD work_ayatblpinzaztdzhilw6yqsi6m 123 23 from from IN work_ayatblpinzaztdzhilw6yqsi6m 123 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 123 25 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 123 26 extraction extraction NN work_ayatblpinzaztdzhilw6yqsi6m 123 27 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 123 28 Al Al NNP work_ayatblpinzaztdzhilw6yqsi6m 123 29 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 123 30 rimy rimy NNP work_ayatblpinzaztdzhilw6yqsi6m 123 31 , , , work_ayatblpinzaztdzhilw6yqsi6m 123 32 Maarof Maarof NNP work_ayatblpinzaztdzhilw6yqsi6m 123 33 & & CC work_ayatblpinzaztdzhilw6yqsi6m 123 34 Shaid Shaid NNP work_ayatblpinzaztdzhilw6yqsi6m 123 35 , , , work_ayatblpinzaztdzhilw6yqsi6m 123 36 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 123 37 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 123 38 to to TO work_ayatblpinzaztdzhilw6yqsi6m 123 39 improve improve VB work_ayatblpinzaztdzhilw6yqsi6m 123 40 the the DT work_ayatblpinzaztdzhilw6yqsi6m 123 41 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 123 42 of of IN work_ayatblpinzaztdzhilw6yqsi6m 123 43 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 123 44 . . . work_ayatblpinzaztdzhilw6yqsi6m 124 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 124 2 study study NN work_ayatblpinzaztdzhilw6yqsi6m 124 3 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 124 4 Kharraz Kharraz NNP work_ayatblpinzaztdzhilw6yqsi6m 124 5 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 124 6 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 124 7 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 124 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 124 9 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 124 10 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 124 11 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 124 12 presented present VBN work_ayatblpinzaztdzhilw6yqsi6m 124 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 124 14 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 124 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 124 16 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 124 17 families family NNS work_ayatblpinzaztdzhilw6yqsi6m 124 18 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 124 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 124 20 year year NN work_ayatblpinzaztdzhilw6yqsi6m 124 21 2006–2014 2006–2014 CD work_ayatblpinzaztdzhilw6yqsi6m 124 22 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 124 23 and and CC work_ayatblpinzaztdzhilw6yqsi6m 124 24 concludes conclude VBZ work_ayatblpinzaztdzhilw6yqsi6m 124 25 that that IN work_ayatblpinzaztdzhilw6yqsi6m 124 26 the the DT work_ayatblpinzaztdzhilw6yqsi6m 124 27 suspicious suspicious JJ work_ayatblpinzaztdzhilw6yqsi6m 124 28 activity activity NN work_ayatblpinzaztdzhilw6yqsi6m 124 29 of of IN work_ayatblpinzaztdzhilw6yqsi6m 124 30 file file NN work_ayatblpinzaztdzhilw6yqsi6m 124 31 systems system NNS work_ayatblpinzaztdzhilw6yqsi6m 124 32 should should MD work_ayatblpinzaztdzhilw6yqsi6m 124 33 be be VB work_ayatblpinzaztdzhilw6yqsi6m 124 34 observed observe VBN work_ayatblpinzaztdzhilw6yqsi6m 124 35 for for IN work_ayatblpinzaztdzhilw6yqsi6m 124 36 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 124 37 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 124 38 . . . work_ayatblpinzaztdzhilw6yqsi6m 125 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 125 2 instance instance NN work_ayatblpinzaztdzhilw6yqsi6m 125 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 125 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 125 5 changes change NNS work_ayatblpinzaztdzhilw6yqsi6m 125 6 in in IN work_ayatblpinzaztdzhilw6yqsi6m 125 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 125 8 types type NNS work_ayatblpinzaztdzhilw6yqsi6m 125 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 125 10 I i NN work_ayatblpinzaztdzhilw6yqsi6m 125 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 125 12 O o UH work_ayatblpinzaztdzhilw6yqsi6m 125 13 Request request NN work_ayatblpinzaztdzhilw6yqsi6m 125 14 Packets Packets NNPS work_ayatblpinzaztdzhilw6yqsi6m 125 15 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 125 16 IRP IRP NNP work_ayatblpinzaztdzhilw6yqsi6m 125 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 125 18 or or CC work_ayatblpinzaztdzhilw6yqsi6m 125 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 125 20 Master Master NNP work_ayatblpinzaztdzhilw6yqsi6m 125 21 File File NNP work_ayatblpinzaztdzhilw6yqsi6m 125 22 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 125 23 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 125 24 MFT MFT NNP work_ayatblpinzaztdzhilw6yqsi6m 125 25 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 125 26 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 125 27 usually usually RB work_ayatblpinzaztdzhilw6yqsi6m 125 28 formed form VBN work_ayatblpinzaztdzhilw6yqsi6m 125 29 to to TO work_ayatblpinzaztdzhilw6yqsi6m 125 30 access access VB work_ayatblpinzaztdzhilw6yqsi6m 125 31 the the DT work_ayatblpinzaztdzhilw6yqsi6m 125 32 file file NN work_ayatblpinzaztdzhilw6yqsi6m 125 33 system system NN work_ayatblpinzaztdzhilw6yqsi6m 125 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 126 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 126 2 considerable considerable JJ work_ayatblpinzaztdzhilw6yqsi6m 126 3 number number NN work_ayatblpinzaztdzhilw6yqsi6m 126 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 126 5 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 126 6 families family NNS work_ayatblpinzaztdzhilw6yqsi6m 126 7 share share VB work_ayatblpinzaztdzhilw6yqsi6m 126 8 related related JJ work_ayatblpinzaztdzhilw6yqsi6m 126 9 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 126 10 as as IN work_ayatblpinzaztdzhilw6yqsi6m 126 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 126 12 core core JJ work_ayatblpinzaztdzhilw6yqsi6m 126 13 part part NN work_ayatblpinzaztdzhilw6yqsi6m 126 14 of of IN work_ayatblpinzaztdzhilw6yqsi6m 126 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 126 16 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 126 17 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 126 18 however however RB work_ayatblpinzaztdzhilw6yqsi6m 126 19 , , , work_ayatblpinzaztdzhilw6yqsi6m 126 20 there there EX work_ayatblpinzaztdzhilw6yqsi6m 126 21 still still RB work_ayatblpinzaztdzhilw6yqsi6m 126 22 lacks lack VBZ work_ayatblpinzaztdzhilw6yqsi6m 126 23 a a DT work_ayatblpinzaztdzhilw6yqsi6m 126 24 reliable reliable JJ work_ayatblpinzaztdzhilw6yqsi6m 126 25 destructive destructive JJ work_ayatblpinzaztdzhilw6yqsi6m 126 26 function function NN work_ayatblpinzaztdzhilw6yqsi6m 126 27 to to TO work_ayatblpinzaztdzhilw6yqsi6m 126 28 successfully successfully RB work_ayatblpinzaztdzhilw6yqsi6m 126 29 infect infect VB work_ayatblpinzaztdzhilw6yqsi6m 126 30 files file NNS work_ayatblpinzaztdzhilw6yqsi6m 126 31 of of IN work_ayatblpinzaztdzhilw6yqsi6m 126 32 victims victim NNS work_ayatblpinzaztdzhilw6yqsi6m 126 33 . . . work_ayatblpinzaztdzhilw6yqsi6m 127 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 127 2 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 127 3 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 127 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 5 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 127 6 recapitulate recapitulate VBP work_ayatblpinzaztdzhilw6yqsi6m 127 7 several several JJ work_ayatblpinzaztdzhilw6yqsi6m 127 8 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 127 9 prominent prominent JJ work_ayatblpinzaztdzhilw6yqsi6m 127 10 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 127 11 detections detection NNS work_ayatblpinzaztdzhilw6yqsi6m 127 12 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 127 13 Yang Yang NNP work_ayatblpinzaztdzhilw6yqsi6m 127 14 et et FW work_ayatblpinzaztdzhilw6yqsi6m 127 15 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 127 16 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 127 17 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 18 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 127 19 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 127 20 Andronio Andronio NNP work_ayatblpinzaztdzhilw6yqsi6m 127 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 22 Zanero Zanero NNP work_ayatblpinzaztdzhilw6yqsi6m 127 23 & & CC work_ayatblpinzaztdzhilw6yqsi6m 127 24 Maggi Maggi NNP work_ayatblpinzaztdzhilw6yqsi6m 127 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 26 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 127 27 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 127 28 Kharraz Kharraz NNP work_ayatblpinzaztdzhilw6yqsi6m 127 29 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 127 30 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 127 31 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 127 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 33 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 127 34 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 127 35 and and CC work_ayatblpinzaztdzhilw6yqsi6m 127 36 prevention prevention NN work_ayatblpinzaztdzhilw6yqsi6m 127 37 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 127 38 Ahmadian Ahmadian NNP work_ayatblpinzaztdzhilw6yqsi6m 127 39 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 40 Shahriari Shahriari NNP work_ayatblpinzaztdzhilw6yqsi6m 127 41 & & CC work_ayatblpinzaztdzhilw6yqsi6m 127 42 Ghaffarian Ghaffarian NNP work_ayatblpinzaztdzhilw6yqsi6m 127 43 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 44 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 127 45 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 127 46 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 127 47 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 48 Soh Soh NNP work_ayatblpinzaztdzhilw6yqsi6m 127 49 & & CC work_ayatblpinzaztdzhilw6yqsi6m 127 50 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 127 51 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 52 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 127 53 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 127 54 Lee Lee NNP work_ayatblpinzaztdzhilw6yqsi6m 127 55 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 56 Moon Moon NNP work_ayatblpinzaztdzhilw6yqsi6m 127 57 & & CC work_ayatblpinzaztdzhilw6yqsi6m 127 58 Park Park NNP work_ayatblpinzaztdzhilw6yqsi6m 127 59 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 60 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 127 61 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 127 62 Brewer Brewer NNP work_ayatblpinzaztdzhilw6yqsi6m 127 63 , , , work_ayatblpinzaztdzhilw6yqsi6m 127 64 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 127 65 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 127 66 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 127 67 . . . work_ayatblpinzaztdzhilw6yqsi6m 128 1 Recently recently RB work_ayatblpinzaztdzhilw6yqsi6m 128 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 128 3 deep deep JJ work_ayatblpinzaztdzhilw6yqsi6m 128 4 neural neural JJ work_ayatblpinzaztdzhilw6yqsi6m 128 5 networks network NNS work_ayatblpinzaztdzhilw6yqsi6m 128 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 128 7 convolutional convolutional JJ work_ayatblpinzaztdzhilw6yqsi6m 128 8 neural neural JJ work_ayatblpinzaztdzhilw6yqsi6m 128 9 networks network NNS work_ayatblpinzaztdzhilw6yqsi6m 128 10 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 128 11 CNNs cnn NNS work_ayatblpinzaztdzhilw6yqsi6m 128 12 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 128 13 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 128 14 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 128 15 remarkable remarkable JJ work_ayatblpinzaztdzhilw6yqsi6m 128 16 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 128 17 in in IN work_ayatblpinzaztdzhilw6yqsi6m 128 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 128 19 area area NN work_ayatblpinzaztdzhilw6yqsi6m 128 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 128 21 object object NN work_ayatblpinzaztdzhilw6yqsi6m 128 22 recognition recognition NN work_ayatblpinzaztdzhilw6yqsi6m 128 23 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 128 24 Simonyan Simonyan NNP work_ayatblpinzaztdzhilw6yqsi6m 128 25 & & CC work_ayatblpinzaztdzhilw6yqsi6m 128 26 Zisserman Zisserman NNP work_ayatblpinzaztdzhilw6yqsi6m 128 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 128 28 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 128 29 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 128 30 . . . work_ayatblpinzaztdzhilw6yqsi6m 129 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 129 2 deep deep JJ work_ayatblpinzaztdzhilw6yqsi6m 129 3 convolutional convolutional JJ work_ayatblpinzaztdzhilw6yqsi6m 129 4 neural neural JJ work_ayatblpinzaztdzhilw6yqsi6m 129 5 networks network NNS work_ayatblpinzaztdzhilw6yqsi6m 129 6 can can MD work_ayatblpinzaztdzhilw6yqsi6m 129 7 outperform outperform VB work_ayatblpinzaztdzhilw6yqsi6m 129 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 129 9 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 129 10 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 129 11 like like IN work_ayatblpinzaztdzhilw6yqsi6m 129 12 Natural Natural NNP work_ayatblpinzaztdzhilw6yqsi6m 129 13 Language Language NNP work_ayatblpinzaztdzhilw6yqsi6m 129 14 Processing Processing NNP work_ayatblpinzaztdzhilw6yqsi6m 129 15 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 129 16 NLP NLP NNP work_ayatblpinzaztdzhilw6yqsi6m 129 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 129 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 129 19 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 129 20 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 129 21 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 129 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 130 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 130 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 130 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 130 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 130 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 130 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 130 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 131 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 131 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 131 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 131 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 131 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 131 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 131 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 131 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 131 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 131 10 6/24 6/24 CD work_ayatblpinzaztdzhilw6yqsi6m 131 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 131 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_ayatblpinzaztdzhilw6yqsi6m 131 13 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 131 14 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 131 15 Comprehensive Comprehensive NNP work_ayatblpinzaztdzhilw6yqsi6m 131 16 Comparison Comparison NNP work_ayatblpinzaztdzhilw6yqsi6m 131 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 131 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 131 19 state state NN work_ayatblpinzaztdzhilw6yqsi6m 131 20 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 131 21 of of IN work_ayatblpinzaztdzhilw6yqsi6m 131 22 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 131 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 131 24 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 131 25 art art NN work_ayatblpinzaztdzhilw6yqsi6m 131 26 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 131 27 along along IN work_ayatblpinzaztdzhilw6yqsi6m 131 28 with with IN work_ayatblpinzaztdzhilw6yqsi6m 131 29 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 131 30 key key JJ work_ayatblpinzaztdzhilw6yqsi6m 131 31 points point NNS work_ayatblpinzaztdzhilw6yqsi6m 131 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 131 33 drawbacks drawback NNS work_ayatblpinzaztdzhilw6yqsi6m 131 34 and and CC work_ayatblpinzaztdzhilw6yqsi6m 131 35 implementation implementation NN work_ayatblpinzaztdzhilw6yqsi6m 131 36 design design NN work_ayatblpinzaztdzhilw6yqsi6m 131 37 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 131 38 . . . work_ayatblpinzaztdzhilw6yqsi6m 132 1 References reference NNS work_ayatblpinzaztdzhilw6yqsi6m 132 2 Methodology Methodology NNP work_ayatblpinzaztdzhilw6yqsi6m 132 3 Strengths strength NNS work_ayatblpinzaztdzhilw6yqsi6m 132 4 Limitations Limitations NNP work_ayatblpinzaztdzhilw6yqsi6m 132 5 Demme Demme NNP work_ayatblpinzaztdzhilw6yqsi6m 132 6 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 132 7 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 132 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 133 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 133 2 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 133 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 133 4 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 133 5 Dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 133 6 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 133 7 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 133 8 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 133 9 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 133 10 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 133 11 with with IN work_ayatblpinzaztdzhilw6yqsi6m 133 12 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 133 13 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 133 14 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 133 15 Applied Applied NNP work_ayatblpinzaztdzhilw6yqsi6m 133 16 ML ML NNP work_ayatblpinzaztdzhilw6yqsi6m 133 17 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 133 18 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 133 19 KNN KNN NNP work_ayatblpinzaztdzhilw6yqsi6m 133 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 133 21 Decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 133 22 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 133 23 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 133 24 � � . work_ayatblpinzaztdzhilw6yqsi6m 133 25 Major major JJ work_ayatblpinzaztdzhilw6yqsi6m 133 26 support support NN work_ayatblpinzaztdzhilw6yqsi6m 133 27 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 133 28 that that IN work_ayatblpinzaztdzhilw6yqsi6m 133 29 runtime runtime NN work_ayatblpinzaztdzhilw6yqsi6m 133 30 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 133 31 can can MD work_ayatblpinzaztdzhilw6yqsi6m 133 32 capture capture VB work_ayatblpinzaztdzhilw6yqsi6m 133 33 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 133 34 HW HW NNP work_ayatblpinzaztdzhilw6yqsi6m 133 35 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 133 36 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 133 37 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 133 38 essential essential JJ work_ayatblpinzaztdzhilw6yqsi6m 133 39 to to TO work_ayatblpinzaztdzhilw6yqsi6m 133 40 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 133 41 malware90 malware90 NNP work_ayatblpinzaztdzhilw6yqsi6m 133 42 % % NN work_ayatblpinzaztdzhilw6yqsi6m 133 43 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 133 44 with with IN work_ayatblpinzaztdzhilw6yqsi6m 133 45 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 133 46 % % NN work_ayatblpinzaztdzhilw6yqsi6m 133 47 FP fp NN work_ayatblpinzaztdzhilw6yqsi6m 133 48 � � , work_ayatblpinzaztdzhilw6yqsi6m 133 49 Able able JJ work_ayatblpinzaztdzhilw6yqsi6m 133 50 to to TO work_ayatblpinzaztdzhilw6yqsi6m 133 51 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 133 52 some some DT work_ayatblpinzaztdzhilw6yqsi6m 133 53 variants variant NNS work_ayatblpinzaztdzhilw6yqsi6m 133 54 whereas whereas IN work_ayatblpinzaztdzhilw6yqsi6m 133 55 some some DT work_ayatblpinzaztdzhilw6yqsi6m 133 56 were be VBD work_ayatblpinzaztdzhilw6yqsi6m 133 57 not not RB work_ayatblpinzaztdzhilw6yqsi6m 133 58 detected detect VBN work_ayatblpinzaztdzhilw6yqsi6m 133 59 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 133 60 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 133 61 label label NN work_ayatblpinzaztdzhilw6yqsi6m 133 62 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 133 63 might may MD work_ayatblpinzaztdzhilw6yqsi6m 133 64 not not RB work_ayatblpinzaztdzhilw6yqsi6m 133 65 accurate accurate VB work_ayatblpinzaztdzhilw6yqsi6m 133 66 Kharraz Kharraz NNP work_ayatblpinzaztdzhilw6yqsi6m 133 67 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 133 68 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 133 69 . . . work_ayatblpinzaztdzhilw6yqsi6m 134 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 134 2 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 134 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 134 4 � � . work_ayatblpinzaztdzhilw6yqsi6m 134 5 Analyzed analyze VBN work_ayatblpinzaztdzhilw6yqsi6m 134 6 15 15 CD work_ayatblpinzaztdzhilw6yqsi6m 134 7 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 134 8 families family NNS work_ayatblpinzaztdzhilw6yqsi6m 134 9 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 134 10 Proposed propose VBD work_ayatblpinzaztdzhilw6yqsi6m 134 11 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 134 12 mitigation mitigation NN work_ayatblpinzaztdzhilw6yqsi6m 134 13 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 134 14 to to TO work_ayatblpinzaztdzhilw6yqsi6m 134 15 decoy decoy VB work_ayatblpinzaztdzhilw6yqsi6m 134 16 resources resource NNS work_ayatblpinzaztdzhilw6yqsi6m 134 17 to to TO work_ayatblpinzaztdzhilw6yqsi6m 134 18 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 134 19 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 134 20 file file NN work_ayatblpinzaztdzhilw6yqsi6m 134 21 access access NN work_ayatblpinzaztdzhilw6yqsi6m 134 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 135 1 � � : work_ayatblpinzaztdzhilw6yqsi6m 135 2 Provide provide VB work_ayatblpinzaztdzhilw6yqsi6m 135 3 evolution evolution NN work_ayatblpinzaztdzhilw6yqsi6m 135 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 135 5 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 135 6 study study NN work_ayatblpinzaztdzhilw6yqsi6m 135 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 135 8 RW rw NN work_ayatblpinzaztdzhilw6yqsi6m 135 9 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 135 10 from from IN work_ayatblpinzaztdzhilw6yqsi6m 135 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 135 12 long long JJ work_ayatblpinzaztdzhilw6yqsi6m 135 13 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 135 14 term term NN work_ayatblpinzaztdzhilw6yqsi6m 135 15 study study NN work_ayatblpinzaztdzhilw6yqsi6m 135 16 2006- 2006- CD work_ayatblpinzaztdzhilw6yqsi6m 135 17 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 135 18 � � NN work_ayatblpinzaztdzhilw6yqsi6m 135 19 Detailed detailed JJ work_ayatblpinzaztdzhilw6yqsi6m 135 20 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 135 21 of of IN work_ayatblpinzaztdzhilw6yqsi6m 135 22 Bitcoin Bitcoin NNP work_ayatblpinzaztdzhilw6yqsi6m 135 23 for for IN work_ayatblpinzaztdzhilw6yqsi6m 135 24 monetization monetization NN work_ayatblpinzaztdzhilw6yqsi6m 135 25 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 135 26 Assumed assume VBD work_ayatblpinzaztdzhilw6yqsi6m 135 27 that that IN work_ayatblpinzaztdzhilw6yqsi6m 135 28 every every DT work_ayatblpinzaztdzhilw6yqsi6m 135 29 file file NN work_ayatblpinzaztdzhilw6yqsi6m 135 30 system system NN work_ayatblpinzaztdzhilw6yqsi6m 135 31 access access NN work_ayatblpinzaztdzhilw6yqsi6m 135 32 to to TO work_ayatblpinzaztdzhilw6yqsi6m 135 33 delete delete VB work_ayatblpinzaztdzhilw6yqsi6m 135 34 or or CC work_ayatblpinzaztdzhilw6yqsi6m 135 35 encrypt encrypt VB work_ayatblpinzaztdzhilw6yqsi6m 135 36 decoy decoy NN work_ayatblpinzaztdzhilw6yqsi6m 135 37 resources resource NNS work_ayatblpinzaztdzhilw6yqsi6m 135 38 � � . work_ayatblpinzaztdzhilw6yqsi6m 135 39 However however RB work_ayatblpinzaztdzhilw6yqsi6m 135 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 135 41 they -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 135 42 did do VBD work_ayatblpinzaztdzhilw6yqsi6m 135 43 n’t not RB work_ayatblpinzaztdzhilw6yqsi6m 135 44 implement implement VB work_ayatblpinzaztdzhilw6yqsi6m 135 45 any any DT work_ayatblpinzaztdzhilw6yqsi6m 135 46 concrete concrete JJ work_ayatblpinzaztdzhilw6yqsi6m 135 47 solution solution NN work_ayatblpinzaztdzhilw6yqsi6m 135 48 to to TO work_ayatblpinzaztdzhilw6yqsi6m 135 49 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 135 50 or or CC work_ayatblpinzaztdzhilw6yqsi6m 135 51 defend defend VB work_ayatblpinzaztdzhilw6yqsi6m 135 52 against against IN work_ayatblpinzaztdzhilw6yqsi6m 135 53 these these DT work_ayatblpinzaztdzhilw6yqsi6m 135 54 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 135 55 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 135 56 , , , work_ayatblpinzaztdzhilw6yqsi6m 135 57 Soh Soh NNP work_ayatblpinzaztdzhilw6yqsi6m 135 58 & & CC work_ayatblpinzaztdzhilw6yqsi6m 135 59 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 135 60 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 135 61 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 135 62 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 135 63 � � . work_ayatblpinzaztdzhilw6yqsi6m 135 64 Present present VB work_ayatblpinzaztdzhilw6yqsi6m 135 65 a a DT work_ayatblpinzaztdzhilw6yqsi6m 135 66 quantification quantification NN work_ayatblpinzaztdzhilw6yqsi6m 135 67 model model NN work_ayatblpinzaztdzhilw6yqsi6m 135 68 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 135 69 on on IN work_ayatblpinzaztdzhilw6yqsi6m 135 70 social social JJ work_ayatblpinzaztdzhilw6yqsi6m 135 71 engineering engineering NN work_ayatblpinzaztdzhilw6yqsi6m 135 72 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 135 73 to to TO work_ayatblpinzaztdzhilw6yqsi6m 135 74 avoid avoid VB work_ayatblpinzaztdzhilw6yqsi6m 135 75 and and CC work_ayatblpinzaztdzhilw6yqsi6m 135 76 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 135 77 any any DT work_ayatblpinzaztdzhilw6yqsi6m 135 78 cryptographic cryptographic JJ work_ayatblpinzaztdzhilw6yqsi6m 135 79 operations operation NNS work_ayatblpinzaztdzhilw6yqsi6m 135 80 in in IN work_ayatblpinzaztdzhilw6yqsi6m 135 81 the the DT work_ayatblpinzaztdzhilw6yqsi6m 135 82 local local JJ work_ayatblpinzaztdzhilw6yqsi6m 135 83 drive drive NN work_ayatblpinzaztdzhilw6yqsi6m 135 84 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 135 85 explains explain VBZ work_ayatblpinzaztdzhilw6yqsi6m 135 86 the the DT work_ayatblpinzaztdzhilw6yqsi6m 135 87 file file NN work_ayatblpinzaztdzhilw6yqsi6m 135 88 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 135 89 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 135 90 intrusion intrusion NN work_ayatblpinzaztdzhilw6yqsi6m 135 91 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 135 92 system system NN work_ayatblpinzaztdzhilw6yqsi6m 135 93 and and CC work_ayatblpinzaztdzhilw6yqsi6m 135 94 IP ip NN work_ayatblpinzaztdzhilw6yqsi6m 135 95 traceback traceback NN work_ayatblpinzaztdzhilw6yqsi6m 135 96 algorithm algorithm NN work_ayatblpinzaztdzhilw6yqsi6m 135 97 � � . work_ayatblpinzaztdzhilw6yqsi6m 135 98 Lack lack NN work_ayatblpinzaztdzhilw6yqsi6m 135 99 of of IN work_ayatblpinzaztdzhilw6yqsi6m 135 100 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 135 101 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 135 102 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 135 103 Suggests suggest VBZ work_ayatblpinzaztdzhilw6yqsi6m 135 104 guidelines guideline NNS work_ayatblpinzaztdzhilw6yqsi6m 135 105 online online JJ work_ayatblpinzaztdzhilw6yqsi6m 135 106 Narudin Narudin NNP work_ayatblpinzaztdzhilw6yqsi6m 135 107 et et FW work_ayatblpinzaztdzhilw6yqsi6m 135 108 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 135 109 . . . work_ayatblpinzaztdzhilw6yqsi6m 136 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 136 2 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 136 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 136 4 � � . work_ayatblpinzaztdzhilw6yqsi6m 136 5 Machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 136 6 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 136 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 136 8 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 136 9 study study NN work_ayatblpinzaztdzhilw6yqsi6m 136 10 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 136 11 Filter Filter NNP work_ayatblpinzaztdzhilw6yqsi6m 136 12 TCP TCP NNP work_ayatblpinzaztdzhilw6yqsi6m 136 13 packets packet NNS work_ayatblpinzaztdzhilw6yqsi6m 136 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 136 15 extract extract VBP work_ayatblpinzaztdzhilw6yqsi6m 136 16 network network NN work_ayatblpinzaztdzhilw6yqsi6m 136 17 traffic traffic NN work_ayatblpinzaztdzhilw6yqsi6m 136 18 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 136 19 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 136 20 Evaluate Evaluate NNP work_ayatblpinzaztdzhilw6yqsi6m 136 21 Bayes Bayes NNP work_ayatblpinzaztdzhilw6yqsi6m 136 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 136 23 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 136 24 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 136 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 136 26 KNN KNN NNP work_ayatblpinzaztdzhilw6yqsi6m 136 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 136 28 J48 J48 NNP work_ayatblpinzaztdzhilw6yqsi6m 136 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 136 30 & & CC work_ayatblpinzaztdzhilw6yqsi6m 136 31 MLP MLP NNP work_ayatblpinzaztdzhilw6yqsi6m 136 32 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 136 33 Accurate accurate JJ work_ayatblpinzaztdzhilw6yqsi6m 136 34 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 136 35 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 136 36 on on IN work_ayatblpinzaztdzhilw6yqsi6m 136 37 ML ML NNP work_ayatblpinzaztdzhilw6yqsi6m 136 38 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 136 39 . . . work_ayatblpinzaztdzhilw6yqsi6m 137 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 137 2 BN BN NNP work_ayatblpinzaztdzhilw6yqsi6m 137 3 and and CC work_ayatblpinzaztdzhilw6yqsi6m 137 4 RF RF NNP work_ayatblpinzaztdzhilw6yqsi6m 137 5 produces produce VBZ work_ayatblpinzaztdzhilw6yqsi6m 137 6 99.97 99.97 CD work_ayatblpinzaztdzhilw6yqsi6m 137 7 % % NN work_ayatblpinzaztdzhilw6yqsi6m 137 8 TPR TPR NNP work_ayatblpinzaztdzhilw6yqsi6m 137 9 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 137 10 Bayes Bayes NNP work_ayatblpinzaztdzhilw6yqsi6m 137 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 137 12 MLP MLP NNP work_ayatblpinzaztdzhilw6yqsi6m 137 13 with with IN work_ayatblpinzaztdzhilw6yqsi6m 137 14 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 137 15 0.995 0.995 CD work_ayatblpinzaztdzhilw6yqsi6m 137 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 137 17 RF RF NNP work_ayatblpinzaztdzhilw6yqsi6m 137 18 with with IN work_ayatblpinzaztdzhilw6yqsi6m 137 19 0.991 0.991 CD work_ayatblpinzaztdzhilw6yqsi6m 137 20 � � . work_ayatblpinzaztdzhilw6yqsi6m 137 21 Applicable applicable JJ work_ayatblpinzaztdzhilw6yqsi6m 137 22 for for IN work_ayatblpinzaztdzhilw6yqsi6m 137 23 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 137 24 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 137 25 only only RB work_ayatblpinzaztdzhilw6yqsi6m 137 26 Zavarsky Zavarsky NNP work_ayatblpinzaztdzhilw6yqsi6m 137 27 & & CC work_ayatblpinzaztdzhilw6yqsi6m 137 28 Lindskog Lindskog NNP work_ayatblpinzaztdzhilw6yqsi6m 137 29 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 137 30 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 137 31 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 137 32 � � . work_ayatblpinzaztdzhilw6yqsi6m 137 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 137 34 life life NN work_ayatblpinzaztdzhilw6yqsi6m 137 35 cycle cycle NN work_ayatblpinzaztdzhilw6yqsi6m 137 36 of of IN work_ayatblpinzaztdzhilw6yqsi6m 137 37 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 137 38 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 137 39 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 137 40 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 137 41 study study NN work_ayatblpinzaztdzhilw6yqsi6m 137 42 . . . work_ayatblpinzaztdzhilw6yqsi6m 138 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 138 2 Implement implement JJ work_ayatblpinzaztdzhilw6yqsi6m 138 3 basic basic JJ work_ayatblpinzaztdzhilw6yqsi6m 138 4 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 138 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 138 6 basic basic JJ work_ayatblpinzaztdzhilw6yqsi6m 138 7 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 138 8 � � '' work_ayatblpinzaztdzhilw6yqsi6m 138 9 MD5 md5 NN work_ayatblpinzaztdzhilw6yqsi6m 138 10 method method NN work_ayatblpinzaztdzhilw6yqsi6m 138 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 138 12 Cuckoo Cuckoo NNP work_ayatblpinzaztdzhilw6yqsi6m 138 13 Sandbox Sandbox NNP work_ayatblpinzaztdzhilw6yqsi6m 138 14 used use VBD work_ayatblpinzaztdzhilw6yqsi6m 138 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 139 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 139 2 For for IN work_ayatblpinzaztdzhilw6yqsi6m 139 3 android android NN work_ayatblpinzaztdzhilw6yqsi6m 139 4 Analyze Analyze NNP work_ayatblpinzaztdzhilw6yqsi6m 139 5 AndroidManifest AndroidManifest NNP work_ayatblpinzaztdzhilw6yqsi6m 139 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 140 1 xml xml NNP work_ayatblpinzaztdzhilw6yqsi6m 140 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 140 3 administrative administrative JJ work_ayatblpinzaztdzhilw6yqsi6m 140 4 privilege privilege NN work_ayatblpinzaztdzhilw6yqsi6m 140 5 � � . work_ayatblpinzaztdzhilw6yqsi6m 140 6 For for IN work_ayatblpinzaztdzhilw6yqsi6m 140 7 Windows window NNS work_ayatblpinzaztdzhilw6yqsi6m 140 8 analyze analyze VBP work_ayatblpinzaztdzhilw6yqsi6m 140 9 Filesystems filesystem NNS work_ayatblpinzaztdzhilw6yqsi6m 140 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 140 11 registry registry NN work_ayatblpinzaztdzhilw6yqsi6m 140 12 activities activity NNS work_ayatblpinzaztdzhilw6yqsi6m 140 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 140 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 140 15 network network NN work_ayatblpinzaztdzhilw6yqsi6m 140 16 operations operation NNS work_ayatblpinzaztdzhilw6yqsi6m 140 17 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 140 18 Explained explain VBD work_ayatblpinzaztdzhilw6yqsi6m 140 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 140 20 detailed detailed JJ work_ayatblpinzaztdzhilw6yqsi6m 140 21 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 140 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 140 23 working working NN work_ayatblpinzaztdzhilw6yqsi6m 140 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 140 25 and and CC work_ayatblpinzaztdzhilw6yqsi6m 140 26 functionality functionality NN work_ayatblpinzaztdzhilw6yqsi6m 140 27 of of IN work_ayatblpinzaztdzhilw6yqsi6m 140 28 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 140 29 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 140 30 Performed performed JJ work_ayatblpinzaztdzhilw6yqsi6m 140 31 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 140 32 on on IN work_ayatblpinzaztdzhilw6yqsi6m 140 33 both both CC work_ayatblpinzaztdzhilw6yqsi6m 140 34 the the DT work_ayatblpinzaztdzhilw6yqsi6m 140 35 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 140 36 and and CC work_ayatblpinzaztdzhilw6yqsi6m 140 37 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 140 38 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 140 39 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 140 40 RW RW NNP work_ayatblpinzaztdzhilw6yqsi6m 140 41 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 140 42 PEiD PEiD NNP work_ayatblpinzaztdzhilw6yqsi6m 140 43 tool tool NN work_ayatblpinzaztdzhilw6yqsi6m 140 44 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 140 45 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 140 46 for for IN work_ayatblpinzaztdzhilw6yqsi6m 140 47 windows window NNS work_ayatblpinzaztdzhilw6yqsi6m 140 48 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 140 49 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 140 50 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 140 51 Performed perform VBN work_ayatblpinzaztdzhilw6yqsi6m 140 52 only only JJ work_ayatblpinzaztdzhilw6yqsi6m 140 53 basic basic JJ work_ayatblpinzaztdzhilw6yqsi6m 140 54 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 140 55 and and CC work_ayatblpinzaztdzhilw6yqsi6m 140 56 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 140 57 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 140 58 . . . work_ayatblpinzaztdzhilw6yqsi6m 141 1 � � : work_ayatblpinzaztdzhilw6yqsi6m 141 2 No no DT work_ayatblpinzaztdzhilw6yqsi6m 141 3 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 141 4 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 141 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 141 6 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 141 7 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 141 8 to to TO work_ayatblpinzaztdzhilw6yqsi6m 141 9 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 141 10 zero zero CD work_ayatblpinzaztdzhilw6yqsi6m 141 11 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 141 12 day day NN work_ayatblpinzaztdzhilw6yqsi6m 141 13 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 141 14 � � . work_ayatblpinzaztdzhilw6yqsi6m 141 15 Lack lack NN work_ayatblpinzaztdzhilw6yqsi6m 141 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 141 17 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 141 18 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 141 19 Song Song NNP work_ayatblpinzaztdzhilw6yqsi6m 141 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 141 21 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 141 22 & & CC work_ayatblpinzaztdzhilw6yqsi6m 141 23 Lee Lee NNP work_ayatblpinzaztdzhilw6yqsi6m 141 24 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 141 25 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 141 26 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 141 27 � � . work_ayatblpinzaztdzhilw6yqsi6m 141 28 Proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 141 29 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 141 30 on on IN work_ayatblpinzaztdzhilw6yqsi6m 141 31 three three CD work_ayatblpinzaztdzhilw6yqsi6m 141 32 modules module NNS work_ayatblpinzaztdzhilw6yqsi6m 141 33 : : : work_ayatblpinzaztdzhilw6yqsi6m 141 34 Configuration configuration NN work_ayatblpinzaztdzhilw6yqsi6m 141 35 , , , work_ayatblpinzaztdzhilw6yqsi6m 141 36 Monitors Monitors NNP work_ayatblpinzaztdzhilw6yqsi6m 141 37 , , , work_ayatblpinzaztdzhilw6yqsi6m 141 38 and and CC work_ayatblpinzaztdzhilw6yqsi6m 141 39 Processes process NNS work_ayatblpinzaztdzhilw6yqsi6m 141 40 sing sing VBP work_ayatblpinzaztdzhilw6yqsi6m 141 41 � � : work_ayatblpinzaztdzhilw6yqsi6m 141 42 the the DT work_ayatblpinzaztdzhilw6yqsi6m 141 43 hash hash NN work_ayatblpinzaztdzhilw6yqsi6m 141 44 information information NN work_ayatblpinzaztdzhilw6yqsi6m 141 45 method method NN work_ayatblpinzaztdzhilw6yqsi6m 141 46 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 141 47 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 141 48 for for IN work_ayatblpinzaztdzhilw6yqsi6m 141 49 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 141 50 of of IN work_ayatblpinzaztdzhilw6yqsi6m 141 51 CryptoLocker CryptoLocker NNP work_ayatblpinzaztdzhilw6yqsi6m 141 52 type type NN work_ayatblpinzaztdzhilw6yqsi6m 141 53 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 141 54 � � . work_ayatblpinzaztdzhilw6yqsi6m 141 55 The the DT work_ayatblpinzaztdzhilw6yqsi6m 141 56 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 141 57 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 141 58 monitors monitor VBZ work_ayatblpinzaztdzhilw6yqsi6m 141 59 the the DT work_ayatblpinzaztdzhilw6yqsi6m 141 60 processes process NNS work_ayatblpinzaztdzhilw6yqsi6m 141 61 and and CC work_ayatblpinzaztdzhilw6yqsi6m 141 62 specific specific JJ work_ayatblpinzaztdzhilw6yqsi6m 141 63 file file NN work_ayatblpinzaztdzhilw6yqsi6m 141 64 directories directory NNS work_ayatblpinzaztdzhilw6yqsi6m 141 65 � � NNS work_ayatblpinzaztdzhilw6yqsi6m 141 66 monitor monitor NN work_ayatblpinzaztdzhilw6yqsi6m 141 67 file file NN work_ayatblpinzaztdzhilw6yqsi6m 141 68 events event NNS work_ayatblpinzaztdzhilw6yqsi6m 141 69 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 141 70 statistical statistical JJ work_ayatblpinzaztdzhilw6yqsi6m 141 71 methods method NNS work_ayatblpinzaztdzhilw6yqsi6m 141 72 on on IN work_ayatblpinzaztdzhilw6yqsi6m 141 73 Processor Processor NNP work_ayatblpinzaztdzhilw6yqsi6m 141 74 usage usage NN work_ayatblpinzaztdzhilw6yqsi6m 141 75 , , , work_ayatblpinzaztdzhilw6yqsi6m 141 76 Memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 141 77 usage usage NN work_ayatblpinzaztdzhilw6yqsi6m 141 78 , , , work_ayatblpinzaztdzhilw6yqsi6m 141 79 and and CC work_ayatblpinzaztdzhilw6yqsi6m 141 80 I -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 141 81 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 141 82 O o UH work_ayatblpinzaztdzhilw6yqsi6m 141 83 rates rate NNS work_ayatblpinzaztdzhilw6yqsi6m 141 84 � � . work_ayatblpinzaztdzhilw6yqsi6m 141 85 Not not RB work_ayatblpinzaztdzhilw6yqsi6m 141 86 applicable applicable JJ work_ayatblpinzaztdzhilw6yqsi6m 141 87 for for IN work_ayatblpinzaztdzhilw6yqsi6m 141 88 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 141 89 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 141 90 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 141 91 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 141 92 � � . work_ayatblpinzaztdzhilw6yqsi6m 141 93 No no DT work_ayatblpinzaztdzhilw6yqsi6m 141 94 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 141 95 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 141 96 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 141 97 � � . work_ayatblpinzaztdzhilw6yqsi6m 141 98 Does do VBZ work_ayatblpinzaztdzhilw6yqsi6m 141 99 not not RB work_ayatblpinzaztdzhilw6yqsi6m 141 100 install install VB work_ayatblpinzaztdzhilw6yqsi6m 141 101 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 141 102 and and CC work_ayatblpinzaztdzhilw6yqsi6m 141 103 execute execute VB work_ayatblpinzaztdzhilw6yqsi6m 141 104 for for IN work_ayatblpinzaztdzhilw6yqsi6m 141 105 prevention prevention NN work_ayatblpinzaztdzhilw6yqsi6m 141 106 and and CC work_ayatblpinzaztdzhilw6yqsi6m 141 107 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 141 108 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 141 109 Results result NNS work_ayatblpinzaztdzhilw6yqsi6m 141 110 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 141 111 not not RB work_ayatblpinzaztdzhilw6yqsi6m 141 112 analyzed analyze VBN work_ayatblpinzaztdzhilw6yqsi6m 141 113 quantitatively quantitatively RB work_ayatblpinzaztdzhilw6yqsi6m 141 114 Kharraz Kharraz NNP work_ayatblpinzaztdzhilw6yqsi6m 141 115 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 141 116 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 141 117 . . . work_ayatblpinzaztdzhilw6yqsi6m 142 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 142 2 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 142 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 142 4 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 142 5 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 142 6 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 142 7 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 142 8 Monitors monitor NNS work_ayatblpinzaztdzhilw6yqsi6m 142 9 file file NN work_ayatblpinzaztdzhilw6yqsi6m 142 10 system system NN work_ayatblpinzaztdzhilw6yqsi6m 142 11 I i NN work_ayatblpinzaztdzhilw6yqsi6m 142 12 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 142 13 O o NN work_ayatblpinzaztdzhilw6yqsi6m 142 14 activity activity NN work_ayatblpinzaztdzhilw6yqsi6m 142 15 � � . work_ayatblpinzaztdzhilw6yqsi6m 142 16 Detect detect JJ work_ayatblpinzaztdzhilw6yqsi6m 142 17 screen screen NN work_ayatblpinzaztdzhilw6yqsi6m 142 18 locking lock VBG work_ayatblpinzaztdzhilw6yqsi6m 142 19 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 142 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 142 21 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 142 22 used use VBD work_ayatblpinzaztdzhilw6yqsi6m 142 23 Tesseract Tesseract NNP work_ayatblpinzaztdzhilw6yqsi6m 142 24 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 142 25 OCR OCR NNP work_ayatblpinzaztdzhilw6yqsi6m 142 26 � � HYPH work_ayatblpinzaztdzhilw6yqsi6m 142 27 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 142 28 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 142 29 family family NN work_ayatblpinzaztdzhilw6yqsi6m 142 30 were be VBD work_ayatblpinzaztdzhilw6yqsi6m 142 31 detected detect VBN work_ayatblpinzaztdzhilw6yqsi6m 142 32 that that DT work_ayatblpinzaztdzhilw6yqsi6m 142 33 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 142 34 not not RB work_ayatblpinzaztdzhilw6yqsi6m 142 35 detected detect VBN work_ayatblpinzaztdzhilw6yqsi6m 142 36 previously previously RB work_ayatblpinzaztdzhilw6yqsi6m 142 37 � � . work_ayatblpinzaztdzhilw6yqsi6m 142 38 The the DT work_ayatblpinzaztdzhilw6yqsi6m 142 39 long long JJ work_ayatblpinzaztdzhilw6yqsi6m 142 40 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 142 41 term term NN work_ayatblpinzaztdzhilw6yqsi6m 142 42 study study NN work_ayatblpinzaztdzhilw6yqsi6m 142 43 analyzed analyze VBD work_ayatblpinzaztdzhilw6yqsi6m 142 44 148223 148223 CD work_ayatblpinzaztdzhilw6yqsi6m 142 45 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 142 46 samples sample NNS work_ayatblpinzaztdzhilw6yqsi6m 142 47 and and CC work_ayatblpinzaztdzhilw6yqsi6m 142 48 correctly correctly RB work_ayatblpinzaztdzhilw6yqsi6m 142 49 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 142 50 and and CC work_ayatblpinzaztdzhilw6yqsi6m 142 51 verified verify VBD work_ayatblpinzaztdzhilw6yqsi6m 142 52 13637 13637 CD work_ayatblpinzaztdzhilw6yqsi6m 142 53 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 142 54 samples sample NNS work_ayatblpinzaztdzhilw6yqsi6m 142 55 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 142 56 96.3 96.3 CD work_ayatblpinzaztdzhilw6yqsi6m 142 57 % % NN work_ayatblpinzaztdzhilw6yqsi6m 142 58 TP tp NN work_ayatblpinzaztdzhilw6yqsi6m 142 59 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 142 60 and and CC work_ayatblpinzaztdzhilw6yqsi6m 142 61 0 0 CD work_ayatblpinzaztdzhilw6yqsi6m 142 62 FPs fp NNS work_ayatblpinzaztdzhilw6yqsi6m 142 63 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 142 64 Accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 142 65 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 142 66 not not RB work_ayatblpinzaztdzhilw6yqsi6m 142 67 that that RB work_ayatblpinzaztdzhilw6yqsi6m 142 68 good good JJ work_ayatblpinzaztdzhilw6yqsi6m 142 69 . . . work_ayatblpinzaztdzhilw6yqsi6m 143 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 143 2 example example NN work_ayatblpinzaztdzhilw6yqsi6m 143 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 143 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 143 5 system system NN work_ayatblpinzaztdzhilw6yqsi6m 143 6 correctly correctly RB work_ayatblpinzaztdzhilw6yqsi6m 143 7 detects detect VBZ work_ayatblpinzaztdzhilw6yqsi6m 143 8 7,572 7,572 CD work_ayatblpinzaztdzhilw6yqsi6m 143 9 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 143 10 whereas whereas IN work_ayatblpinzaztdzhilw6yqsi6m 143 11 only only RB work_ayatblpinzaztdzhilw6yqsi6m 143 12 one one CD work_ayatblpinzaztdzhilw6yqsi6m 143 13 unknown unknown NN work_ayatblpinzaztdzhilw6yqsi6m 143 14 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 143 15 detected detect VBN work_ayatblpinzaztdzhilw6yqsi6m 143 16 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 143 17 Continued continued JJ work_ayatblpinzaztdzhilw6yqsi6m 143 18 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 143 19 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 143 20 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 143 21 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 143 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 144 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 144 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 144 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 144 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 144 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 144 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 144 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 145 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 145 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 145 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 145 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 145 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 145 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 145 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 145 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 145 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 145 10 7/24 7/24 CD work_ayatblpinzaztdzhilw6yqsi6m 145 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 145 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NN work_ayatblpinzaztdzhilw6yqsi6m 145 13 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 145 14 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 145 15 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 145 16 continued continue VBN work_ayatblpinzaztdzhilw6yqsi6m 145 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 145 18 References reference NNS work_ayatblpinzaztdzhilw6yqsi6m 145 19 Methodology Methodology NNP work_ayatblpinzaztdzhilw6yqsi6m 145 20 Strengths Strengths NNP work_ayatblpinzaztdzhilw6yqsi6m 145 21 Limitations Limitations NNPS work_ayatblpinzaztdzhilw6yqsi6m 145 22 Sgandurra Sgandurra NNP work_ayatblpinzaztdzhilw6yqsi6m 145 23 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 145 24 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 145 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 146 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 146 2 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 146 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 146 4 � � , work_ayatblpinzaztdzhilw6yqsi6m 146 5 Dynamically dynamically RB work_ayatblpinzaztdzhilw6yqsi6m 146 6 monitor monitor VBP work_ayatblpinzaztdzhilw6yqsi6m 146 7 file file NN work_ayatblpinzaztdzhilw6yqsi6m 146 8 system system NN work_ayatblpinzaztdzhilw6yqsi6m 146 9 activity activity NN work_ayatblpinzaztdzhilw6yqsi6m 146 10 on on IN work_ayatblpinzaztdzhilw6yqsi6m 146 11 windows window NNS work_ayatblpinzaztdzhilw6yqsi6m 146 12 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 146 13 � � , work_ayatblpinzaztdzhilw6yqsi6m 146 14 Classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 146 15 between between IN work_ayatblpinzaztdzhilw6yqsi6m 146 16 goodware goodware NN work_ayatblpinzaztdzhilw6yqsi6m 146 17 and and CC work_ayatblpinzaztdzhilw6yqsi6m 146 18 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 146 19 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 146 20 ML ML NNP work_ayatblpinzaztdzhilw6yqsi6m 146 21 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 146 22 Mutual mutual JJ work_ayatblpinzaztdzhilw6yqsi6m 146 23 Information information NN work_ayatblpinzaztdzhilw6yqsi6m 146 24 and and CC work_ayatblpinzaztdzhilw6yqsi6m 146 25 Regularized Regularized NNP work_ayatblpinzaztdzhilw6yqsi6m 146 26 Logistic Logistic NNP work_ayatblpinzaztdzhilw6yqsi6m 146 27 Regression Regression NNP work_ayatblpinzaztdzhilw6yqsi6m 146 28 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 146 29 used use VBD work_ayatblpinzaztdzhilw6yqsi6m 146 30 . . . work_ayatblpinzaztdzhilw6yqsi6m 147 1 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 147 2 Proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 147 3 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 147 4 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 147 5 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 147 6 EldeRan EldeRan NNP work_ayatblpinzaztdzhilw6yqsi6m 147 7 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 147 8 effective effective JJ work_ayatblpinzaztdzhilw6yqsi6m 147 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 147 10 entirely entirely RB work_ayatblpinzaztdzhilw6yqsi6m 147 11 automated automate VBD work_ayatblpinzaztdzhilw6yqsi6m 147 12 tool tool NN work_ayatblpinzaztdzhilw6yqsi6m 147 13 to to TO work_ayatblpinzaztdzhilw6yqsi6m 147 14 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 147 15 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 147 16 software software NN work_ayatblpinzaztdzhilw6yqsi6m 147 17 and and CC work_ayatblpinzaztdzhilw6yqsi6m 147 18 enhance enhance VB work_ayatblpinzaztdzhilw6yqsi6m 147 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 147 20 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 147 21 capabilities capability NNS work_ayatblpinzaztdzhilw6yqsi6m 147 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 147 23 AV av NN work_ayatblpinzaztdzhilw6yqsi6m 147 24 software software NN work_ayatblpinzaztdzhilw6yqsi6m 147 25 � � NN work_ayatblpinzaztdzhilw6yqsi6m 147 26 registry registry NN work_ayatblpinzaztdzhilw6yqsi6m 147 27 key key NN work_ayatblpinzaztdzhilw6yqsi6m 147 28 and and CC work_ayatblpinzaztdzhilw6yqsi6m 147 29 API API NNP work_ayatblpinzaztdzhilw6yqsi6m 147 30 calls call NNS work_ayatblpinzaztdzhilw6yqsi6m 147 31 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 147 32 the the DT work_ayatblpinzaztdzhilw6yqsi6m 147 33 two two CD work_ayatblpinzaztdzhilw6yqsi6m 147 34 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 147 35 with with IN work_ayatblpinzaztdzhilw6yqsi6m 147 36 the the DT work_ayatblpinzaztdzhilw6yqsi6m 147 37 most most RBS work_ayatblpinzaztdzhilw6yqsi6m 147 38 relevant relevant JJ work_ayatblpinzaztdzhilw6yqsi6m 147 39 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 147 40 . . . work_ayatblpinzaztdzhilw6yqsi6m 148 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 148 2 EldeRan EldeRan NNP work_ayatblpinzaztdzhilw6yqsi6m 148 3 achieves achieve VBZ work_ayatblpinzaztdzhilw6yqsi6m 148 4 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 148 5 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 148 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 148 7 0.995 0.995 CD work_ayatblpinzaztdzhilw6yqsi6m 148 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 148 9 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 148 10 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 148 11 96.3 96.3 CD work_ayatblpinzaztdzhilw6yqsi6m 148 12 % % NN work_ayatblpinzaztdzhilw6yqsi6m 148 13 � � . work_ayatblpinzaztdzhilw6yqsi6m 148 14 Despite despite IN work_ayatblpinzaztdzhilw6yqsi6m 148 15 good good JJ work_ayatblpinzaztdzhilw6yqsi6m 148 16 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 148 17 , , , work_ayatblpinzaztdzhilw6yqsi6m 148 18 EldeRan elderan NN work_ayatblpinzaztdzhilw6yqsi6m 148 19 still still RB work_ayatblpinzaztdzhilw6yqsi6m 148 20 not not RB work_ayatblpinzaztdzhilw6yqsi6m 148 21 be be VB work_ayatblpinzaztdzhilw6yqsi6m 148 22 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 148 23 as as IN work_ayatblpinzaztdzhilw6yqsi6m 148 24 a a DT work_ayatblpinzaztdzhilw6yqsi6m 148 25 replacement replacement NN work_ayatblpinzaztdzhilw6yqsi6m 148 26 for for IN work_ayatblpinzaztdzhilw6yqsi6m 148 27 AV av NN work_ayatblpinzaztdzhilw6yqsi6m 148 28 � � , work_ayatblpinzaztdzhilw6yqsi6m 148 29 the the DT work_ayatblpinzaztdzhilw6yqsi6m 148 30 current current JJ work_ayatblpinzaztdzhilw6yqsi6m 148 31 settings setting NNS work_ayatblpinzaztdzhilw6yqsi6m 148 32 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 148 33 no no DT work_ayatblpinzaztdzhilw6yqsi6m 148 34 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 148 35 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 148 36 running run VBG work_ayatblpinzaztdzhilw6yqsi6m 148 37 in in IN work_ayatblpinzaztdzhilw6yqsi6m 148 38 the the DT work_ayatblpinzaztdzhilw6yqsi6m 148 39 VM VM NNP work_ayatblpinzaztdzhilw6yqsi6m 148 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 148 41 except except IN work_ayatblpinzaztdzhilw6yqsi6m 148 42 the the DT work_ayatblpinzaztdzhilw6yqsi6m 148 43 ones one NNS work_ayatblpinzaztdzhilw6yqsi6m 148 44 coming come VBG work_ayatblpinzaztdzhilw6yqsi6m 148 45 with with IN work_ayatblpinzaztdzhilw6yqsi6m 148 46 a a DT work_ayatblpinzaztdzhilw6yqsi6m 148 47 fresh fresh JJ work_ayatblpinzaztdzhilw6yqsi6m 148 48 installation installation NN work_ayatblpinzaztdzhilw6yqsi6m 148 49 of of IN work_ayatblpinzaztdzhilw6yqsi6m 148 50 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 148 51 , , , work_ayatblpinzaztdzhilw6yqsi6m 148 52 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 148 53 initial initial JJ work_ayatblpinzaztdzhilw6yqsi6m 148 54 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 148 55 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 148 56 larger large JJR work_ayatblpinzaztdzhilw6yqsi6m 148 57 � � , work_ayatblpinzaztdzhilw6yqsi6m 148 58 Unable unable JJ work_ayatblpinzaztdzhilw6yqsi6m 148 59 to to TO work_ayatblpinzaztdzhilw6yqsi6m 148 60 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 148 61 RW RW NNP work_ayatblpinzaztdzhilw6yqsi6m 148 62 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 148 63 shows show VBZ work_ayatblpinzaztdzhilw6yqsi6m 148 64 silent silent JJ work_ayatblpinzaztdzhilw6yqsi6m 148 65 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 148 66 , , , work_ayatblpinzaztdzhilw6yqsi6m 148 67 or or CC work_ayatblpinzaztdzhilw6yqsi6m 148 68 wait wait VB work_ayatblpinzaztdzhilw6yqsi6m 148 69 for for IN work_ayatblpinzaztdzhilw6yqsi6m 148 70 the the DT work_ayatblpinzaztdzhilw6yqsi6m 148 71 user user NN work_ayatblpinzaztdzhilw6yqsi6m 148 72 to to TO work_ayatblpinzaztdzhilw6yqsi6m 148 73 do do VB work_ayatblpinzaztdzhilw6yqsi6m 148 74 something something NN work_ayatblpinzaztdzhilw6yqsi6m 148 75 Chen Chen NNP work_ayatblpinzaztdzhilw6yqsi6m 148 76 & & CC work_ayatblpinzaztdzhilw6yqsi6m 148 77 Robert Robert NNP work_ayatblpinzaztdzhilw6yqsi6m 148 78 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 148 79 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 148 80 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 148 81 � � . work_ayatblpinzaztdzhilw6yqsi6m 148 82 Dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 148 83 behavioral behavioral JJ work_ayatblpinzaztdzhilw6yqsi6m 148 84 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 148 85 of of IN work_ayatblpinzaztdzhilw6yqsi6m 148 86 wanna wanna NN work_ayatblpinzaztdzhilw6yqsi6m 148 87 cry cry NN work_ayatblpinzaztdzhilw6yqsi6m 148 88 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 148 89 Present present VB work_ayatblpinzaztdzhilw6yqsi6m 148 90 a a DT work_ayatblpinzaztdzhilw6yqsi6m 148 91 method method NN work_ayatblpinzaztdzhilw6yqsi6m 148 92 to to TO work_ayatblpinzaztdzhilw6yqsi6m 148 93 extract extract VB work_ayatblpinzaztdzhilw6yqsi6m 148 94 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 148 95 of of IN work_ayatblpinzaztdzhilw6yqsi6m 148 96 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 148 97 from from IN work_ayatblpinzaztdzhilw6yqsi6m 148 98 hosts host NNS work_ayatblpinzaztdzhilw6yqsi6m 148 99 logs log NNS work_ayatblpinzaztdzhilw6yqsi6m 148 100 � � : work_ayatblpinzaztdzhilw6yqsi6m 148 101 TF TF NNP work_ayatblpinzaztdzhilw6yqsi6m 148 102 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 148 103 IDF IDF NNP work_ayatblpinzaztdzhilw6yqsi6m 148 104 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 148 105 gives give VBZ work_ayatblpinzaztdzhilw6yqsi6m 148 106 better well JJR work_ayatblpinzaztdzhilw6yqsi6m 148 107 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 148 108 for for IN work_ayatblpinzaztdzhilw6yqsi6m 148 109 analyzing analyze VBG work_ayatblpinzaztdzhilw6yqsi6m 148 110 wanna wanna NNP work_ayatblpinzaztdzhilw6yqsi6m 148 111 cry cry NN work_ayatblpinzaztdzhilw6yqsi6m 148 112 � � NNPS work_ayatblpinzaztdzhilw6yqsi6m 148 113 Research Research NNP work_ayatblpinzaztdzhilw6yqsi6m 148 114 helps help VBZ work_ayatblpinzaztdzhilw6yqsi6m 148 115 in in IN work_ayatblpinzaztdzhilw6yqsi6m 148 116 further further JJ work_ayatblpinzaztdzhilw6yqsi6m 148 117 manual manual JJ work_ayatblpinzaztdzhilw6yqsi6m 148 118 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 148 119 of of IN work_ayatblpinzaztdzhilw6yqsi6m 148 120 logs logs NNP work_ayatblpinzaztdzhilw6yqsi6m 148 121 from from IN work_ayatblpinzaztdzhilw6yqsi6m 148 122 ambient ambient JJ work_ayatblpinzaztdzhilw6yqsi6m 148 123 system system NN work_ayatblpinzaztdzhilw6yqsi6m 148 124 logs log VBZ work_ayatblpinzaztdzhilw6yqsi6m 148 125 in in IN work_ayatblpinzaztdzhilw6yqsi6m 148 126 forensic forensic JJ work_ayatblpinzaztdzhilw6yqsi6m 148 127 efforts effort NNS work_ayatblpinzaztdzhilw6yqsi6m 148 128 . . . work_ayatblpinzaztdzhilw6yqsi6m 149 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 2 Automatically automatically RB work_ayatblpinzaztdzhilw6yqsi6m 149 3 generate generate VBP work_ayatblpinzaztdzhilw6yqsi6m 149 4 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 149 5 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 149 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 149 7 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 149 8 samples sample NNS work_ayatblpinzaztdzhilw6yqsi6m 149 9 from from IN work_ayatblpinzaztdzhilw6yqsi6m 149 10 sandbox sandbox JJ work_ayatblpinzaztdzhilw6yqsi6m 149 11 log log NN work_ayatblpinzaztdzhilw6yqsi6m 149 12 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 149 13 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 14 Presentation presentation NN work_ayatblpinzaztdzhilw6yqsi6m 149 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 149 16 experimented experiment VBN work_ayatblpinzaztdzhilw6yqsi6m 149 17 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 149 18 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 149 19 outside outside IN work_ayatblpinzaztdzhilw6yqsi6m 149 20 the the DT work_ayatblpinzaztdzhilw6yqsi6m 149 21 scope scope NN work_ayatblpinzaztdzhilw6yqsi6m 149 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 149 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 149 24 article article NN work_ayatblpinzaztdzhilw6yqsi6m 149 25 � � : work_ayatblpinzaztdzhilw6yqsi6m 149 26 Study study VB work_ayatblpinzaztdzhilw6yqsi6m 149 27 not not RB work_ayatblpinzaztdzhilw6yqsi6m 149 28 help help VB work_ayatblpinzaztdzhilw6yqsi6m 149 29 in in IN work_ayatblpinzaztdzhilw6yqsi6m 149 30 analyzing analyze VBG work_ayatblpinzaztdzhilw6yqsi6m 149 31 automatic automatic JJ work_ayatblpinzaztdzhilw6yqsi6m 149 32 pattern pattern NN work_ayatblpinzaztdzhilw6yqsi6m 149 33 generation generation NN work_ayatblpinzaztdzhilw6yqsi6m 149 34 Al Al NNP work_ayatblpinzaztdzhilw6yqsi6m 149 35 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 149 36 rimy rimy NNP work_ayatblpinzaztdzhilw6yqsi6m 149 37 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 38 Maarof Maarof NNP work_ayatblpinzaztdzhilw6yqsi6m 149 39 & & CC work_ayatblpinzaztdzhilw6yqsi6m 149 40 Shaid Shaid NNP work_ayatblpinzaztdzhilw6yqsi6m 149 41 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 149 42 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 149 43 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 149 44 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 45 Machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 149 46 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 149 47 n n NN work_ayatblpinzaztdzhilw6yqsi6m 149 48 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 149 49 gram gram NN work_ayatblpinzaztdzhilw6yqsi6m 149 50 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 51 EFCM EFCM NNP work_ayatblpinzaztdzhilw6yqsi6m 149 52 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 53 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 54 Information information NN work_ayatblpinzaztdzhilw6yqsi6m 149 55 Gain gain NN work_ayatblpinzaztdzhilw6yqsi6m 149 56 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 57 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 58 Sliding slide VBG work_ayatblpinzaztdzhilw6yqsi6m 149 59 window window NN work_ayatblpinzaztdzhilw6yqsi6m 149 60 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 61 Static static JJ work_ayatblpinzaztdzhilw6yqsi6m 149 62 + + SYM work_ayatblpinzaztdzhilw6yqsi6m 149 63 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 149 64 conf conf NN work_ayatblpinzaztdzhilw6yqsi6m 149 65 � � '' work_ayatblpinzaztdzhilw6yqsi6m 149 66 SVM SVM NNP work_ayatblpinzaztdzhilw6yqsi6m 149 67 for for IN work_ayatblpinzaztdzhilw6yqsi6m 149 68 behavioral behavioral JJ work_ayatblpinzaztdzhilw6yqsi6m 149 69 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 149 70 � � . work_ayatblpinzaztdzhilw6yqsi6m 149 71 Proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 149 72 framework framework NN work_ayatblpinzaztdzhilw6yqsi6m 149 73 inclines incline VBZ work_ayatblpinzaztdzhilw6yqsi6m 149 74 to to TO work_ayatblpinzaztdzhilw6yqsi6m 149 75 share share VB work_ayatblpinzaztdzhilw6yqsi6m 149 76 the the DT work_ayatblpinzaztdzhilw6yqsi6m 149 77 pre pre JJ work_ayatblpinzaztdzhilw6yqsi6m 149 78 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 149 79 encryption encryption JJ work_ayatblpinzaztdzhilw6yqsi6m 149 80 data data NN work_ayatblpinzaztdzhilw6yqsi6m 149 81 space space NN work_ayatblpinzaztdzhilw6yqsi6m 149 82 as as IN work_ayatblpinzaztdzhilw6yqsi6m 149 83 the the DT work_ayatblpinzaztdzhilw6yqsi6m 149 84 main main JJ work_ayatblpinzaztdzhilw6yqsi6m 149 85 defense defense NN work_ayatblpinzaztdzhilw6yqsi6m 149 86 step step NN work_ayatblpinzaztdzhilw6yqsi6m 149 87 against against IN work_ayatblpinzaztdzhilw6yqsi6m 149 88 crypto- crypto- NNP work_ayatblpinzaztdzhilw6yqsi6m 149 89 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 149 90 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 149 91 � � . work_ayatblpinzaztdzhilw6yqsi6m 149 92 No no DT work_ayatblpinzaztdzhilw6yqsi6m 149 93 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 149 94 � � . work_ayatblpinzaztdzhilw6yqsi6m 149 95 No no DT work_ayatblpinzaztdzhilw6yqsi6m 149 96 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 149 97 work work NN work_ayatblpinzaztdzhilw6yqsi6m 149 98 � � . work_ayatblpinzaztdzhilw6yqsi6m 149 99 No no DT work_ayatblpinzaztdzhilw6yqsi6m 149 100 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 149 101 evaluation evaluation NN work_ayatblpinzaztdzhilw6yqsi6m 149 102 details detail NNS work_ayatblpinzaztdzhilw6yqsi6m 149 103 Bahador Bahador NNP work_ayatblpinzaztdzhilw6yqsi6m 149 104 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 105 Abadi Abadi NNP work_ayatblpinzaztdzhilw6yqsi6m 149 106 & & CC work_ayatblpinzaztdzhilw6yqsi6m 149 107 Tajoddin Tajoddin NNP work_ayatblpinzaztdzhilw6yqsi6m 149 108 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 149 109 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 149 110 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 149 111 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 112 Presents present VBZ work_ayatblpinzaztdzhilw6yqsi6m 149 113 a a DT work_ayatblpinzaztdzhilw6yqsi6m 149 114 two two CD work_ayatblpinzaztdzhilw6yqsi6m 149 115 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 149 116 stage stage NN work_ayatblpinzaztdzhilw6yqsi6m 149 117 heuristic heuristic JJ work_ayatblpinzaztdzhilw6yqsi6m 149 118 matching matching NN work_ayatblpinzaztdzhilw6yqsi6m 149 119 strategy strategy NN work_ayatblpinzaztdzhilw6yqsi6m 149 120 signature signature NN work_ayatblpinzaztdzhilw6yqsi6m 149 121 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 149 122 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 149 123 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 149 124 to to IN work_ayatblpinzaztdzhilw6yqsi6m 149 125 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 149 126 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 149 127 level level NN work_ayatblpinzaztdzhilw6yqsi6m 149 128 behavioral behavioral JJ work_ayatblpinzaztdzhilw6yqsi6m 149 129 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 149 130 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 149 131 and and CC work_ayatblpinzaztdzhilw6yqsi6m 149 132 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 149 133 � � . work_ayatblpinzaztdzhilw6yqsi6m 149 134 HLMD hlmd NN work_ayatblpinzaztdzhilw6yqsi6m 149 135 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 149 136 can can MD work_ayatblpinzaztdzhilw6yqsi6m 149 137 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 149 138 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 149 139 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 149 140 at at IN work_ayatblpinzaztdzhilw6yqsi6m 149 141 the the DT work_ayatblpinzaztdzhilw6yqsi6m 149 142 beginning beginning NN work_ayatblpinzaztdzhilw6yqsi6m 149 143 of of IN work_ayatblpinzaztdzhilw6yqsi6m 149 144 the the DT work_ayatblpinzaztdzhilw6yqsi6m 149 145 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 149 146 and and CC work_ayatblpinzaztdzhilw6yqsi6m 149 147 can can MD work_ayatblpinzaztdzhilw6yqsi6m 149 148 achieve achieve VB work_ayatblpinzaztdzhilw6yqsi6m 149 149 an an DT work_ayatblpinzaztdzhilw6yqsi6m 149 150 average average JJ work_ayatblpinzaztdzhilw6yqsi6m 149 151 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 149 152 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 153 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 149 154 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 155 and and CC work_ayatblpinzaztdzhilw6yqsi6m 149 156 F f NN work_ayatblpinzaztdzhilw6yqsi6m 149 157 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 149 158 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 149 159 of of IN work_ayatblpinzaztdzhilw6yqsi6m 149 160 95.19 95.19 CD work_ayatblpinzaztdzhilw6yqsi6m 149 161 % % NN work_ayatblpinzaztdzhilw6yqsi6m 149 162 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 163 89.96 89.96 CD work_ayatblpinzaztdzhilw6yqsi6m 149 164 % % NN work_ayatblpinzaztdzhilw6yqsi6m 149 165 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 166 and and CC work_ayatblpinzaztdzhilw6yqsi6m 149 167 92.50 92.50 CD work_ayatblpinzaztdzhilw6yqsi6m 149 168 % % NN work_ayatblpinzaztdzhilw6yqsi6m 149 169 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 170 respectively respectively RB work_ayatblpinzaztdzhilw6yqsi6m 149 171 � � . work_ayatblpinzaztdzhilw6yqsi6m 149 172 Their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 149 173 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 149 174 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 149 175 suitable suitable JJ work_ayatblpinzaztdzhilw6yqsi6m 149 176 for for IN work_ayatblpinzaztdzhilw6yqsi6m 149 177 independent independent JJ work_ayatblpinzaztdzhilw6yqsi6m 149 178 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 149 179 programs program NNS work_ayatblpinzaztdzhilw6yqsi6m 149 180 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 149 181 worms worm NNS work_ayatblpinzaztdzhilw6yqsi6m 149 182 , , , work_ayatblpinzaztdzhilw6yqsi6m 149 183 Trojans Trojans NNPS work_ayatblpinzaztdzhilw6yqsi6m 149 184 and and CC work_ayatblpinzaztdzhilw6yqsi6m 149 185 bots bot NNS work_ayatblpinzaztdzhilw6yqsi6m 149 186 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 149 187 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 149 188 can can MD work_ayatblpinzaztdzhilw6yqsi6m 149 189 be be VB work_ayatblpinzaztdzhilw6yqsi6m 149 190 run run VBN work_ayatblpinzaztdzhilw6yqsi6m 149 191 standalone standalone JJ work_ayatblpinzaztdzhilw6yqsi6m 149 192 without without IN work_ayatblpinzaztdzhilw6yqsi6m 149 193 having have VBG work_ayatblpinzaztdzhilw6yqsi6m 149 194 to to TO work_ayatblpinzaztdzhilw6yqsi6m 149 195 be be VB work_ayatblpinzaztdzhilw6yqsi6m 149 196 attached attach VBN work_ayatblpinzaztdzhilw6yqsi6m 149 197 to to IN work_ayatblpinzaztdzhilw6yqsi6m 149 198 a a DT work_ayatblpinzaztdzhilw6yqsi6m 149 199 host host NN work_ayatblpinzaztdzhilw6yqsi6m 149 200 program program NN work_ayatblpinzaztdzhilw6yqsi6m 149 201 � � . work_ayatblpinzaztdzhilw6yqsi6m 149 202 Not not RB work_ayatblpinzaztdzhilw6yqsi6m 149 203 applicable applicable JJ work_ayatblpinzaztdzhilw6yqsi6m 149 204 for for IN work_ayatblpinzaztdzhilw6yqsi6m 149 205 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 149 206 Dion Dion NNP work_ayatblpinzaztdzhilw6yqsi6m 149 207 & & CC work_ayatblpinzaztdzhilw6yqsi6m 149 208 Brohi Brohi NNP work_ayatblpinzaztdzhilw6yqsi6m 149 209 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 149 210 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 149 211 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 149 212 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 149 213 analyzed analyze VBD work_ayatblpinzaztdzhilw6yqsi6m 149 214 the the DT work_ayatblpinzaztdzhilw6yqsi6m 149 215 opcodes opcode NNS work_ayatblpinzaztdzhilw6yqsi6m 149 216 and and CC work_ayatblpinzaztdzhilw6yqsi6m 149 217 measures measure NNS work_ayatblpinzaztdzhilw6yqsi6m 149 218 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 149 219 frequencies frequency NNS work_ayatblpinzaztdzhilw6yqsi6m 149 220 . . . work_ayatblpinzaztdzhilw6yqsi6m 150 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 150 2 Compare compare VB work_ayatblpinzaztdzhilw6yqsi6m 150 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 150 4 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 150 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 150 6 supervised supervised JJ work_ayatblpinzaztdzhilw6yqsi6m 150 7 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 150 8 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 150 9 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 150 10 for for IN work_ayatblpinzaztdzhilw6yqsi6m 150 11 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 150 12 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 150 13 � � , work_ayatblpinzaztdzhilw6yqsi6m 150 14 Experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 150 15 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 150 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 150 17 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 150 18 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 150 19 , , , work_ayatblpinzaztdzhilw6yqsi6m 150 20 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 150 21 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 150 22 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 150 23 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 150 24 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 150 25 GBDT GBDT NNP work_ayatblpinzaztdzhilw6yqsi6m 150 26 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 150 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 150 28 Neural Neural NNP work_ayatblpinzaztdzhilw6yqsi6m 150 29 Network Network NNP work_ayatblpinzaztdzhilw6yqsi6m 150 30 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 150 31 Multilayer Multilayer NNP work_ayatblpinzaztdzhilw6yqsi6m 150 32 Perceptron Perceptron NNP work_ayatblpinzaztdzhilw6yqsi6m 150 33 and and CC work_ayatblpinzaztdzhilw6yqsi6m 150 34 three three CD work_ayatblpinzaztdzhilw6yqsi6m 150 35 types type NNS work_ayatblpinzaztdzhilw6yqsi6m 150 36 of of IN work_ayatblpinzaztdzhilw6yqsi6m 150 37 Support Support NNP work_ayatblpinzaztdzhilw6yqsi6m 150 38 Vector Vector NNP work_ayatblpinzaztdzhilw6yqsi6m 150 39 Machine Machine NNP work_ayatblpinzaztdzhilw6yqsi6m 150 40 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 150 41 SVM SVM NNP work_ayatblpinzaztdzhilw6yqsi6m 150 42 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 150 43 were be VBD work_ayatblpinzaztdzhilw6yqsi6m 150 44 performed perform VBN work_ayatblpinzaztdzhilw6yqsi6m 150 45 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 150 46 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 150 47 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 150 48 and and CC work_ayatblpinzaztdzhilw6yqsi6m 150 49 GBDT GBDT NNP work_ayatblpinzaztdzhilw6yqsi6m 150 50 outperformed outperform VBN work_ayatblpinzaztdzhilw6yqsi6m 150 51 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 150 52 Authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 150 53 mentioned mention VBD work_ayatblpinzaztdzhilw6yqsi6m 150 54 that that IN work_ayatblpinzaztdzhilw6yqsi6m 150 55 the the DT work_ayatblpinzaztdzhilw6yqsi6m 150 56 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 150 57 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 150 58 can can MD work_ayatblpinzaztdzhilw6yqsi6m 150 59 be be VB work_ayatblpinzaztdzhilw6yqsi6m 150 60 able able JJ work_ayatblpinzaztdzhilw6yqsi6m 150 61 to to TO work_ayatblpinzaztdzhilw6yqsi6m 150 62 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 150 63 only only RB work_ayatblpinzaztdzhilw6yqsi6m 150 64 exe exe NN work_ayatblpinzaztdzhilw6yqsi6m 150 65 or or CC work_ayatblpinzaztdzhilw6yqsi6m 150 66 ddl ddl JJ work_ayatblpinzaztdzhilw6yqsi6m 150 67 format format NN work_ayatblpinzaztdzhilw6yqsi6m 150 68 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 150 69 � � . work_ayatblpinzaztdzhilw6yqsi6m 150 70 Only only RB work_ayatblpinzaztdzhilw6yqsi6m 150 71 supervised supervise VBD work_ayatblpinzaztdzhilw6yqsi6m 150 72 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 150 73 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 150 74 applied apply VBD work_ayatblpinzaztdzhilw6yqsi6m 150 75 Kadiyala Kadiyala NNP work_ayatblpinzaztdzhilw6yqsi6m 150 76 et et FW work_ayatblpinzaztdzhilw6yqsi6m 150 77 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 150 78 . . . work_ayatblpinzaztdzhilw6yqsi6m 151 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 151 2 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 151 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 151 4 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 151 5 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 151 6 Analysis Analysis NNP work_ayatblpinzaztdzhilw6yqsi6m 151 7 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 151 8 Hardware Hardware NNP work_ayatblpinzaztdzhilw6yqsi6m 151 9 Performance Performance NNP work_ayatblpinzaztdzhilw6yqsi6m 151 10 Counters Counters NNP work_ayatblpinzaztdzhilw6yqsi6m 151 11 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 151 12 Proposed propose VBD work_ayatblpinzaztdzhilw6yqsi6m 151 13 a a DT work_ayatblpinzaztdzhilw6yqsi6m 151 14 three three CD work_ayatblpinzaztdzhilw6yqsi6m 151 15 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 151 16 step step NN work_ayatblpinzaztdzhilw6yqsi6m 151 17 methodology methodology NN work_ayatblpinzaztdzhilw6yqsi6m 151 18 included include VBD work_ayatblpinzaztdzhilw6yqsi6m 151 19 i i PRP work_ayatblpinzaztdzhilw6yqsi6m 151 20 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 151 21 extracting extract VBG work_ayatblpinzaztdzhilw6yqsi6m 151 22 the the DT work_ayatblpinzaztdzhilw6yqsi6m 151 23 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 151 24 ii ii NNP work_ayatblpinzaztdzhilw6yqsi6m 151 25 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 151 26 finding find VBG work_ayatblpinzaztdzhilw6yqsi6m 151 27 maximum maximum JJ work_ayatblpinzaztdzhilw6yqsi6m 151 28 variance variance NN work_ayatblpinzaztdzhilw6yqsi6m 151 29 through through IN work_ayatblpinzaztdzhilw6yqsi6m 151 30 reducing reduce VBG work_ayatblpinzaztdzhilw6yqsi6m 151 31 fine fine RB work_ayatblpinzaztdzhilw6yqsi6m 151 32 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 151 33 grained grain VBN work_ayatblpinzaztdzhilw6yqsi6m 151 34 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 151 35 iii iii NNS work_ayatblpinzaztdzhilw6yqsi6m 151 36 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 151 37 apply apply VBP work_ayatblpinzaztdzhilw6yqsi6m 151 38 ML ML NNP work_ayatblpinzaztdzhilw6yqsi6m 151 39 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 151 40 � � , work_ayatblpinzaztdzhilw6yqsi6m 151 41 extract extract VB work_ayatblpinzaztdzhilw6yqsi6m 151 42 the the DT work_ayatblpinzaztdzhilw6yqsi6m 151 43 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 151 44 for for IN work_ayatblpinzaztdzhilw6yqsi6m 151 45 each each DT work_ayatblpinzaztdzhilw6yqsi6m 151 46 system system NN work_ayatblpinzaztdzhilw6yqsi6m 151 47 call call NN work_ayatblpinzaztdzhilw6yqsi6m 151 48 during during IN work_ayatblpinzaztdzhilw6yqsi6m 151 49 the the DT work_ayatblpinzaztdzhilw6yqsi6m 151 50 runtime runtime NN work_ayatblpinzaztdzhilw6yqsi6m 151 51 of of IN work_ayatblpinzaztdzhilw6yqsi6m 151 52 the the DT work_ayatblpinzaztdzhilw6yqsi6m 151 53 program program NN work_ayatblpinzaztdzhilw6yqsi6m 151 54 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 151 55 perf perf VBN work_ayatblpinzaztdzhilw6yqsi6m 151 56 libraries library NNS work_ayatblpinzaztdzhilw6yqsi6m 151 57 along along IN work_ayatblpinzaztdzhilw6yqsi6m 151 58 with with IN work_ayatblpinzaztdzhilw6yqsi6m 151 59 CoreSight CoreSight NNP work_ayatblpinzaztdzhilw6yqsi6m 151 60 Access Access NNP work_ayatblpinzaztdzhilw6yqsi6m 151 61 Libraries Libraries NNPS work_ayatblpinzaztdzhilw6yqsi6m 151 62 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 151 63 allows allow VBZ work_ayatblpinzaztdzhilw6yqsi6m 151 64 to to TO work_ayatblpinzaztdzhilw6yqsi6m 151 65 interact interact VB work_ayatblpinzaztdzhilw6yqsi6m 151 66 directly directly RB work_ayatblpinzaztdzhilw6yqsi6m 151 67 through through IN work_ayatblpinzaztdzhilw6yqsi6m 151 68 APIs api NNS work_ayatblpinzaztdzhilw6yqsi6m 151 69 � � , work_ayatblpinzaztdzhilw6yqsi6m 151 70 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 151 71 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 151 72 98.4 98.4 CD work_ayatblpinzaztdzhilw6yqsi6m 151 73 % % NN work_ayatblpinzaztdzhilw6yqsi6m 151 74 � � , work_ayatblpinzaztdzhilw6yqsi6m 151 75 suitable suitable JJ work_ayatblpinzaztdzhilw6yqsi6m 151 76 for for IN work_ayatblpinzaztdzhilw6yqsi6m 151 77 linux linux JJ work_ayatblpinzaztdzhilw6yqsi6m 151 78 environment environment NN work_ayatblpinzaztdzhilw6yqsi6m 151 79 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 151 80 Training Training NNP work_ayatblpinzaztdzhilw6yqsi6m 151 81 set set NN work_ayatblpinzaztdzhilw6yqsi6m 151 82 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 151 83 small small JJ work_ayatblpinzaztdzhilw6yqsi6m 151 84 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 151 85 Monitored monitor VBN work_ayatblpinzaztdzhilw6yqsi6m 151 86 only only RB work_ayatblpinzaztdzhilw6yqsi6m 151 87 four four CD work_ayatblpinzaztdzhilw6yqsi6m 151 88 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 151 89 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 151 90 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 151 91 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 151 92 3.1 3.1 CD work_ayatblpinzaztdzhilw6yqsi6m 151 93 % % NN work_ayatblpinzaztdzhilw6yqsi6m 151 94 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 151 95 positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 151 96 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 151 97 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 151 98 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 151 99 . . . work_ayatblpinzaztdzhilw6yqsi6m 152 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 152 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 152 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 152 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 152 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 152 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 152 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 153 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 153 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 153 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 153 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 153 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 153 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 153 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 153 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 153 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 153 10 8/24 8/24 CD work_ayatblpinzaztdzhilw6yqsi6m 153 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 153 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ : work_ayatblpinzaztdzhilw6yqsi6m 153 13 if if IN work_ayatblpinzaztdzhilw6yqsi6m 153 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 153 15 training training NN work_ayatblpinzaztdzhilw6yqsi6m 153 16 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 153 17 performed perform VBN work_ayatblpinzaztdzhilw6yqsi6m 153 18 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 153 19 large large JJ work_ayatblpinzaztdzhilw6yqsi6m 153 20 datasets dataset NNS work_ayatblpinzaztdzhilw6yqsi6m 153 21 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 153 22 Liu Liu NNP work_ayatblpinzaztdzhilw6yqsi6m 153 23 & & CC work_ayatblpinzaztdzhilw6yqsi6m 153 24 Liu Liu NNP work_ayatblpinzaztdzhilw6yqsi6m 153 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 153 26 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 153 27 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 153 28 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 153 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 153 30 Zhao Zhao NNP work_ayatblpinzaztdzhilw6yqsi6m 153 31 & & CC work_ayatblpinzaztdzhilw6yqsi6m 153 32 LeCun LeCun NNP work_ayatblpinzaztdzhilw6yqsi6m 153 33 , , , work_ayatblpinzaztdzhilw6yqsi6m 153 34 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 153 35 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 153 36 . . . work_ayatblpinzaztdzhilw6yqsi6m 154 1 Due due IN work_ayatblpinzaztdzhilw6yqsi6m 154 2 to to IN work_ayatblpinzaztdzhilw6yqsi6m 154 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 154 4 limited limited JJ work_ayatblpinzaztdzhilw6yqsi6m 154 5 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 154 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 154 7 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 154 8 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 154 9 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 154 10 supervised supervise VBN work_ayatblpinzaztdzhilw6yqsi6m 154 11 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 154 12 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 154 13 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 154 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 155 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 155 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 155 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 155 4 core core NN work_ayatblpinzaztdzhilw6yqsi6m 155 5 objective objective NN work_ayatblpinzaztdzhilw6yqsi6m 155 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 155 7 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 155 8 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 155 9 scheme scheme NN work_ayatblpinzaztdzhilw6yqsi6m 155 10 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 155 11 to to TO work_ayatblpinzaztdzhilw6yqsi6m 155 12 gauge gauge VB work_ayatblpinzaztdzhilw6yqsi6m 155 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 155 14 effectiveness effectiveness NN work_ayatblpinzaztdzhilw6yqsi6m 155 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 155 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 155 17 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 155 18 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 155 19 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 155 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 155 21 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 155 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 155 23 a a DT work_ayatblpinzaztdzhilw6yqsi6m 155 24 truly truly RB work_ayatblpinzaztdzhilw6yqsi6m 155 25 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 155 26 environment environment NN work_ayatblpinzaztdzhilw6yqsi6m 155 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 155 28 for for IN work_ayatblpinzaztdzhilw6yqsi6m 155 29 the the DT work_ayatblpinzaztdzhilw6yqsi6m 155 30 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 155 31 of of IN work_ayatblpinzaztdzhilw6yqsi6m 155 32 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 155 33 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 155 34 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 155 35 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 155 36 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 155 37 . . . work_ayatblpinzaztdzhilw6yqsi6m 156 1 Besides besides RB work_ayatblpinzaztdzhilw6yqsi6m 156 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 156 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 156 4 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 156 5 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 156 6 exhibit exhibit VBP work_ayatblpinzaztdzhilw6yqsi6m 156 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 156 8 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 156 9 application application NN work_ayatblpinzaztdzhilw6yqsi6m 156 10 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 156 11 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 156 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 156 13 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 156 14 being be VBG work_ayatblpinzaztdzhilw6yqsi6m 156 15 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 156 16 by by IN work_ayatblpinzaztdzhilw6yqsi6m 156 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 156 18 researchers researcher NNS work_ayatblpinzaztdzhilw6yqsi6m 156 19 to to TO work_ayatblpinzaztdzhilw6yqsi6m 156 20 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 156 21 application application NN work_ayatblpinzaztdzhilw6yqsi6m 156 22 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 156 23 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 156 24 Mucci Mucci NNP work_ayatblpinzaztdzhilw6yqsi6m 156 25 et et FW work_ayatblpinzaztdzhilw6yqsi6m 156 26 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 156 27 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 156 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 156 29 1999 1999 CD work_ayatblpinzaztdzhilw6yqsi6m 156 30 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 156 31 Bahador Bahador NNP work_ayatblpinzaztdzhilw6yqsi6m 156 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 156 33 Abadi Abadi NNP work_ayatblpinzaztdzhilw6yqsi6m 156 34 & & CC work_ayatblpinzaztdzhilw6yqsi6m 156 35 Tajoddin Tajoddin NNP work_ayatblpinzaztdzhilw6yqsi6m 156 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 156 37 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 156 38 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 156 39 Demme Demme NNP work_ayatblpinzaztdzhilw6yqsi6m 156 40 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 156 41 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 156 42 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 156 43 , , , work_ayatblpinzaztdzhilw6yqsi6m 156 44 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 156 45 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 156 46 . . . work_ayatblpinzaztdzhilw6yqsi6m 157 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 157 2 Basu Basu NNP work_ayatblpinzaztdzhilw6yqsi6m 157 3 et et FW work_ayatblpinzaztdzhilw6yqsi6m 157 4 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 157 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 158 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 158 2 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 158 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 158 4 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 158 5 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 158 6 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 158 7 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 158 8 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 158 9 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 158 10 to to TO work_ayatblpinzaztdzhilw6yqsi6m 158 11 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 158 12 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 158 13 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 158 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 158 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 158 16 in in IN work_ayatblpinzaztdzhilw6yqsi6m 158 17 another another DT work_ayatblpinzaztdzhilw6yqsi6m 158 18 similar similar JJ work_ayatblpinzaztdzhilw6yqsi6m 158 19 work work NN work_ayatblpinzaztdzhilw6yqsi6m 158 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 158 21 Bahador Bahador NNP work_ayatblpinzaztdzhilw6yqsi6m 158 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 158 23 Abadi Abadi NNP work_ayatblpinzaztdzhilw6yqsi6m 158 24 & & CC work_ayatblpinzaztdzhilw6yqsi6m 158 25 Tajoddin Tajoddin NNP work_ayatblpinzaztdzhilw6yqsi6m 158 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 158 27 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 158 28 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 158 29 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 158 30 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 158 31 presented present VBN work_ayatblpinzaztdzhilw6yqsi6m 158 32 a a DT work_ayatblpinzaztdzhilw6yqsi6m 158 33 heuristic heuristic JJ work_ayatblpinzaztdzhilw6yqsi6m 158 34 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 158 35 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 158 36 signature signature NN work_ayatblpinzaztdzhilw6yqsi6m 158 37 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 158 38 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 158 39 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 158 40 and and CC work_ayatblpinzaztdzhilw6yqsi6m 158 41 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 158 42 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 158 43 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 158 44 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 158 45 to to TO work_ayatblpinzaztdzhilw6yqsi6m 158 46 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 158 47 and and CC work_ayatblpinzaztdzhilw6yqsi6m 158 48 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 158 49 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 158 50 . . . work_ayatblpinzaztdzhilw6yqsi6m 159 1 Their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 159 2 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 159 3 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 159 4 only only RB work_ayatblpinzaztdzhilw6yqsi6m 159 5 suitable suitable JJ work_ayatblpinzaztdzhilw6yqsi6m 159 6 for for IN work_ayatblpinzaztdzhilw6yqsi6m 159 7 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 159 8 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 159 9 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 159 10 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 159 11 invoked invoke VBN work_ayatblpinzaztdzhilw6yqsi6m 159 12 as as IN work_ayatblpinzaztdzhilw6yqsi6m 159 13 standalone standalone JJ work_ayatblpinzaztdzhilw6yqsi6m 159 14 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 159 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 159 16 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 159 17 not not RB work_ayatblpinzaztdzhilw6yqsi6m 159 18 dependent dependent JJ work_ayatblpinzaztdzhilw6yqsi6m 159 19 on on IN work_ayatblpinzaztdzhilw6yqsi6m 159 20 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 159 21 host host NN work_ayatblpinzaztdzhilw6yqsi6m 159 22 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 159 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 160 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 160 2 summary summary NN work_ayatblpinzaztdzhilw6yqsi6m 160 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 160 4 none none NN work_ayatblpinzaztdzhilw6yqsi6m 160 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 160 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 160 7 existing exist VBG work_ayatblpinzaztdzhilw6yqsi6m 160 8 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 160 9 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 160 10 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 160 11 utilizes utilize VBZ work_ayatblpinzaztdzhilw6yqsi6m 160 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 160 13 important important JJ work_ayatblpinzaztdzhilw6yqsi6m 160 14 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 160 15 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 160 16 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 160 17 as as IN work_ayatblpinzaztdzhilw6yqsi6m 160 18 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 160 19 to to TO work_ayatblpinzaztdzhilw6yqsi6m 160 20 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 160 21 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 160 22 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 160 23 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 160 24 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 160 25 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 160 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 161 1 Although although IN work_ayatblpinzaztdzhilw6yqsi6m 161 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 161 3 there there EX work_ayatblpinzaztdzhilw6yqsi6m 161 4 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 161 5 few few JJ work_ayatblpinzaztdzhilw6yqsi6m 161 6 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 161 7 available available JJ work_ayatblpinzaztdzhilw6yqsi6m 161 8 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 161 9 classify classify VBP work_ayatblpinzaztdzhilw6yqsi6m 161 10 a a DT work_ayatblpinzaztdzhilw6yqsi6m 161 11 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 161 12 application application NN work_ayatblpinzaztdzhilw6yqsi6m 161 13 from from IN work_ayatblpinzaztdzhilw6yqsi6m 161 14 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 161 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 161 16 however however RB work_ayatblpinzaztdzhilw6yqsi6m 161 17 , , , work_ayatblpinzaztdzhilw6yqsi6m 161 18 to to IN work_ayatblpinzaztdzhilw6yqsi6m 161 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 161 20 best good JJS work_ayatblpinzaztdzhilw6yqsi6m 161 21 of of IN work_ayatblpinzaztdzhilw6yqsi6m 161 22 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 161 23 knowledge knowledge NN work_ayatblpinzaztdzhilw6yqsi6m 161 24 no no DT work_ayatblpinzaztdzhilw6yqsi6m 161 25 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 161 26 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 161 27 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 161 28 utilizing utilize VBG work_ayatblpinzaztdzhilw6yqsi6m 161 29 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 161 30 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 161 31 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 161 32 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 161 33 classified classify VBD work_ayatblpinzaztdzhilw6yqsi6m 161 34 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 161 35 into into IN work_ayatblpinzaztdzhilw6yqsi6m 161 36 the the DT work_ayatblpinzaztdzhilw6yqsi6m 161 37 subclass subclass NN work_ayatblpinzaztdzhilw6yqsi6m 161 38 of of IN work_ayatblpinzaztdzhilw6yqsi6m 161 39 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 161 40 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 161 41 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 161 42 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 161 43 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 161 44 on on IN work_ayatblpinzaztdzhilw6yqsi6m 161 45 the the DT work_ayatblpinzaztdzhilw6yqsi6m 161 46 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 161 47 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 161 48 . . . work_ayatblpinzaztdzhilw6yqsi6m 162 1 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 162 2 can can MD work_ayatblpinzaztdzhilw6yqsi6m 162 3 employ employ VB work_ayatblpinzaztdzhilw6yqsi6m 162 4 obfuscation obfuscation NN work_ayatblpinzaztdzhilw6yqsi6m 162 5 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 162 6 to to TO work_ayatblpinzaztdzhilw6yqsi6m 162 7 deceive deceive VB work_ayatblpinzaztdzhilw6yqsi6m 162 8 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 162 9 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 162 10 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 162 11 anti anti NNS work_ayatblpinzaztdzhilw6yqsi6m 162 12 - - NNS work_ayatblpinzaztdzhilw6yqsi6m 162 13 viruses virus NNS work_ayatblpinzaztdzhilw6yqsi6m 162 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 163 1 Furthermore furthermore RB work_ayatblpinzaztdzhilw6yqsi6m 163 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 163 3 runtime runtime NN work_ayatblpinzaztdzhilw6yqsi6m 163 4 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 163 5 can can MD work_ayatblpinzaztdzhilw6yqsi6m 163 6 not not RB work_ayatblpinzaztdzhilw6yqsi6m 163 7 be be VB work_ayatblpinzaztdzhilw6yqsi6m 163 8 obfuscated obfuscate VBN work_ayatblpinzaztdzhilw6yqsi6m 163 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 163 10 can can MD work_ayatblpinzaztdzhilw6yqsi6m 163 11 be be VB work_ayatblpinzaztdzhilw6yqsi6m 163 12 detected detect VBN work_ayatblpinzaztdzhilw6yqsi6m 163 13 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 163 14 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 163 15 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 163 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 164 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 164 2 believe believe VBP work_ayatblpinzaztdzhilw6yqsi6m 164 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 164 4 aspect aspect NN work_ayatblpinzaztdzhilw6yqsi6m 164 5 should should MD work_ayatblpinzaztdzhilw6yqsi6m 164 6 essentially essentially RB work_ayatblpinzaztdzhilw6yqsi6m 164 7 be be VB work_ayatblpinzaztdzhilw6yqsi6m 164 8 exploited exploit VBN work_ayatblpinzaztdzhilw6yqsi6m 164 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 164 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 164 11 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 164 12 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 164 13 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 164 14 should should MD work_ayatblpinzaztdzhilw6yqsi6m 164 15 be be VB work_ayatblpinzaztdzhilw6yqsi6m 164 16 utilized utilize VBN work_ayatblpinzaztdzhilw6yqsi6m 164 17 to to TO work_ayatblpinzaztdzhilw6yqsi6m 164 18 execute execute VB work_ayatblpinzaztdzhilw6yqsi6m 164 19 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 164 20 for for IN work_ayatblpinzaztdzhilw6yqsi6m 164 21 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 164 22 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 164 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 165 1 Based base VBN work_ayatblpinzaztdzhilw6yqsi6m 165 2 on on IN work_ayatblpinzaztdzhilw6yqsi6m 165 3 these these DT work_ayatblpinzaztdzhilw6yqsi6m 165 4 facts fact NNS work_ayatblpinzaztdzhilw6yqsi6m 165 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 165 6 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 165 7 argue argue VBP work_ayatblpinzaztdzhilw6yqsi6m 165 8 that that IN work_ayatblpinzaztdzhilw6yqsi6m 165 9 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 165 10 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 165 11 useful useful JJ work_ayatblpinzaztdzhilw6yqsi6m 165 12 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 165 13 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 165 14 could could MD work_ayatblpinzaztdzhilw6yqsi6m 165 15 be be VB work_ayatblpinzaztdzhilw6yqsi6m 165 16 utilized utilize VBN work_ayatblpinzaztdzhilw6yqsi6m 165 17 for for IN work_ayatblpinzaztdzhilw6yqsi6m 165 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 165 19 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 165 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 165 21 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 165 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 165 23 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 165 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 166 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 166 2 this this DT work_ayatblpinzaztdzhilw6yqsi6m 166 3 study study NN work_ayatblpinzaztdzhilw6yqsi6m 166 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 166 5 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 166 6 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 166 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 166 8 continued continued JJ work_ayatblpinzaztdzhilw6yqsi6m 166 9 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 166 10 References reference NNS work_ayatblpinzaztdzhilw6yqsi6m 166 11 Methodology Methodology NNP work_ayatblpinzaztdzhilw6yqsi6m 166 12 Strengths Strengths NNP work_ayatblpinzaztdzhilw6yqsi6m 166 13 Limitations Limitations NNP work_ayatblpinzaztdzhilw6yqsi6m 166 14 Alam Alam NNP work_ayatblpinzaztdzhilw6yqsi6m 166 15 et et FW work_ayatblpinzaztdzhilw6yqsi6m 166 16 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 166 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 167 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 167 2 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 167 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 167 4 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 167 5 Dynamic Dynamic NNP work_ayatblpinzaztdzhilw6yqsi6m 167 6 Analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 167 7 � � , work_ayatblpinzaztdzhilw6yqsi6m 167 8 Implement Implement NNP work_ayatblpinzaztdzhilw6yqsi6m 167 9 Artificial Artificial NNP work_ayatblpinzaztdzhilw6yqsi6m 167 10 Neural Neural NNP work_ayatblpinzaztdzhilw6yqsi6m 167 11 Network Network NNP work_ayatblpinzaztdzhilw6yqsi6m 167 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 167 13 Fast Fast NNP work_ayatblpinzaztdzhilw6yqsi6m 167 14 Fourier Fourier NNP work_ayatblpinzaztdzhilw6yqsi6m 167 15 Transformation Transformation NNP work_ayatblpinzaztdzhilw6yqsi6m 167 16 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 167 17 Disk Disk NNP work_ayatblpinzaztdzhilw6yqsi6m 167 18 encryption encryption NN work_ayatblpinzaztdzhilw6yqsi6m 167 19 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 167 20 module module JJ work_ayatblpinzaztdzhilw6yqsi6m 167 21 process process NN work_ayatblpinzaztdzhilw6yqsi6m 167 22 used use VBD work_ayatblpinzaztdzhilw6yqsi6m 167 23 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 167 24 Two two CD work_ayatblpinzaztdzhilw6yqsi6m 167 25 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 167 26 step step NN work_ayatblpinzaztdzhilw6yqsi6m 167 27 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 167 28 framework framework NN work_ayatblpinzaztdzhilw6yqsi6m 167 29 named name VBN work_ayatblpinzaztdzhilw6yqsi6m 167 30 as as IN work_ayatblpinzaztdzhilw6yqsi6m 167 31 RAPPER RAPPER NNP work_ayatblpinzaztdzhilw6yqsi6m 167 32 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 167 33 an an DT work_ayatblpinzaztdzhilw6yqsi6m 167 34 accurate accurate JJ work_ayatblpinzaztdzhilw6yqsi6m 167 35 , , , work_ayatblpinzaztdzhilw6yqsi6m 167 36 fast fast JJ work_ayatblpinzaztdzhilw6yqsi6m 167 37 , , , work_ayatblpinzaztdzhilw6yqsi6m 167 38 and and CC work_ayatblpinzaztdzhilw6yqsi6m 167 39 reliable reliable JJ work_ayatblpinzaztdzhilw6yqsi6m 167 40 solution solution NN work_ayatblpinzaztdzhilw6yqsi6m 167 41 to to TO work_ayatblpinzaztdzhilw6yqsi6m 167 42 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 167 43 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 167 44 . . . work_ayatblpinzaztdzhilw6yqsi6m 168 1 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 168 2 Used use VBD work_ayatblpinzaztdzhilw6yqsi6m 168 3 minimal minimal JJ work_ayatblpinzaztdzhilw6yqsi6m 168 4 tracepoints tracepoint NNS work_ayatblpinzaztdzhilw6yqsi6m 168 5 � � , work_ayatblpinzaztdzhilw6yqsi6m 168 6 Provide provide VB work_ayatblpinzaztdzhilw6yqsi6m 168 7 a a DT work_ayatblpinzaztdzhilw6yqsi6m 168 8 comprehensive comprehensive JJ work_ayatblpinzaztdzhilw6yqsi6m 168 9 solution solution NN work_ayatblpinzaztdzhilw6yqsi6m 168 10 to to TO work_ayatblpinzaztdzhilw6yqsi6m 168 11 tackle tackle VB work_ayatblpinzaztdzhilw6yqsi6m 168 12 standard standard JJ work_ayatblpinzaztdzhilw6yqsi6m 168 13 benchmark benchmark NN work_ayatblpinzaztdzhilw6yqsi6m 168 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 168 15 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 168 16 disk disk NN work_ayatblpinzaztdzhilw6yqsi6m 168 17 encryption encryption NN work_ayatblpinzaztdzhilw6yqsi6m 168 18 and and CC work_ayatblpinzaztdzhilw6yqsi6m 168 19 regular regular JJ work_ayatblpinzaztdzhilw6yqsi6m 168 20 high high JJ work_ayatblpinzaztdzhilw6yqsi6m 168 21 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 168 22 computational computational JJ work_ayatblpinzaztdzhilw6yqsi6m 168 23 processes process NNS work_ayatblpinzaztdzhilw6yqsi6m 168 24 � � NNS work_ayatblpinzaztdzhilw6yqsi6m 168 25 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 168 26 were be VBD work_ayatblpinzaztdzhilw6yqsi6m 168 27 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 168 28 to to TO work_ayatblpinzaztdzhilw6yqsi6m 168 29 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 168 30 files file NNS work_ayatblpinzaztdzhilw6yqsi6m 168 31 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 168 32 perf perf VBN work_ayatblpinzaztdzhilw6yqsi6m 168 33 tool tool NN work_ayatblpinzaztdzhilw6yqsi6m 168 34 � � NNS work_ayatblpinzaztdzhilw6yqsi6m 168 35 Observe observe NN work_ayatblpinzaztdzhilw6yqsi6m 168 36 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 168 37 events event NNS work_ayatblpinzaztdzhilw6yqsi6m 168 38 of of IN work_ayatblpinzaztdzhilw6yqsi6m 168 39 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 168 40 only only RB work_ayatblpinzaztdzhilw6yqsi6m 168 41 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 168 42 , , , work_ayatblpinzaztdzhilw6yqsi6m 168 43 instruction instruction NN work_ayatblpinzaztdzhilw6yqsi6m 168 44 , , , work_ayatblpinzaztdzhilw6yqsi6m 168 45 cache cache NN work_ayatblpinzaztdzhilw6yqsi6m 168 46 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 168 47 references reference NNS work_ayatblpinzaztdzhilw6yqsi6m 168 48 , , , work_ayatblpinzaztdzhilw6yqsi6m 168 49 cache- cache- NN work_ayatblpinzaztdzhilw6yqsi6m 168 50 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 168 51 , , , work_ayatblpinzaztdzhilw6yqsi6m 168 52 branches branch NNS work_ayatblpinzaztdzhilw6yqsi6m 168 53 , , , work_ayatblpinzaztdzhilw6yqsi6m 168 54 and and CC work_ayatblpinzaztdzhilw6yqsi6m 168 55 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 168 56 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 168 57 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 168 58 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 168 59 Analyze Analyze NNP work_ayatblpinzaztdzhilw6yqsi6m 168 60 and and CC work_ayatblpinzaztdzhilw6yqsi6m 168 61 present present VB work_ayatblpinzaztdzhilw6yqsi6m 168 62 all all PDT work_ayatblpinzaztdzhilw6yqsi6m 168 63 the the DT work_ayatblpinzaztdzhilw6yqsi6m 168 64 case case NN work_ayatblpinzaztdzhilw6yqsi6m 168 65 studies study NNS work_ayatblpinzaztdzhilw6yqsi6m 168 66 by by IN work_ayatblpinzaztdzhilw6yqsi6m 168 67 giving give VBG work_ayatblpinzaztdzhilw6yqsi6m 168 68 a a DT work_ayatblpinzaztdzhilw6yqsi6m 168 69 comparison comparison NN work_ayatblpinzaztdzhilw6yqsi6m 168 70 with with IN work_ayatblpinzaztdzhilw6yqsi6m 168 71 WannaCry WannaCry NNP work_ayatblpinzaztdzhilw6yqsi6m 168 72 only only RB work_ayatblpinzaztdzhilw6yqsi6m 168 73 � � . work_ayatblpinzaztdzhilw6yqsi6m 168 74 Lack lack NN work_ayatblpinzaztdzhilw6yqsi6m 168 75 of of IN work_ayatblpinzaztdzhilw6yqsi6m 168 76 detailed detailed JJ work_ayatblpinzaztdzhilw6yqsi6m 168 77 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 168 78 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 168 79 and and CC work_ayatblpinzaztdzhilw6yqsi6m 168 80 accuracies accuracy NNS work_ayatblpinzaztdzhilw6yqsi6m 168 81 . . . work_ayatblpinzaztdzhilw6yqsi6m 169 1 Our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 169 2 Approach Approach NNP work_ayatblpinzaztdzhilw6yqsi6m 169 3 � � NN work_ayatblpinzaztdzhilw6yqsi6m 169 4 Dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 169 5 Analysis Analysis NNP work_ayatblpinzaztdzhilw6yqsi6m 169 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 169 7 Hardware Hardware NNP work_ayatblpinzaztdzhilw6yqsi6m 169 8 Performance Performance NNP work_ayatblpinzaztdzhilw6yqsi6m 169 9 counters counter VBZ work_ayatblpinzaztdzhilw6yqsi6m 169 10 � � JJ work_ayatblpinzaztdzhilw6yqsi6m 169 11 Performed performed JJ work_ayatblpinzaztdzhilw6yqsi6m 169 12 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 169 13 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 169 14 on on IN work_ayatblpinzaztdzhilw6yqsi6m 169 15 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 169 16 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 169 17 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 169 18 executable executable JJ work_ayatblpinzaztdzhilw6yqsi6m 169 19 files file NNS work_ayatblpinzaztdzhilw6yqsi6m 169 20 � � `` work_ayatblpinzaztdzhilw6yqsi6m 169 21 Apply apply VB work_ayatblpinzaztdzhilw6yqsi6m 169 22 ML ML NNP work_ayatblpinzaztdzhilw6yqsi6m 169 23 algorithm algorithm NN work_ayatblpinzaztdzhilw6yqsi6m 169 24 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 169 25 as as IN work_ayatblpinzaztdzhilw6yqsi6m 169 26 RF RF NNP work_ayatblpinzaztdzhilw6yqsi6m 169 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 169 28 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 169 29 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 169 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 169 31 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 169 32 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 169 33 , , , work_ayatblpinzaztdzhilw6yqsi6m 169 34 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 169 35 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 169 36 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 169 37 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 169 38 Attained attain VBD work_ayatblpinzaztdzhilw6yqsi6m 169 39 F f NN work_ayatblpinzaztdzhilw6yqsi6m 169 40 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 169 41 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 169 42 score score NN work_ayatblpinzaztdzhilw6yqsi6m 169 43 of of IN work_ayatblpinzaztdzhilw6yqsi6m 169 44 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 169 45 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 169 46 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 169 47 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 169 48 and and CC work_ayatblpinzaztdzhilw6yqsi6m 169 49 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 169 50 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 169 51 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 169 52 outperformed outperform VBN work_ayatblpinzaztdzhilw6yqsi6m 169 53 � � . work_ayatblpinzaztdzhilw6yqsi6m 169 54 Dataset Dataset NNP work_ayatblpinzaztdzhilw6yqsi6m 169 55 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 169 56 initially initially RB work_ayatblpinzaztdzhilw6yqsi6m 169 57 large large JJ work_ayatblpinzaztdzhilw6yqsi6m 169 58 but but CC work_ayatblpinzaztdzhilw6yqsi6m 169 59 after after IN work_ayatblpinzaztdzhilw6yqsi6m 169 60 preprocessing preprocesse VBG work_ayatblpinzaztdzhilw6yqsi6m 169 61 remain remain VBP work_ayatblpinzaztdzhilw6yqsi6m 169 62 small small JJ work_ayatblpinzaztdzhilw6yqsi6m 169 63 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 169 64 � � . work_ayatblpinzaztdzhilw6yqsi6m 169 65 Only only RB work_ayatblpinzaztdzhilw6yqsi6m 169 66 supervised supervise VBD work_ayatblpinzaztdzhilw6yqsi6m 169 67 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 169 68 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 169 69 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 169 70 applied apply VBD work_ayatblpinzaztdzhilw6yqsi6m 169 71 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 169 72 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 169 73 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 169 74 . . . work_ayatblpinzaztdzhilw6yqsi6m 170 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 170 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 170 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 170 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 170 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 170 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 170 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 171 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 171 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 171 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 171 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 171 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 171 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 171 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 171 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 171 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 171 10 9/24 9/24 CD work_ayatblpinzaztdzhilw6yqsi6m 171 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 171 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ '' work_ayatblpinzaztdzhilw6yqsi6m 171 13 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 171 14 employ employ VBP work_ayatblpinzaztdzhilw6yqsi6m 171 15 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 171 16 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 171 17 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 171 18 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 171 19 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 171 20 as as IN work_ayatblpinzaztdzhilw6yqsi6m 171 21 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 171 22 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 171 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 171 24 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 171 25 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 171 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 171 27 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 171 28 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 171 29 and and CC work_ayatblpinzaztdzhilw6yqsi6m 171 30 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 171 31 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 171 32 Boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 171 33 along along IN work_ayatblpinzaztdzhilw6yqsi6m 171 34 with with IN work_ayatblpinzaztdzhilw6yqsi6m 171 35 the the DT work_ayatblpinzaztdzhilw6yqsi6m 171 36 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 171 37 to to TO work_ayatblpinzaztdzhilw6yqsi6m 171 38 address address VB work_ayatblpinzaztdzhilw6yqsi6m 171 39 the the DT work_ayatblpinzaztdzhilw6yqsi6m 171 40 following follow VBG work_ayatblpinzaztdzhilw6yqsi6m 171 41 questions question NNS work_ayatblpinzaztdzhilw6yqsi6m 171 42 : : : work_ayatblpinzaztdzhilw6yqsi6m 171 43 1 1 LS work_ayatblpinzaztdzhilw6yqsi6m 171 44 . . . work_ayatblpinzaztdzhilw6yqsi6m 172 1 How how WRB work_ayatblpinzaztdzhilw6yqsi6m 172 2 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 172 3 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 172 4 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 172 5 from from IN work_ayatblpinzaztdzhilw6yqsi6m 172 6 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 172 7 at at IN work_ayatblpinzaztdzhilw6yqsi6m 172 8 runtime runtime NN work_ayatblpinzaztdzhilw6yqsi6m 172 9 considering consider VBG work_ayatblpinzaztdzhilw6yqsi6m 172 10 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 172 11 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 172 12 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 172 13 ? ? . work_ayatblpinzaztdzhilw6yqsi6m 173 1 2 2 LS work_ayatblpinzaztdzhilw6yqsi6m 173 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 174 1 Which which WDT work_ayatblpinzaztdzhilw6yqsi6m 174 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 174 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 174 4 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 174 5 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 174 6 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 174 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 174 8 HPCs HPCs NNP work_ayatblpinzaztdzhilw6yqsi6m 174 9 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 174 10 play play VBP work_ayatblpinzaztdzhilw6yqsi6m 174 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 174 12 vital vital JJ work_ayatblpinzaztdzhilw6yqsi6m 174 13 role role NN work_ayatblpinzaztdzhilw6yqsi6m 174 14 in in IN work_ayatblpinzaztdzhilw6yqsi6m 174 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 174 16 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 174 17 ? ? . work_ayatblpinzaztdzhilw6yqsi6m 175 1 MOTIVATION MOTIVATION NNP work_ayatblpinzaztdzhilw6yqsi6m 175 2 AND and CC work_ayatblpinzaztdzhilw6yqsi6m 175 3 METHODOLOGY methodology NN work_ayatblpinzaztdzhilw6yqsi6m 175 4 The the DT work_ayatblpinzaztdzhilw6yqsi6m 175 5 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 175 6 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 175 7 holds hold VBZ work_ayatblpinzaztdzhilw6yqsi6m 175 8 adequate adequate JJ work_ayatblpinzaztdzhilw6yqsi6m 175 9 potential potential NN work_ayatblpinzaztdzhilw6yqsi6m 175 10 to to TO work_ayatblpinzaztdzhilw6yqsi6m 175 11 accurately accurately RB work_ayatblpinzaztdzhilw6yqsi6m 175 12 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 175 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 175 14 threat threat NN work_ayatblpinzaztdzhilw6yqsi6m 175 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 175 16 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 175 17 because because IN work_ayatblpinzaztdzhilw6yqsi6m 175 18 an an DT work_ayatblpinzaztdzhilw6yqsi6m 175 19 executable executable JJ work_ayatblpinzaztdzhilw6yqsi6m 175 20 program program NN work_ayatblpinzaztdzhilw6yqsi6m 175 21 can can MD work_ayatblpinzaztdzhilw6yqsi6m 175 22 not not RB work_ayatblpinzaztdzhilw6yqsi6m 175 23 hide hide VB work_ayatblpinzaztdzhilw6yqsi6m 175 24 its -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 175 25 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 175 26 characteristic characteristic NN work_ayatblpinzaztdzhilw6yqsi6m 175 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 176 1 Therefore therefore RB work_ayatblpinzaztdzhilw6yqsi6m 176 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 176 3 most most JJS work_ayatblpinzaztdzhilw6yqsi6m 176 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 176 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 176 6 anti anti JJ work_ayatblpinzaztdzhilw6yqsi6m 176 7 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 176 8 virus virus JJ work_ayatblpinzaztdzhilw6yqsi6m 176 9 vendors vendor NNS work_ayatblpinzaztdzhilw6yqsi6m 176 10 rely rely VBP work_ayatblpinzaztdzhilw6yqsi6m 176 11 on on IN work_ayatblpinzaztdzhilw6yqsi6m 176 12 automated automate VBN work_ayatblpinzaztdzhilw6yqsi6m 176 13 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 176 14 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 176 15 mechanisms mechanism NNS work_ayatblpinzaztdzhilw6yqsi6m 176 16 to to TO work_ayatblpinzaztdzhilw6yqsi6m 176 17 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 176 18 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 176 19 variants variant NNS work_ayatblpinzaztdzhilw6yqsi6m 176 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 176 21 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 176 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 177 1 Most Most JJS work_ayatblpinzaztdzhilw6yqsi6m 177 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 177 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 177 4 antiviruses antiviruse NNS work_ayatblpinzaztdzhilw6yqsi6m 177 5 apply apply VBP work_ayatblpinzaztdzhilw6yqsi6m 177 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 177 7 heuristics heuristic NNS work_ayatblpinzaztdzhilw6yqsi6m 177 8 combined combine VBN work_ayatblpinzaztdzhilw6yqsi6m 177 9 with with IN work_ayatblpinzaztdzhilw6yqsi6m 177 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 177 11 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 177 12 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 177 13 to to TO work_ayatblpinzaztdzhilw6yqsi6m 177 14 deduce deduce VB work_ayatblpinzaztdzhilw6yqsi6m 177 15 whether whether IN work_ayatblpinzaztdzhilw6yqsi6m 177 16 an an DT work_ayatblpinzaztdzhilw6yqsi6m 177 17 executable executable JJ work_ayatblpinzaztdzhilw6yqsi6m 177 18 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 177 19 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 177 20 or or CC work_ayatblpinzaztdzhilw6yqsi6m 177 21 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 177 22 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 177 23 Sgandurra Sgandurra NNP work_ayatblpinzaztdzhilw6yqsi6m 177 24 et et FW work_ayatblpinzaztdzhilw6yqsi6m 177 25 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 177 26 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 177 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 177 28 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 177 29 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 177 30 . . . work_ayatblpinzaztdzhilw6yqsi6m 178 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 178 2 wide wide JJ work_ayatblpinzaztdzhilw6yqsi6m 178 3 range range NN work_ayatblpinzaztdzhilw6yqsi6m 178 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 178 5 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 178 6 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 178 7 is is RB work_ayatblpinzaztdzhilw6yqsi6m 178 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 178 9 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 178 10 cycles cycle NNS work_ayatblpinzaztdzhilw6yqsi6m 178 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 178 12 cache cache NNP work_ayatblpinzaztdzhilw6yqsi6m 178 13 hits hits NNP work_ayatblpinzaztdzhilw6yqsi6m 178 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 178 15 cache cache NNP work_ayatblpinzaztdzhilw6yqsi6m 178 16 misses misses NNP work_ayatblpinzaztdzhilw6yqsi6m 178 17 , , , work_ayatblpinzaztdzhilw6yqsi6m 178 18 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 178 19 instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 178 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 178 21 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 178 22 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 178 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 178 24 retired retire VBN work_ayatblpinzaztdzhilw6yqsi6m 178 25 instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 178 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 178 27 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 178 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 179 1 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 179 2 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 179 3 to to TO work_ayatblpinzaztdzhilw6yqsi6m 179 4 observe observe VB work_ayatblpinzaztdzhilw6yqsi6m 179 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 179 6 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 179 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 179 8 an an DT work_ayatblpinzaztdzhilw6yqsi6m 179 9 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 179 10 application application NN work_ayatblpinzaztdzhilw6yqsi6m 179 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 179 12 Chiappetta Chiappetta NNP work_ayatblpinzaztdzhilw6yqsi6m 179 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 179 14 Savas Savas NNP work_ayatblpinzaztdzhilw6yqsi6m 179 15 & & CC work_ayatblpinzaztdzhilw6yqsi6m 179 16 Yilmaz Yilmaz NNP work_ayatblpinzaztdzhilw6yqsi6m 179 17 , , , work_ayatblpinzaztdzhilw6yqsi6m 179 18 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 179 19 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 179 20 . . . work_ayatblpinzaztdzhilw6yqsi6m 180 1 Usually usually RB work_ayatblpinzaztdzhilw6yqsi6m 180 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 180 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 180 4 symmetric symmetric JJ work_ayatblpinzaztdzhilw6yqsi6m 180 5 encryption encryption NN work_ayatblpinzaztdzhilw6yqsi6m 180 6 marks mark VBZ work_ayatblpinzaztdzhilw6yqsi6m 180 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 180 8 cache cache NNP work_ayatblpinzaztdzhilw6yqsi6m 180 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 180 10 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 180 11 events event NNS work_ayatblpinzaztdzhilw6yqsi6m 180 12 while while IN work_ayatblpinzaztdzhilw6yqsi6m 180 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 180 14 asymmetric asymmetric JJ work_ayatblpinzaztdzhilw6yqsi6m 180 15 encryptions encryption NNS work_ayatblpinzaztdzhilw6yqsi6m 180 16 do do VBP work_ayatblpinzaztdzhilw6yqsi6m 180 17 have have VB work_ayatblpinzaztdzhilw6yqsi6m 180 18 an an DT work_ayatblpinzaztdzhilw6yqsi6m 180 19 impact impact NN work_ayatblpinzaztdzhilw6yqsi6m 180 20 on on IN work_ayatblpinzaztdzhilw6yqsi6m 180 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 180 22 instruction instruction NN work_ayatblpinzaztdzhilw6yqsi6m 180 23 and and CC work_ayatblpinzaztdzhilw6yqsi6m 180 24 branching branch VBG work_ayatblpinzaztdzhilw6yqsi6m 180 25 events event NNS work_ayatblpinzaztdzhilw6yqsi6m 180 26 as as IN work_ayatblpinzaztdzhilw6yqsi6m 180 27 explained explain VBN work_ayatblpinzaztdzhilw6yqsi6m 180 28 in in IN work_ayatblpinzaztdzhilw6yqsi6m 180 29 Alam Alam NNP work_ayatblpinzaztdzhilw6yqsi6m 180 30 et et FW work_ayatblpinzaztdzhilw6yqsi6m 180 31 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 180 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 181 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 181 2 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 181 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 181 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 182 1 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 182 2 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 182 3 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 182 4 harnessed harness VBN work_ayatblpinzaztdzhilw6yqsi6m 182 5 by by IN work_ayatblpinzaztdzhilw6yqsi6m 182 6 many many JJ work_ayatblpinzaztdzhilw6yqsi6m 182 7 application application NN work_ayatblpinzaztdzhilw6yqsi6m 182 8 developers developer NNS work_ayatblpinzaztdzhilw6yqsi6m 182 9 to to TO work_ayatblpinzaztdzhilw6yqsi6m 182 10 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 182 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 182 12 computation computation NN work_ayatblpinzaztdzhilw6yqsi6m 182 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 182 14 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 182 15 bottlenecks bottleneck NNS work_ayatblpinzaztdzhilw6yqsi6m 182 16 to to TO work_ayatblpinzaztdzhilw6yqsi6m 182 17 improve improve VB work_ayatblpinzaztdzhilw6yqsi6m 182 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 182 19 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 182 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 182 21 reliability reliability NN work_ayatblpinzaztdzhilw6yqsi6m 182 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 182 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 182 24 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 182 25 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 182 26 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 182 27 Chiappetta Chiappetta NNP work_ayatblpinzaztdzhilw6yqsi6m 182 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 182 29 Savas Savas NNP work_ayatblpinzaztdzhilw6yqsi6m 182 30 & & CC work_ayatblpinzaztdzhilw6yqsi6m 182 31 Yilmaz Yilmaz NNP work_ayatblpinzaztdzhilw6yqsi6m 182 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 182 33 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 182 34 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 182 35 . . . work_ayatblpinzaztdzhilw6yqsi6m 183 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 183 2 this this DT work_ayatblpinzaztdzhilw6yqsi6m 183 3 study study NN work_ayatblpinzaztdzhilw6yqsi6m 183 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 183 5 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 183 6 utilize utilize VBP work_ayatblpinzaztdzhilw6yqsi6m 183 7 11 11 CD work_ayatblpinzaztdzhilw6yqsi6m 183 8 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 183 9 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 183 10 for for IN work_ayatblpinzaztdzhilw6yqsi6m 183 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 183 12 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 183 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 183 14 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 183 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 184 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 184 2 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 184 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 184 4 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 184 5 train train VBP work_ayatblpinzaztdzhilw6yqsi6m 184 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 184 7 employed employed JJ work_ayatblpinzaztdzhilw6yqsi6m 184 8 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 184 9 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 184 10 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 184 11 to to TO work_ayatblpinzaztdzhilw6yqsi6m 184 12 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 184 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 184 14 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 184 15 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 184 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 184 17 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 184 18 and and CC work_ayatblpinzaztdzhilw6yqsi6m 184 19 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 184 20 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 184 21 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 184 22 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 184 23 programs program NNS work_ayatblpinzaztdzhilw6yqsi6m 184 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 185 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 185 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 185 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 185 4 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 185 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 185 6 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 185 7 from from IN work_ayatblpinzaztdzhilw6yqsi6m 185 8 Traditional Traditional NNP work_ayatblpinzaztdzhilw6yqsi6m 185 9 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 185 10 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 185 11 essential essential JJ work_ayatblpinzaztdzhilw6yqsi6m 185 12 due due IN work_ayatblpinzaztdzhilw6yqsi6m 185 13 to to IN work_ayatblpinzaztdzhilw6yqsi6m 185 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 185 15 intensity intensity NN work_ayatblpinzaztdzhilw6yqsi6m 185 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 185 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 185 18 damage damage NN work_ayatblpinzaztdzhilw6yqsi6m 185 19 caused cause VBN work_ayatblpinzaztdzhilw6yqsi6m 185 20 in in IN work_ayatblpinzaztdzhilw6yqsi6m 185 21 terms term NNS work_ayatblpinzaztdzhilw6yqsi6m 185 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 185 23 financial financial JJ work_ayatblpinzaztdzhilw6yqsi6m 185 24 loss loss NN work_ayatblpinzaztdzhilw6yqsi6m 185 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 186 1 Unlike unlike IN work_ayatblpinzaztdzhilw6yqsi6m 186 2 traditional traditional JJ work_ayatblpinzaztdzhilw6yqsi6m 186 3 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 186 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 186 5 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 186 6 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 186 7 more more RBR work_ayatblpinzaztdzhilw6yqsi6m 186 8 troublesome troublesome JJ work_ayatblpinzaztdzhilw6yqsi6m 186 9 to to TO work_ayatblpinzaztdzhilw6yqsi6m 186 10 identify identify VB work_ayatblpinzaztdzhilw6yqsi6m 186 11 and and CC work_ayatblpinzaztdzhilw6yqsi6m 186 12 kill kill VB work_ayatblpinzaztdzhilw6yqsi6m 186 13 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 186 14 even even RB work_ayatblpinzaztdzhilw6yqsi6m 186 15 when when WRB work_ayatblpinzaztdzhilw6yqsi6m 186 16 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 186 17 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 186 18 discovered discover VBN work_ayatblpinzaztdzhilw6yqsi6m 186 19 , , , work_ayatblpinzaztdzhilw6yqsi6m 186 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 186 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 186 22 damage damage NN work_ayatblpinzaztdzhilw6yqsi6m 186 23 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 186 24 irreparable irreparable JJ work_ayatblpinzaztdzhilw6yqsi6m 186 25 even even RB work_ayatblpinzaztdzhilw6yqsi6m 186 26 after after IN work_ayatblpinzaztdzhilw6yqsi6m 186 27 its -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 186 28 removal removal NN work_ayatblpinzaztdzhilw6yqsi6m 186 29 Al Al NNP work_ayatblpinzaztdzhilw6yqsi6m 186 30 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 186 31 rimy rimy NNP work_ayatblpinzaztdzhilw6yqsi6m 186 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 186 33 Maarof Maarof NNP work_ayatblpinzaztdzhilw6yqsi6m 186 34 & & CC work_ayatblpinzaztdzhilw6yqsi6m 186 35 Shaid Shaid NNP work_ayatblpinzaztdzhilw6yqsi6m 186 36 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 186 37 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 186 38 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 186 39 and and CC work_ayatblpinzaztdzhilw6yqsi6m 186 40 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 186 41 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 186 42 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 186 43 . . . work_ayatblpinzaztdzhilw6yqsi6m 187 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 187 2 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 187 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 187 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 188 1 Hence hence RB work_ayatblpinzaztdzhilw6yqsi6m 188 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 188 3 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 188 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 188 5 very very RB work_ayatblpinzaztdzhilw6yqsi6m 188 6 important important JJ work_ayatblpinzaztdzhilw6yqsi6m 188 7 to to TO work_ayatblpinzaztdzhilw6yqsi6m 188 8 recognize recognize VB work_ayatblpinzaztdzhilw6yqsi6m 188 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 188 10 isolate isolate VB work_ayatblpinzaztdzhilw6yqsi6m 188 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 188 12 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 188 13 from from IN work_ayatblpinzaztdzhilw6yqsi6m 188 14 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 188 15 due due IN work_ayatblpinzaztdzhilw6yqsi6m 188 16 to to IN work_ayatblpinzaztdzhilw6yqsi6m 188 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 188 18 similarity similarity NN work_ayatblpinzaztdzhilw6yqsi6m 188 19 in in IN work_ayatblpinzaztdzhilw6yqsi6m 188 20 nature nature NN work_ayatblpinzaztdzhilw6yqsi6m 188 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 189 1 Therefore therefore RB work_ayatblpinzaztdzhilw6yqsi6m 189 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 189 3 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 189 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 189 5 required require VBN work_ayatblpinzaztdzhilw6yqsi6m 189 6 to to TO work_ayatblpinzaztdzhilw6yqsi6m 189 7 devise devise VB work_ayatblpinzaztdzhilw6yqsi6m 189 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 189 9 formal formal JJ work_ayatblpinzaztdzhilw6yqsi6m 189 10 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 189 11 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 189 12 to to TO work_ayatblpinzaztdzhilw6yqsi6m 189 13 discriminate discriminate VB work_ayatblpinzaztdzhilw6yqsi6m 189 14 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 189 15 from from IN work_ayatblpinzaztdzhilw6yqsi6m 189 16 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 189 17 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 189 18 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 189 19 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 189 20 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 189 21 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 189 22 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 189 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 190 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 190 2 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 190 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 190 4 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 190 5 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 190 6 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 190 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 191 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 191 2 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 191 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 191 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 191 5 Kok Kok NNP work_ayatblpinzaztdzhilw6yqsi6m 191 6 et et FW work_ayatblpinzaztdzhilw6yqsi6m 191 7 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 191 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 192 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 192 2 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 192 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 192 4 to to TO work_ayatblpinzaztdzhilw6yqsi6m 192 5 avoid avoid VB work_ayatblpinzaztdzhilw6yqsi6m 192 6 billions billion NNS work_ayatblpinzaztdzhilw6yqsi6m 192 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 192 8 transactions transaction NNS work_ayatblpinzaztdzhilw6yqsi6m 192 9 in in IN work_ayatblpinzaztdzhilw6yqsi6m 192 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 192 11 name name NN work_ayatblpinzaztdzhilw6yqsi6m 192 12 of of IN work_ayatblpinzaztdzhilw6yqsi6m 192 13 ransom ransom NN work_ayatblpinzaztdzhilw6yqsi6m 192 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 193 1 Dataset Dataset VBD work_ayatblpinzaztdzhilw6yqsi6m 193 2 collection collection NN work_ayatblpinzaztdzhilw6yqsi6m 193 3 For for IN work_ayatblpinzaztdzhilw6yqsi6m 193 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 193 5 experimentation experimentation NN work_ayatblpinzaztdzhilw6yqsi6m 193 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 193 7 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 193 8 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 193 9 obtained obtain VBN work_ayatblpinzaztdzhilw6yqsi6m 193 10 randomly randomly RB work_ayatblpinzaztdzhilw6yqsi6m 193 11 selected select VBN work_ayatblpinzaztdzhilw6yqsi6m 193 12 160 160 CD work_ayatblpinzaztdzhilw6yqsi6m 193 13 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 193 14 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 193 15 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 193 16 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 193 17 from from IN work_ayatblpinzaztdzhilw6yqsi6m 193 18 VirusShare VirusShare NNP work_ayatblpinzaztdzhilw6yqsi6m 193 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 194 1 VirusShare VirusShare NNP work_ayatblpinzaztdzhilw6yqsi6m 194 2 repository repository NN work_ayatblpinzaztdzhilw6yqsi6m 194 3 provides provide VBZ work_ayatblpinzaztdzhilw6yqsi6m 194 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 194 5 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 194 6 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 194 7 to to IN work_ayatblpinzaztdzhilw6yqsi6m 194 8 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 194 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 194 10 many many JJ work_ayatblpinzaztdzhilw6yqsi6m 194 11 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 194 12 types type NNS work_ayatblpinzaztdzhilw6yqsi6m 194 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 194 14 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 194 15 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 194 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 194 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 194 18 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 194 19 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 194 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 194 21 in in IN work_ayatblpinzaztdzhilw6yqsi6m 194 22 addition addition NN work_ayatblpinzaztdzhilw6yqsi6m 194 23 to to IN work_ayatblpinzaztdzhilw6yqsi6m 194 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 194 25 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 194 26 platforms platform NNS work_ayatblpinzaztdzhilw6yqsi6m 194 27 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 194 28 as as IN work_ayatblpinzaztdzhilw6yqsi6m 194 29 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 194 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 194 31 Linux Linux NNP work_ayatblpinzaztdzhilw6yqsi6m 194 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 194 33 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 194 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 194 35 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 194 36 . . . work_ayatblpinzaztdzhilw6yqsi6m 195 1 It -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 195 2 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 195 3 frequently frequently RB work_ayatblpinzaztdzhilw6yqsi6m 195 4 updated update VBN work_ayatblpinzaztdzhilw6yqsi6m 195 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 195 6 at at IN work_ayatblpinzaztdzhilw6yqsi6m 195 7 presently presently RB work_ayatblpinzaztdzhilw6yqsi6m 195 8 contains contain VBZ work_ayatblpinzaztdzhilw6yqsi6m 195 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 195 10 latest late JJS work_ayatblpinzaztdzhilw6yqsi6m 195 11 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 195 12 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 195 13 contributed contribute VBN work_ayatblpinzaztdzhilw6yqsi6m 195 14 by by IN work_ayatblpinzaztdzhilw6yqsi6m 195 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 195 16 community community NN work_ayatblpinzaztdzhilw6yqsi6m 195 17 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 195 18 Kouliaridis Kouliaridis NNP work_ayatblpinzaztdzhilw6yqsi6m 195 19 & & CC work_ayatblpinzaztdzhilw6yqsi6m 195 20 Kambourakis Kambourakis NNP work_ayatblpinzaztdzhilw6yqsi6m 195 21 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 195 22 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 195 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 196 1 Due due IN work_ayatblpinzaztdzhilw6yqsi6m 196 2 to to IN work_ayatblpinzaztdzhilw6yqsi6m 196 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 196 4 diversity diversity NN work_ayatblpinzaztdzhilw6yqsi6m 196 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 196 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 196 7 VirusShare VirusShare NNP work_ayatblpinzaztdzhilw6yqsi6m 196 8 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 196 9 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 196 10 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 196 11 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 196 12 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 196 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 197 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 197 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 197 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 197 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 197 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 197 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 197 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 198 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 198 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 198 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 198 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 198 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 198 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 198 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 198 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 198 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 198 10 10/24 10/24 CD work_ayatblpinzaztdzhilw6yqsi6m 198 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 UH work_ayatblpinzaztdzhilw6yqsi6m 198 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CC work_ayatblpinzaztdzhilw6yqsi6m 198 13 very very RB work_ayatblpinzaztdzhilw6yqsi6m 198 14 popular popular JJ work_ayatblpinzaztdzhilw6yqsi6m 198 15 in in IN work_ayatblpinzaztdzhilw6yqsi6m 198 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 198 17 research research NN work_ayatblpinzaztdzhilw6yqsi6m 198 18 community community NN work_ayatblpinzaztdzhilw6yqsi6m 198 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 199 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 199 2 collected collect VBD work_ayatblpinzaztdzhilw6yqsi6m 199 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 199 4 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 199 5 from from IN work_ayatblpinzaztdzhilw6yqsi6m 199 6 VirusShare VirusShare NNP work_ayatblpinzaztdzhilw6yqsi6m 199 7 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 199 8 to to IN work_ayatblpinzaztdzhilw6yqsi6m 199 9 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 199 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 199 11 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 199 12 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 199 13 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 199 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 200 1 After after IN work_ayatblpinzaztdzhilw6yqsi6m 200 2 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 200 3 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 200 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 200 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 200 6 downloaded downloaded JJ work_ayatblpinzaztdzhilw6yqsi6m 200 7 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 200 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 200 9 obfuscated obfuscate VBN work_ayatblpinzaztdzhilw6yqsi6m 200 10 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 200 11 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 200 12 eliminated eliminate VBN work_ayatblpinzaztdzhilw6yqsi6m 200 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 201 1 Afterward afterward RB work_ayatblpinzaztdzhilw6yqsi6m 201 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 201 3 each each DT work_ayatblpinzaztdzhilw6yqsi6m 201 4 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 201 5 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 201 6 labeled label VBN work_ayatblpinzaztdzhilw6yqsi6m 201 7 as as IN work_ayatblpinzaztdzhilw6yqsi6m 201 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 201 9 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 201 10 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 201 11 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 201 12 or or CC work_ayatblpinzaztdzhilw6yqsi6m 201 13 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 201 14 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 201 15 on on IN work_ayatblpinzaztdzhilw6yqsi6m 201 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 201 17 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 201 18 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 201 19 provided provide VBN work_ayatblpinzaztdzhilw6yqsi6m 201 20 by by IN work_ayatblpinzaztdzhilw6yqsi6m 201 21 many many JJ work_ayatblpinzaztdzhilw6yqsi6m 201 22 renowned renowned JJ work_ayatblpinzaztdzhilw6yqsi6m 201 23 anti anti NNS work_ayatblpinzaztdzhilw6yqsi6m 201 24 - - NNS work_ayatblpinzaztdzhilw6yqsi6m 201 25 viruses virus NNS work_ayatblpinzaztdzhilw6yqsi6m 201 26 available available JJ work_ayatblpinzaztdzhilw6yqsi6m 201 27 via via IN work_ayatblpinzaztdzhilw6yqsi6m 201 28 VirusShare VirusShare NNP work_ayatblpinzaztdzhilw6yqsi6m 201 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 202 1 These these DT work_ayatblpinzaztdzhilw6yqsi6m 202 2 labels label NNS work_ayatblpinzaztdzhilw6yqsi6m 202 3 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 202 4 further further RB work_ayatblpinzaztdzhilw6yqsi6m 202 5 validated validate VBN work_ayatblpinzaztdzhilw6yqsi6m 202 6 with with IN work_ayatblpinzaztdzhilw6yqsi6m 202 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 202 8 tags tag NNS work_ayatblpinzaztdzhilw6yqsi6m 202 9 available available JJ work_ayatblpinzaztdzhilw6yqsi6m 202 10 from from IN work_ayatblpinzaztdzhilw6yqsi6m 202 11 VirusShare VirusShare NNP work_ayatblpinzaztdzhilw6yqsi6m 202 12 for for IN work_ayatblpinzaztdzhilw6yqsi6m 202 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 202 14 sake sake NN work_ayatblpinzaztdzhilw6yqsi6m 202 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 202 16 confirmation confirmation NN work_ayatblpinzaztdzhilw6yqsi6m 202 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 203 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 203 2 this this DT work_ayatblpinzaztdzhilw6yqsi6m 203 3 study study NN work_ayatblpinzaztdzhilw6yqsi6m 203 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 203 5 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 203 6 binary binary JJ work_ayatblpinzaztdzhilw6yqsi6m 203 7 files file NNS work_ayatblpinzaztdzhilw6yqsi6m 203 8 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 203 9 not not RB work_ayatblpinzaztdzhilw6yqsi6m 203 10 considered consider VBN work_ayatblpinzaztdzhilw6yqsi6m 203 11 because because IN work_ayatblpinzaztdzhilw6yqsi6m 203 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 203 13 main main JJ work_ayatblpinzaztdzhilw6yqsi6m 203 14 aim aim NN work_ayatblpinzaztdzhilw6yqsi6m 203 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 203 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 203 17 study study NN work_ayatblpinzaztdzhilw6yqsi6m 203 18 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 203 19 to to TO work_ayatblpinzaztdzhilw6yqsi6m 203 20 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 203 21 between between IN work_ayatblpinzaztdzhilw6yqsi6m 203 22 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 203 23 and and CC work_ayatblpinzaztdzhilw6yqsi6m 203 24 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 203 25 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 203 26 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 203 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 204 1 Therefore therefore RB work_ayatblpinzaztdzhilw6yqsi6m 204 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 204 3 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 204 4 consider consider VBP work_ayatblpinzaztdzhilw6yqsi6m 204 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 204 6 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 204 7 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 204 8 category category NN work_ayatblpinzaztdzhilw6yqsi6m 204 9 Trojan Trojan NNP work_ayatblpinzaztdzhilw6yqsi6m 204 10 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 204 11 as as IN work_ayatblpinzaztdzhilw6yqsi6m 204 12 a a DT work_ayatblpinzaztdzhilw6yqsi6m 204 13 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 204 14 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 204 15 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 204 16 sample sample NN work_ayatblpinzaztdzhilw6yqsi6m 204 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 204 18 due due IN work_ayatblpinzaztdzhilw6yqsi6m 204 19 to to IN work_ayatblpinzaztdzhilw6yqsi6m 204 20 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 204 21 similarity similarity NN work_ayatblpinzaztdzhilw6yqsi6m 204 22 in in IN work_ayatblpinzaztdzhilw6yqsi6m 204 23 activities activity NNS work_ayatblpinzaztdzhilw6yqsi6m 204 24 with with IN work_ayatblpinzaztdzhilw6yqsi6m 204 25 the the DT work_ayatblpinzaztdzhilw6yqsi6m 204 26 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 204 27 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 204 28 Gazet Gazet NNP work_ayatblpinzaztdzhilw6yqsi6m 204 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 204 30 2010 2010 CD work_ayatblpinzaztdzhilw6yqsi6m 204 31 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 204 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 205 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 205 2 employed employed JJ work_ayatblpinzaztdzhilw6yqsi6m 205 3 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 205 4 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 205 5 trained train VBN work_ayatblpinzaztdzhilw6yqsi6m 205 6 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 205 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 205 8 behavioral behavioral JJ work_ayatblpinzaztdzhilw6yqsi6m 205 9 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 205 10 for for IN work_ayatblpinzaztdzhilw6yqsi6m 205 11 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 205 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 205 13 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 205 14 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 205 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 205 16 with with IN work_ayatblpinzaztdzhilw6yqsi6m 205 17 explicit explicit JJ work_ayatblpinzaztdzhilw6yqsi6m 205 18 labeling labeling NN work_ayatblpinzaztdzhilw6yqsi6m 205 19 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 205 20 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 205 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 205 22 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 205 23 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 205 24 Non Non NNP work_ayatblpinzaztdzhilw6yqsi6m 205 25 - - NNP work_ayatblpinzaztdzhilw6yqsi6m 205 26 Ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 205 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 205 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 206 1 Furthermore furthermore RB work_ayatblpinzaztdzhilw6yqsi6m 206 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 206 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 206 4 disjoint disjoint NN work_ayatblpinzaztdzhilw6yqsi6m 206 5 data data NN work_ayatblpinzaztdzhilw6yqsi6m 206 6 set set NN work_ayatblpinzaztdzhilw6yqsi6m 206 7 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 206 8 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 206 9 for for IN work_ayatblpinzaztdzhilw6yqsi6m 206 10 training training NN work_ayatblpinzaztdzhilw6yqsi6m 206 11 and and CC work_ayatblpinzaztdzhilw6yqsi6m 206 12 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 206 13 purposes purpose NNS work_ayatblpinzaztdzhilw6yqsi6m 206 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 207 1 Feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 207 2 extraction extraction NN work_ayatblpinzaztdzhilw6yqsi6m 207 3 All all DT work_ayatblpinzaztdzhilw6yqsi6m 207 4 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 207 5 in in IN work_ayatblpinzaztdzhilw6yqsi6m 207 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 207 7 data data NN work_ayatblpinzaztdzhilw6yqsi6m 207 8 set set NN work_ayatblpinzaztdzhilw6yqsi6m 207 9 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 207 10 executed execute VBN work_ayatblpinzaztdzhilw6yqsi6m 207 11 in in IN work_ayatblpinzaztdzhilw6yqsi6m 207 12 a a DT work_ayatblpinzaztdzhilw6yqsi6m 207 13 quarantine quarantine NN work_ayatblpinzaztdzhilw6yqsi6m 207 14 environment environment NN work_ayatblpinzaztdzhilw6yqsi6m 207 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 207 16 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 207 17 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 207 18 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 207 19 to to IN work_ayatblpinzaztdzhilw6yqsi6m 207 20 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 207 21 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 207 22 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 207 23 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 207 24 collected collect VBN work_ayatblpinzaztdzhilw6yqsi6m 207 25 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 207 26 perf perf NN work_ayatblpinzaztdzhilw6yqsi6m 207 27 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 207 28 an an DT work_ayatblpinzaztdzhilw6yqsi6m 207 29 instrumentation instrumentation NN work_ayatblpinzaztdzhilw6yqsi6m 207 30 and and CC work_ayatblpinzaztdzhilw6yqsi6m 207 31 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 207 32 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 207 33 tool tool NN work_ayatblpinzaztdzhilw6yqsi6m 207 34 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 207 35 De De NNP work_ayatblpinzaztdzhilw6yqsi6m 207 36 Melo Melo NNP work_ayatblpinzaztdzhilw6yqsi6m 207 37 , , , work_ayatblpinzaztdzhilw6yqsi6m 207 38 2010 2010 CD work_ayatblpinzaztdzhilw6yqsi6m 207 39 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 207 40 Weaver Weaver NNP work_ayatblpinzaztdzhilw6yqsi6m 207 41 , , , work_ayatblpinzaztdzhilw6yqsi6m 207 42 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 207 43 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 207 44 Alam Alam NNP work_ayatblpinzaztdzhilw6yqsi6m 207 45 et et FW work_ayatblpinzaztdzhilw6yqsi6m 207 46 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 207 47 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 207 48 , , , work_ayatblpinzaztdzhilw6yqsi6m 207 49 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 207 50 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 207 51 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 207 52 . . . work_ayatblpinzaztdzhilw6yqsi6m 208 1 To to TO work_ayatblpinzaztdzhilw6yqsi6m 208 2 ensure ensure VB work_ayatblpinzaztdzhilw6yqsi6m 208 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 208 4 reliability reliability NN work_ayatblpinzaztdzhilw6yqsi6m 208 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 208 6 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 208 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 208 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 208 9 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 208 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 208 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 208 12 mean mean JJ work_ayatblpinzaztdzhilw6yqsi6m 208 13 values value NNS work_ayatblpinzaztdzhilw6yqsi6m 208 14 of of IN work_ayatblpinzaztdzhilw6yqsi6m 208 15 three three CD work_ayatblpinzaztdzhilw6yqsi6m 208 16 rounds round NNS work_ayatblpinzaztdzhilw6yqsi6m 208 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 208 18 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 208 19 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 208 20 reported report VBN work_ayatblpinzaztdzhilw6yqsi6m 208 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 209 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 209 2 executed execute VBD work_ayatblpinzaztdzhilw6yqsi6m 209 3 each each DT work_ayatblpinzaztdzhilw6yqsi6m 209 4 application application NN work_ayatblpinzaztdzhilw6yqsi6m 209 5 three three CD work_ayatblpinzaztdzhilw6yqsi6m 209 6 times time NNS work_ayatblpinzaztdzhilw6yqsi6m 209 7 in in IN work_ayatblpinzaztdzhilw6yqsi6m 209 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 209 9 virtual virtual JJ work_ayatblpinzaztdzhilw6yqsi6m 209 10 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 209 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 209 12 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 209 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 209 14 VMWorkstation vmworkstation NN work_ayatblpinzaztdzhilw6yqsi6m 209 15 12 12 CD work_ayatblpinzaztdzhilw6yqsi6m 209 16 Pro Pro NNP work_ayatblpinzaztdzhilw6yqsi6m 209 17 12.1.1 12.1.1 NNP work_ayatblpinzaztdzhilw6yqsi6m 209 18 build build NN work_ayatblpinzaztdzhilw6yqsi6m 209 19 3770994 3770994 CD work_ayatblpinzaztdzhilw6yqsi6m 209 20 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 209 21 for for IN work_ayatblpinzaztdzhilw6yqsi6m 209 22 no no RB work_ayatblpinzaztdzhilw6yqsi6m 209 23 longer long JJR work_ayatblpinzaztdzhilw6yqsi6m 209 24 than than IN work_ayatblpinzaztdzhilw6yqsi6m 209 25 240 240 CD work_ayatblpinzaztdzhilw6yqsi6m 209 26 s s NNPS work_ayatblpinzaztdzhilw6yqsi6m 209 27 with with IN work_ayatblpinzaztdzhilw6yqsi6m 209 28 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 209 29 input input NN work_ayatblpinzaztdzhilw6yqsi6m 209 30 parameters parameter NNS work_ayatblpinzaztdzhilw6yqsi6m 209 31 to to TO work_ayatblpinzaztdzhilw6yqsi6m 209 32 emulate emulate VB work_ayatblpinzaztdzhilw6yqsi6m 209 33 a a DT work_ayatblpinzaztdzhilw6yqsi6m 209 34 real real JJ work_ayatblpinzaztdzhilw6yqsi6m 209 35 interactive interactive JJ work_ayatblpinzaztdzhilw6yqsi6m 209 36 environment environment NN work_ayatblpinzaztdzhilw6yqsi6m 209 37 . . . work_ayatblpinzaztdzhilw6yqsi6m 210 1 After after IN work_ayatblpinzaztdzhilw6yqsi6m 210 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 210 3 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 210 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 210 5 each each DT work_ayatblpinzaztdzhilw6yqsi6m 210 6 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 210 7 application application NN work_ayatblpinzaztdzhilw6yqsi6m 210 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 210 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 210 10 virtual virtual JJ work_ayatblpinzaztdzhilw6yqsi6m 210 11 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 210 12 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 210 13 reset reset JJ work_ayatblpinzaztdzhilw6yqsi6m 210 14 to to IN work_ayatblpinzaztdzhilw6yqsi6m 210 15 its -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 210 16 original original JJ work_ayatblpinzaztdzhilw6yqsi6m 210 17 state state NN work_ayatblpinzaztdzhilw6yqsi6m 210 18 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 210 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 210 20 snapshot snapshot NN work_ayatblpinzaztdzhilw6yqsi6m 210 21 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 210 22 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 210 23 to to TO work_ayatblpinzaztdzhilw6yqsi6m 210 24 ensure ensure VB work_ayatblpinzaztdzhilw6yqsi6m 210 25 the the DT work_ayatblpinzaztdzhilw6yqsi6m 210 26 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 210 27 counter counter NN work_ayatblpinzaztdzhilw6yqsi6m 210 28 trace trace NN work_ayatblpinzaztdzhilw6yqsi6m 210 29 collected collect VBN work_ayatblpinzaztdzhilw6yqsi6m 210 30 during during IN work_ayatblpinzaztdzhilw6yqsi6m 210 31 the the DT work_ayatblpinzaztdzhilw6yqsi6m 210 32 previous previous JJ work_ayatblpinzaztdzhilw6yqsi6m 210 33 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 210 34 do do VBP work_ayatblpinzaztdzhilw6yqsi6m 210 35 not not RB work_ayatblpinzaztdzhilw6yqsi6m 210 36 intermingle intermingle VB work_ayatblpinzaztdzhilw6yqsi6m 210 37 with with IN work_ayatblpinzaztdzhilw6yqsi6m 210 38 the the DT work_ayatblpinzaztdzhilw6yqsi6m 210 39 current current JJ work_ayatblpinzaztdzhilw6yqsi6m 210 40 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 210 41 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 210 42 . . . work_ayatblpinzaztdzhilw6yqsi6m 211 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 211 2 binary binary JJ work_ayatblpinzaztdzhilw6yqsi6m 211 3 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 211 4 problem problem NN work_ayatblpinzaztdzhilw6yqsi6m 211 5 discussed discuss VBN work_ayatblpinzaztdzhilw6yqsi6m 211 6 above above RB work_ayatblpinzaztdzhilw6yqsi6m 211 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 8 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 211 9 employ employ VBP work_ayatblpinzaztdzhilw6yqsi6m 211 10 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 211 11 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 211 12 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 211 13 as as IN work_ayatblpinzaztdzhilw6yqsi6m 211 14 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 211 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 16 that that RB work_ayatblpinzaztdzhilw6yqsi6m 211 17 is is RB work_ayatblpinzaztdzhilw6yqsi6m 211 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 19 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 20 1 1 LS work_ayatblpinzaztdzhilw6yqsi6m 211 21 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 22 task task NN work_ayatblpinzaztdzhilw6yqsi6m 211 23 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 211 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 25 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 26 2 2 LS work_ayatblpinzaztdzhilw6yqsi6m 211 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 28 context context NN work_ayatblpinzaztdzhilw6yqsi6m 211 29 switching switching NN work_ayatblpinzaztdzhilw6yqsi6m 211 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 31 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 32 3 3 LS work_ayatblpinzaztdzhilw6yqsi6m 211 33 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 34 CPU cpu VB work_ayatblpinzaztdzhilw6yqsi6m 211 35 utilized utilize VBN work_ayatblpinzaztdzhilw6yqsi6m 211 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 37 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 38 4 4 LS work_ayatblpinzaztdzhilw6yqsi6m 211 39 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 40 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 211 41 migrations migration NNS work_ayatblpinzaztdzhilw6yqsi6m 211 42 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 43 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 44 5 5 LS work_ayatblpinzaztdzhilw6yqsi6m 211 45 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 46 page page NN work_ayatblpinzaztdzhilw6yqsi6m 211 47 faults fault NNS work_ayatblpinzaztdzhilw6yqsi6m 211 48 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 49 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 50 6 6 LS work_ayatblpinzaztdzhilw6yqsi6m 211 51 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 52 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 211 53 cycles cycle NNS work_ayatblpinzaztdzhilw6yqsi6m 211 54 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 55 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 56 7 7 LS work_ayatblpinzaztdzhilw6yqsi6m 211 57 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 58 cache cache NN work_ayatblpinzaztdzhilw6yqsi6m 211 59 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 211 60 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 211 61 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 62 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 63 8) 8) CD work_ayatblpinzaztdzhilw6yqsi6m 211 64 instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 211 65 retired retire VBN work_ayatblpinzaztdzhilw6yqsi6m 211 66 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 67 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 68 9 9 LS work_ayatblpinzaztdzhilw6yqsi6m 211 69 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 70 branches branch NNS work_ayatblpinzaztdzhilw6yqsi6m 211 71 taken take VBN work_ayatblpinzaztdzhilw6yqsi6m 211 72 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 73 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 74 10 10 LS work_ayatblpinzaztdzhilw6yqsi6m 211 75 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 76 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 211 77 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 211 78 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 211 79 and and CC work_ayatblpinzaztdzhilw6yqsi6m 211 80 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 81 11 11 CD work_ayatblpinzaztdzhilw6yqsi6m 211 82 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 83 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 211 84 time time NN work_ayatblpinzaztdzhilw6yqsi6m 211 85 , , , work_ayatblpinzaztdzhilw6yqsi6m 211 86 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 211 87 illustrated illustrate VBN work_ayatblpinzaztdzhilw6yqsi6m 211 88 in in IN work_ayatblpinzaztdzhilw6yqsi6m 211 89 Table Table NNP work_ayatblpinzaztdzhilw6yqsi6m 211 90 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 211 91 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 211 92 to to TO work_ayatblpinzaztdzhilw6yqsi6m 211 93 train train VB work_ayatblpinzaztdzhilw6yqsi6m 211 94 the the DT work_ayatblpinzaztdzhilw6yqsi6m 211 95 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 211 96 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 211 97 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 211 98 . . . work_ayatblpinzaztdzhilw6yqsi6m 212 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 212 2 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 212 3 executed execute VBN work_ayatblpinzaztdzhilw6yqsi6m 212 4 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 212 5 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 212 6 on on IN work_ayatblpinzaztdzhilw6yqsi6m 212 7 a a DT work_ayatblpinzaztdzhilw6yqsi6m 212 8 PC pc NN work_ayatblpinzaztdzhilw6yqsi6m 212 9 within within IN work_ayatblpinzaztdzhilw6yqsi6m 212 10 a a DT work_ayatblpinzaztdzhilw6yqsi6m 212 11 virtual virtual JJ work_ayatblpinzaztdzhilw6yqsi6m 212 12 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 212 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 212 14 recorded record VBD work_ayatblpinzaztdzhilw6yqsi6m 212 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 212 16 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 212 17 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 212 18 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 212 19 , , , work_ayatblpinzaztdzhilw6yqsi6m 212 20 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 212 21 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 212 22 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 212 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 212 24 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 212 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 212 26 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 213 1 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 213 2 perf perf NNP work_ayatblpinzaztdzhilw6yqsi6m 213 3 . . . work_ayatblpinzaztdzhilw6yqsi6m 214 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 214 2 perf perf JJ work_ayatblpinzaztdzhilw6yqsi6m 214 3 library library NN work_ayatblpinzaztdzhilw6yqsi6m 214 4 provides provide VBZ work_ayatblpinzaztdzhilw6yqsi6m 214 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 214 6 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 214 7 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 214 8 counters counter VBZ work_ayatblpinzaztdzhilw6yqsi6m 214 9 related related JJ work_ayatblpinzaztdzhilw6yqsi6m 214 10 values value NNS work_ayatblpinzaztdzhilw6yqsi6m 214 11 representing represent VBG work_ayatblpinzaztdzhilw6yqsi6m 214 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 214 13 involvement involvement NN work_ayatblpinzaztdzhilw6yqsi6m 214 14 of of IN work_ayatblpinzaztdzhilw6yqsi6m 214 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 214 16 several several JJ work_ayatblpinzaztdzhilw6yqsi6m 214 17 important important JJ work_ayatblpinzaztdzhilw6yqsi6m 214 18 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 214 19 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 214 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 214 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 214 22 processor processor NN work_ayatblpinzaztdzhilw6yqsi6m 214 23 during during IN work_ayatblpinzaztdzhilw6yqsi6m 214 24 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 214 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 215 1 Feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 215 2 selection selection NN work_ayatblpinzaztdzhilw6yqsi6m 215 3 plays play VBZ work_ayatblpinzaztdzhilw6yqsi6m 215 4 a a DT work_ayatblpinzaztdzhilw6yqsi6m 215 5 significant significant JJ work_ayatblpinzaztdzhilw6yqsi6m 215 6 role role NN work_ayatblpinzaztdzhilw6yqsi6m 215 7 in in IN work_ayatblpinzaztdzhilw6yqsi6m 215 8 achieving achieve VBG work_ayatblpinzaztdzhilw6yqsi6m 215 9 precise precise JJ work_ayatblpinzaztdzhilw6yqsi6m 215 10 training training NN work_ayatblpinzaztdzhilw6yqsi6m 215 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 215 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 215 13 employed employed JJ work_ayatblpinzaztdzhilw6yqsi6m 215 14 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 215 15 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 215 16 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 215 17 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 215 18 thereby thereby RB work_ayatblpinzaztdzhilw6yqsi6m 215 19 attaining attain VBG work_ayatblpinzaztdzhilw6yqsi6m 215 20 accurate accurate JJ work_ayatblpinzaztdzhilw6yqsi6m 215 21 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 215 22 with with IN work_ayatblpinzaztdzhilw6yqsi6m 215 23 efficient efficient JJ work_ayatblpinzaztdzhilw6yqsi6m 215 24 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 215 25 and and CC work_ayatblpinzaztdzhilw6yqsi6m 215 26 low low NN work_ayatblpinzaztdzhilw6yqsi6m 215 27 overhead overhead NN work_ayatblpinzaztdzhilw6yqsi6m 215 28 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 215 29 Li Li NNP work_ayatblpinzaztdzhilw6yqsi6m 215 30 et et FW work_ayatblpinzaztdzhilw6yqsi6m 215 31 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 215 32 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 215 33 , , , work_ayatblpinzaztdzhilw6yqsi6m 215 34 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 215 35 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 215 36 . . . work_ayatblpinzaztdzhilw6yqsi6m 216 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 216 2 correlation correlation NN work_ayatblpinzaztdzhilw6yqsi6m 216 3 matrix matrix NN work_ayatblpinzaztdzhilw6yqsi6m 216 4 among among IN work_ayatblpinzaztdzhilw6yqsi6m 216 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 216 6 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 216 7 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 216 8 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 216 9 generated generate VBN work_ayatblpinzaztdzhilw6yqsi6m 216 10 to to TO work_ayatblpinzaztdzhilw6yqsi6m 216 11 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 216 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 216 13 pattern pattern NN work_ayatblpinzaztdzhilw6yqsi6m 216 14 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 216 15 leads lead VBZ work_ayatblpinzaztdzhilw6yqsi6m 216 16 to to IN work_ayatblpinzaztdzhilw6yqsi6m 216 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 216 18 selection selection NN work_ayatblpinzaztdzhilw6yqsi6m 216 19 of of IN work_ayatblpinzaztdzhilw6yqsi6m 216 20 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 216 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 217 1 Two two CD work_ayatblpinzaztdzhilw6yqsi6m 217 2 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 217 3 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 217 4 considered consider VBN work_ayatblpinzaztdzhilw6yqsi6m 217 5 negatively negatively RB work_ayatblpinzaztdzhilw6yqsi6m 217 6 correlated correlate VBN work_ayatblpinzaztdzhilw6yqsi6m 217 7 if if IN work_ayatblpinzaztdzhilw6yqsi6m 217 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 217 9 change change NN work_ayatblpinzaztdzhilw6yqsi6m 217 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 217 11 one one CD work_ayatblpinzaztdzhilw6yqsi6m 217 12 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 217 13 inversely inversely RB work_ayatblpinzaztdzhilw6yqsi6m 217 14 impacts impact VBZ work_ayatblpinzaztdzhilw6yqsi6m 217 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 217 16 value value NN work_ayatblpinzaztdzhilw6yqsi6m 217 17 of of IN work_ayatblpinzaztdzhilw6yqsi6m 217 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 217 19 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 217 20 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 217 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 218 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 218 2 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 218 3 correlation correlation NN work_ayatblpinzaztdzhilw6yqsi6m 218 4 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 218 5 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 218 6 presented present VBN work_ayatblpinzaztdzhilw6yqsi6m 218 7 in in IN work_ayatblpinzaztdzhilw6yqsi6m 218 8 Fig Fig NNP work_ayatblpinzaztdzhilw6yqsi6m 218 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 219 1 2 2 LS work_ayatblpinzaztdzhilw6yqsi6m 219 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 220 1 If if IN work_ayatblpinzaztdzhilw6yqsi6m 220 2 two two CD work_ayatblpinzaztdzhilw6yqsi6m 220 3 numerical numerical JJ work_ayatblpinzaztdzhilw6yqsi6m 220 4 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 220 5 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 220 6 highly highly RB work_ayatblpinzaztdzhilw6yqsi6m 220 7 correlated correlate VBN work_ayatblpinzaztdzhilw6yqsi6m 220 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 220 9 then then RB work_ayatblpinzaztdzhilw6yqsi6m 220 10 one one CD work_ayatblpinzaztdzhilw6yqsi6m 220 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 220 12 them -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 220 13 can can MD work_ayatblpinzaztdzhilw6yqsi6m 220 14 be be VB work_ayatblpinzaztdzhilw6yqsi6m 220 15 ignored ignore VBN work_ayatblpinzaztdzhilw6yqsi6m 220 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 221 1 Therefore therefore RB work_ayatblpinzaztdzhilw6yqsi6m 221 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 221 3 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 221 4 employed employ VBD work_ayatblpinzaztdzhilw6yqsi6m 221 5 a a DT work_ayatblpinzaztdzhilw6yqsi6m 221 6 sub sub NN work_ayatblpinzaztdzhilw6yqsi6m 221 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 221 8 set set NN work_ayatblpinzaztdzhilw6yqsi6m 221 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 221 10 those those DT work_ayatblpinzaztdzhilw6yqsi6m 221 11 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 221 12 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 221 13 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 221 14 not not RB work_ayatblpinzaztdzhilw6yqsi6m 221 15 co co JJ work_ayatblpinzaztdzhilw6yqsi6m 221 16 - - VBN work_ayatblpinzaztdzhilw6yqsi6m 221 17 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 221 18 to to TO work_ayatblpinzaztdzhilw6yqsi6m 221 19 reduce reduce VB work_ayatblpinzaztdzhilw6yqsi6m 221 20 the the DT work_ayatblpinzaztdzhilw6yqsi6m 221 21 computation computation NN work_ayatblpinzaztdzhilw6yqsi6m 221 22 overhead overhead RB work_ayatblpinzaztdzhilw6yqsi6m 221 23 during during IN work_ayatblpinzaztdzhilw6yqsi6m 221 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 221 25 training training NN work_ayatblpinzaztdzhilw6yqsi6m 221 26 process process NN work_ayatblpinzaztdzhilw6yqsi6m 221 27 of of IN work_ayatblpinzaztdzhilw6yqsi6m 221 28 the the DT work_ayatblpinzaztdzhilw6yqsi6m 221 29 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 221 30 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 221 31 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 221 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 222 1 Figure figure NN work_ayatblpinzaztdzhilw6yqsi6m 222 2 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 222 3 shows show VBZ work_ayatblpinzaztdzhilw6yqsi6m 222 4 that that IN work_ayatblpinzaztdzhilw6yqsi6m 222 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 222 6 Cache Cache NNP work_ayatblpinzaztdzhilw6yqsi6m 222 7 Misses Misses NNP work_ayatblpinzaztdzhilw6yqsi6m 222 8 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 222 9 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 222 10 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 222 11 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 222 12 a a DT work_ayatblpinzaztdzhilw6yqsi6m 222 13 low low JJ work_ayatblpinzaztdzhilw6yqsi6m 222 14 positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 222 15 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 222 16 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 222 17 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 222 18 . . . work_ayatblpinzaztdzhilw6yqsi6m 223 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 223 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 223 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 223 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 223 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 223 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 223 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 224 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 224 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 224 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 224 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 224 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 224 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 224 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 224 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 224 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 224 10 11/24 11/24 CD work_ayatblpinzaztdzhilw6yqsi6m 224 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 224 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 224 13 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 224 14 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 224 15 Features Features NNP work_ayatblpinzaztdzhilw6yqsi6m 224 16 set set VBN work_ayatblpinzaztdzhilw6yqsi6m 224 17 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 224 18 in in IN work_ayatblpinzaztdzhilw6yqsi6m 224 19 this this DT work_ayatblpinzaztdzhilw6yqsi6m 224 20 work work NN work_ayatblpinzaztdzhilw6yqsi6m 224 21 for for IN work_ayatblpinzaztdzhilw6yqsi6m 224 22 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 224 23 evaluation evaluation NN work_ayatblpinzaztdzhilw6yqsi6m 224 24 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 224 25 HPCs HPCs NNP work_ayatblpinzaztdzhilw6yqsi6m 224 26 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 224 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 225 1 S.no S.no NNP work_ayatblpinzaztdzhilw6yqsi6m 225 2 Hardware Hardware NNP work_ayatblpinzaztdzhilw6yqsi6m 225 3 features feature VBZ work_ayatblpinzaztdzhilw6yqsi6m 225 4 Description description NN work_ayatblpinzaztdzhilw6yqsi6m 225 5 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 225 6 Task task NN work_ayatblpinzaztdzhilw6yqsi6m 225 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 225 8 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 225 9 The the DT work_ayatblpinzaztdzhilw6yqsi6m 225 10 task task NN work_ayatblpinzaztdzhilw6yqsi6m 225 11 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 225 12 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 225 13 shows show VBZ work_ayatblpinzaztdzhilw6yqsi6m 225 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 225 15 amount amount NN work_ayatblpinzaztdzhilw6yqsi6m 225 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 225 17 time time NN work_ayatblpinzaztdzhilw6yqsi6m 225 18 spent spend VBN work_ayatblpinzaztdzhilw6yqsi6m 225 19 on on IN work_ayatblpinzaztdzhilw6yqsi6m 225 20 the the DT work_ayatblpinzaztdzhilw6yqsi6m 225 21 task task NN work_ayatblpinzaztdzhilw6yqsi6m 225 22 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 225 23 Kuznetsova Kuznetsova NNP work_ayatblpinzaztdzhilw6yqsi6m 225 24 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 225 25 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 225 26 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 225 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 225 28 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 225 29 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 225 30 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 225 31 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 225 32 utilization utilization NN work_ayatblpinzaztdzhilw6yqsi6m 225 33 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 225 34 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 225 35 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 225 36 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 225 37 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 225 38 on on IN work_ayatblpinzaztdzhilw6yqsi6m 225 39 the the DT work_ayatblpinzaztdzhilw6yqsi6m 225 40 total total JJ work_ayatblpinzaztdzhilw6yqsi6m 225 41 time time NN work_ayatblpinzaztdzhilw6yqsi6m 225 42 spent spend VBN work_ayatblpinzaztdzhilw6yqsi6m 225 43 on on IN work_ayatblpinzaztdzhilw6yqsi6m 225 44 the the DT work_ayatblpinzaztdzhilw6yqsi6m 225 45 CPU CPU NNP work_ayatblpinzaztdzhilw6yqsi6m 225 46 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 225 47 Context Context NNP work_ayatblpinzaztdzhilw6yqsi6m 225 48 switching switching NN work_ayatblpinzaztdzhilw6yqsi6m 225 49 explains explain VBZ work_ayatblpinzaztdzhilw6yqsi6m 225 50 how how WRB work_ayatblpinzaztdzhilw6yqsi6m 225 51 many many JJ work_ayatblpinzaztdzhilw6yqsi6m 225 52 times time NNS work_ayatblpinzaztdzhilw6yqsi6m 225 53 the the DT work_ayatblpinzaztdzhilw6yqsi6m 225 54 software software NN work_ayatblpinzaztdzhilw6yqsi6m 225 55 switched switch VBD work_ayatblpinzaztdzhilw6yqsi6m 225 56 off off RP work_ayatblpinzaztdzhilw6yqsi6m 225 57 the the DT work_ayatblpinzaztdzhilw6yqsi6m 225 58 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 225 59 from from IN work_ayatblpinzaztdzhilw6yqsi6m 225 60 one one CD work_ayatblpinzaztdzhilw6yqsi6m 225 61 process process NN work_ayatblpinzaztdzhilw6yqsi6m 225 62 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 225 63 thread thread NN work_ayatblpinzaztdzhilw6yqsi6m 225 64 to to IN work_ayatblpinzaztdzhilw6yqsi6m 225 65 another another DT work_ayatblpinzaztdzhilw6yqsi6m 225 66 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 225 67 Kuznetsova Kuznetsova NNP work_ayatblpinzaztdzhilw6yqsi6m 225 68 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 225 69 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 225 70 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 225 71 , , , work_ayatblpinzaztdzhilw6yqsi6m 225 72 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 225 73 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 225 74 4 4 CD work_ayatblpinzaztdzhilw6yqsi6m 225 75 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 225 76 migration migration NN work_ayatblpinzaztdzhilw6yqsi6m 225 77 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 225 78 migration migration NN work_ayatblpinzaztdzhilw6yqsi6m 225 79 describes describe VBZ work_ayatblpinzaztdzhilw6yqsi6m 225 80 equality equality NN work_ayatblpinzaztdzhilw6yqsi6m 225 81 in in IN work_ayatblpinzaztdzhilw6yqsi6m 225 82 a a DT work_ayatblpinzaztdzhilw6yqsi6m 225 83 workload workload NN work_ayatblpinzaztdzhilw6yqsi6m 225 84 distribution distribution NN work_ayatblpinzaztdzhilw6yqsi6m 225 85 across across IN work_ayatblpinzaztdzhilw6yqsi6m 225 86 all all DT work_ayatblpinzaztdzhilw6yqsi6m 225 87 cores core NNS work_ayatblpinzaztdzhilw6yqsi6m 225 88 . . . work_ayatblpinzaztdzhilw6yqsi6m 226 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 226 2 Kuznetsova Kuznetsova NNP work_ayatblpinzaztdzhilw6yqsi6m 226 3 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 226 4 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 226 5 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 226 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 226 7 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 226 8 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 226 9 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 226 10 Page page NN work_ayatblpinzaztdzhilw6yqsi6m 226 11 faults fault VBZ work_ayatblpinzaztdzhilw6yqsi6m 226 12 Page page NN work_ayatblpinzaztdzhilw6yqsi6m 226 13 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 226 14 faults fault NNS work_ayatblpinzaztdzhilw6yqsi6m 226 15 occur occur VBP work_ayatblpinzaztdzhilw6yqsi6m 226 16 when when WRB work_ayatblpinzaztdzhilw6yqsi6m 226 17 a a DT work_ayatblpinzaztdzhilw6yqsi6m 226 18 program program NN work_ayatblpinzaztdzhilw6yqsi6m 226 19 ’s ’s POS work_ayatblpinzaztdzhilw6yqsi6m 226 20 virtual virtual JJ work_ayatblpinzaztdzhilw6yqsi6m 226 21 content content NN work_ayatblpinzaztdzhilw6yqsi6m 226 22 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 226 23 to to TO work_ayatblpinzaztdzhilw6yqsi6m 226 24 be be VB work_ayatblpinzaztdzhilw6yqsi6m 226 25 copied copy VBN work_ayatblpinzaztdzhilw6yqsi6m 226 26 to to IN work_ayatblpinzaztdzhilw6yqsi6m 226 27 the the DT work_ayatblpinzaztdzhilw6yqsi6m 226 28 physical physical JJ work_ayatblpinzaztdzhilw6yqsi6m 226 29 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 226 30 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 226 31 Kuznetsova Kuznetsova NNP work_ayatblpinzaztdzhilw6yqsi6m 226 32 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 226 33 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 226 34 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 226 35 , , , work_ayatblpinzaztdzhilw6yqsi6m 226 36 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 226 37 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 226 38 6 6 CD work_ayatblpinzaztdzhilw6yqsi6m 226 39 Instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 226 40 per per IN work_ayatblpinzaztdzhilw6yqsi6m 226 41 cycle cycle NN work_ayatblpinzaztdzhilw6yqsi6m 226 42 The the DT work_ayatblpinzaztdzhilw6yqsi6m 226 43 average average JJ work_ayatblpinzaztdzhilw6yqsi6m 226 44 number number NN work_ayatblpinzaztdzhilw6yqsi6m 226 45 of of IN work_ayatblpinzaztdzhilw6yqsi6m 226 46 instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 226 47 executed execute VBN work_ayatblpinzaztdzhilw6yqsi6m 226 48 for for IN work_ayatblpinzaztdzhilw6yqsi6m 226 49 each each DT work_ayatblpinzaztdzhilw6yqsi6m 226 50 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 226 51 cycle cycle NN work_ayatblpinzaztdzhilw6yqsi6m 226 52 7 7 CD work_ayatblpinzaztdzhilw6yqsi6m 226 53 Branch Branch NNP work_ayatblpinzaztdzhilw6yqsi6m 226 54 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 226 55 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 226 56 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 226 57 an an DT work_ayatblpinzaztdzhilw6yqsi6m 226 58 instruction instruction NN work_ayatblpinzaztdzhilw6yqsi6m 226 59 in in IN work_ayatblpinzaztdzhilw6yqsi6m 226 60 a a DT work_ayatblpinzaztdzhilw6yqsi6m 226 61 computer computer NN work_ayatblpinzaztdzhilw6yqsi6m 226 62 program program NN work_ayatblpinzaztdzhilw6yqsi6m 226 63 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 226 64 can can MD work_ayatblpinzaztdzhilw6yqsi6m 226 65 cause cause VB work_ayatblpinzaztdzhilw6yqsi6m 226 66 a a DT work_ayatblpinzaztdzhilw6yqsi6m 226 67 computer computer NN work_ayatblpinzaztdzhilw6yqsi6m 226 68 to to TO work_ayatblpinzaztdzhilw6yqsi6m 226 69 begin begin VB work_ayatblpinzaztdzhilw6yqsi6m 226 70 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 226 71 a a DT work_ayatblpinzaztdzhilw6yqsi6m 226 72 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 226 73 instruction instruction NN work_ayatblpinzaztdzhilw6yqsi6m 226 74 sequence sequence NN work_ayatblpinzaztdzhilw6yqsi6m 226 75 and and CC work_ayatblpinzaztdzhilw6yqsi6m 226 76 thus thus RB work_ayatblpinzaztdzhilw6yqsi6m 226 77 deviate deviate VB work_ayatblpinzaztdzhilw6yqsi6m 226 78 from from IN work_ayatblpinzaztdzhilw6yqsi6m 226 79 its -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 226 80 default default NN work_ayatblpinzaztdzhilw6yqsi6m 226 81 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 226 82 of of IN work_ayatblpinzaztdzhilw6yqsi6m 226 83 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 226 84 instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 226 85 in in IN work_ayatblpinzaztdzhilw6yqsi6m 226 86 order order NN work_ayatblpinzaztdzhilw6yqsi6m 226 87 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 226 88 Branch Branch NNP work_ayatblpinzaztdzhilw6yqsi6m 226 89 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 226 90 Branch Branch NNP work_ayatblpinzaztdzhilw6yqsi6m 226 91 misprediction misprediction NN work_ayatblpinzaztdzhilw6yqsi6m 226 92 occurs occur VBZ work_ayatblpinzaztdzhilw6yqsi6m 226 93 when when WRB work_ayatblpinzaztdzhilw6yqsi6m 226 94 a a DT work_ayatblpinzaztdzhilw6yqsi6m 226 95 processor processor NN work_ayatblpinzaztdzhilw6yqsi6m 226 96 mispredicts mispredict VBZ work_ayatblpinzaztdzhilw6yqsi6m 226 97 the the DT work_ayatblpinzaztdzhilw6yqsi6m 226 98 next next JJ work_ayatblpinzaztdzhilw6yqsi6m 226 99 instruction instruction NN work_ayatblpinzaztdzhilw6yqsi6m 226 100 to to TO work_ayatblpinzaztdzhilw6yqsi6m 226 101 process process VB work_ayatblpinzaztdzhilw6yqsi6m 226 102 in in IN work_ayatblpinzaztdzhilw6yqsi6m 226 103 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 226 104 prediction prediction NN work_ayatblpinzaztdzhilw6yqsi6m 226 105 , , , work_ayatblpinzaztdzhilw6yqsi6m 226 106 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 226 107 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 226 108 aimed aim VBN work_ayatblpinzaztdzhilw6yqsi6m 226 109 at at IN work_ayatblpinzaztdzhilw6yqsi6m 226 110 speeding speed VBG work_ayatblpinzaztdzhilw6yqsi6m 226 111 up up RP work_ayatblpinzaztdzhilw6yqsi6m 226 112 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 226 113 . . . work_ayatblpinzaztdzhilw6yqsi6m 227 1 9 9 CD work_ayatblpinzaztdzhilw6yqsi6m 227 2 Cycles Cycles NNPS work_ayatblpinzaztdzhilw6yqsi6m 227 3 Perf Perf NNP work_ayatblpinzaztdzhilw6yqsi6m 227 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 227 5 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 227 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 227 7 cycles cycle NNS work_ayatblpinzaztdzhilw6yqsi6m 227 8 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 227 9 a a DT work_ayatblpinzaztdzhilw6yqsi6m 227 10 count count NN work_ayatblpinzaztdzhilw6yqsi6m 227 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 227 12 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 227 13 cycles cycle NNS work_ayatblpinzaztdzhilw6yqsi6m 227 14 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 227 15 traces trace VBZ work_ayatblpinzaztdzhilw6yqsi6m 227 16 to to IN work_ayatblpinzaztdzhilw6yqsi6m 227 17 a a DT work_ayatblpinzaztdzhilw6yqsi6m 227 18 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 227 19 counter counter NN work_ayatblpinzaztdzhilw6yqsi6m 227 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 227 21 Flater Flater NNP work_ayatblpinzaztdzhilw6yqsi6m 227 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 227 23 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 227 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 227 25 10 10 CD work_ayatblpinzaztdzhilw6yqsi6m 227 26 Cache Cache NNP work_ayatblpinzaztdzhilw6yqsi6m 227 27 misses miss VBZ work_ayatblpinzaztdzhilw6yqsi6m 227 28 Cache Cache NNP work_ayatblpinzaztdzhilw6yqsi6m 227 29 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 227 30 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 227 31 a a DT work_ayatblpinzaztdzhilw6yqsi6m 227 32 state state NN work_ayatblpinzaztdzhilw6yqsi6m 227 33 of of IN work_ayatblpinzaztdzhilw6yqsi6m 227 34 not not RB work_ayatblpinzaztdzhilw6yqsi6m 227 35 getting get VBG work_ayatblpinzaztdzhilw6yqsi6m 227 36 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 227 37 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 227 38 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 227 39 being be VBG work_ayatblpinzaztdzhilw6yqsi6m 227 40 processed process VBN work_ayatblpinzaztdzhilw6yqsi6m 227 41 by by IN work_ayatblpinzaztdzhilw6yqsi6m 227 42 a a DT work_ayatblpinzaztdzhilw6yqsi6m 227 43 component component NN work_ayatblpinzaztdzhilw6yqsi6m 227 44 or or CC work_ayatblpinzaztdzhilw6yqsi6m 227 45 application application NN work_ayatblpinzaztdzhilw6yqsi6m 227 46 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 227 47 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 227 48 not not RB work_ayatblpinzaztdzhilw6yqsi6m 227 49 found find VBN work_ayatblpinzaztdzhilw6yqsi6m 227 50 in in IN work_ayatblpinzaztdzhilw6yqsi6m 227 51 the the DT work_ayatblpinzaztdzhilw6yqsi6m 227 52 cache cache NN work_ayatblpinzaztdzhilw6yqsi6m 227 53 . . . work_ayatblpinzaztdzhilw6yqsi6m 228 1 11 11 CD work_ayatblpinzaztdzhilw6yqsi6m 228 2 Total total JJ work_ayatblpinzaztdzhilw6yqsi6m 228 3 time time NN work_ayatblpinzaztdzhilw6yqsi6m 228 4 elapsed elapse VBD work_ayatblpinzaztdzhilw6yqsi6m 228 5 It -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 228 6 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 228 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 228 8 total total JJ work_ayatblpinzaztdzhilw6yqsi6m 228 9 execution execution NN work_ayatblpinzaztdzhilw6yqsi6m 228 10 time time NN work_ayatblpinzaztdzhilw6yqsi6m 228 11 in in IN work_ayatblpinzaztdzhilw6yqsi6m 228 12 seconds second NNS work_ayatblpinzaztdzhilw6yqsi6m 228 13 Figure figure NN work_ayatblpinzaztdzhilw6yqsi6m 228 14 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 228 15 Feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 228 16 set set VBN work_ayatblpinzaztdzhilw6yqsi6m 228 17 correlation correlation NN work_ayatblpinzaztdzhilw6yqsi6m 228 18 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 228 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 229 1 Full full JJ work_ayatblpinzaztdzhilw6yqsi6m 229 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 229 3 size size NN work_ayatblpinzaztdzhilw6yqsi6m 229 4 DOI doi NN work_ayatblpinzaztdzhilw6yqsi6m 229 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 229 6 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 229 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 229 8 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 229 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 229 10 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 229 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 229 12 fig-2 fig-2 NNP work_ayatblpinzaztdzhilw6yqsi6m 229 13 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 229 14 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 229 15 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 229 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 230 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 230 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 230 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 230 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 230 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 230 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 230 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 231 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 231 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 231 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 231 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 231 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 231 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 231 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 231 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 231 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 231 10 12/24 12/24 CD work_ayatblpinzaztdzhilw6yqsi6m 231 11 http://dx.doi.org/10.7717/peerj-cs.361/fig-2 http://dx.doi.org/10.7717/peerj-cs.361/fig-2 CD work_ayatblpinzaztdzhilw6yqsi6m 231 12 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 231 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_ayatblpinzaztdzhilw6yqsi6m 231 14 correlation correlation NN work_ayatblpinzaztdzhilw6yqsi6m 231 15 with with IN work_ayatblpinzaztdzhilw6yqsi6m 231 16 all all PDT work_ayatblpinzaztdzhilw6yqsi6m 231 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 231 18 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 231 19 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 231 20 . . . work_ayatblpinzaztdzhilw6yqsi6m 232 1 On on IN work_ayatblpinzaztdzhilw6yqsi6m 232 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 232 3 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 232 4 hand hand NN work_ayatblpinzaztdzhilw6yqsi6m 232 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 232 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 232 7 Task Task NNP work_ayatblpinzaztdzhilw6yqsi6m 232 8 Clock Clock NNP work_ayatblpinzaztdzhilw6yqsi6m 232 9 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 232 10 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 232 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 232 12 strong strong JJ work_ayatblpinzaztdzhilw6yqsi6m 232 13 relationship relationship NN work_ayatblpinzaztdzhilw6yqsi6m 232 14 with with IN work_ayatblpinzaztdzhilw6yqsi6m 232 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 232 16 Context Context NNP work_ayatblpinzaztdzhilw6yqsi6m 232 17 Switches Switches NNPS work_ayatblpinzaztdzhilw6yqsi6m 232 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 232 19 Cycles Cycles NNPS work_ayatblpinzaztdzhilw6yqsi6m 232 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 232 21 Instructions Instructions NNPS work_ayatblpinzaztdzhilw6yqsi6m 232 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 232 23 Branches Branches NNPS work_ayatblpinzaztdzhilw6yqsi6m 232 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 232 25 and and CC work_ayatblpinzaztdzhilw6yqsi6m 232 26 Branches Branches NNP work_ayatblpinzaztdzhilw6yqsi6m 232 27 Misses Misses NNPS work_ayatblpinzaztdzhilw6yqsi6m 232 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 233 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 233 2 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 233 3 having have VBG work_ayatblpinzaztdzhilw6yqsi6m 233 4 higher high JJR work_ayatblpinzaztdzhilw6yqsi6m 233 5 rank rank NN work_ayatblpinzaztdzhilw6yqsi6m 233 6 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 233 7 deemed deem VBN work_ayatblpinzaztdzhilw6yqsi6m 233 8 as as IN work_ayatblpinzaztdzhilw6yqsi6m 233 9 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 233 10 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 233 11 for for IN work_ayatblpinzaztdzhilw6yqsi6m 233 12 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 233 13 than than IN work_ayatblpinzaztdzhilw6yqsi6m 233 14 low low JJ work_ayatblpinzaztdzhilw6yqsi6m 233 15 ranked rank VBN work_ayatblpinzaztdzhilw6yqsi6m 233 16 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 233 17 as as IN work_ayatblpinzaztdzhilw6yqsi6m 233 18 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 233 19 in in IN work_ayatblpinzaztdzhilw6yqsi6m 233 20 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 233 21 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 233 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 234 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 234 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 234 3 training training NN work_ayatblpinzaztdzhilw6yqsi6m 234 4 phase phase NN work_ayatblpinzaztdzhilw6yqsi6m 234 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 234 6 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 234 7 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 234 8 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 234 9 extracted extract VBN work_ayatblpinzaztdzhilw6yqsi6m 234 10 by by IN work_ayatblpinzaztdzhilw6yqsi6m 234 11 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 234 12 known know VBN work_ayatblpinzaztdzhilw6yqsi6m 234 13 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 234 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 234 15 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 234 16 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 234 17 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 234 18 application application NN work_ayatblpinzaztdzhilw6yqsi6m 234 19 in in IN work_ayatblpinzaztdzhilw6yqsi6m 234 20 containing contain VBG work_ayatblpinzaztdzhilw6yqsi6m 234 21 environment environment NN work_ayatblpinzaztdzhilw6yqsi6m 234 22 system system NN work_ayatblpinzaztdzhilw6yqsi6m 234 23 units unit NNS work_ayatblpinzaztdzhilw6yqsi6m 234 24 as as IN work_ayatblpinzaztdzhilw6yqsi6m 234 25 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 234 26 in in IN work_ayatblpinzaztdzhilw6yqsi6m 234 27 Figs Figs NNP work_ayatblpinzaztdzhilw6yqsi6m 234 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 235 1 3A 3A NNP work_ayatblpinzaztdzhilw6yqsi6m 235 2 and and CC work_ayatblpinzaztdzhilw6yqsi6m 235 3 3B. 3B. NNP work_ayatblpinzaztdzhilw6yqsi6m 236 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 236 2 total total NN work_ayatblpinzaztdzhilw6yqsi6m 236 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 236 4 80 80 CD work_ayatblpinzaztdzhilw6yqsi6m 236 5 % % NN work_ayatblpinzaztdzhilw6yqsi6m 236 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 236 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 236 8 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 236 9 data data NN work_ayatblpinzaztdzhilw6yqsi6m 236 10 set set NN work_ayatblpinzaztdzhilw6yqsi6m 236 11 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 236 12 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 236 13 for for IN work_ayatblpinzaztdzhilw6yqsi6m 236 14 training training NN work_ayatblpinzaztdzhilw6yqsi6m 236 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 236 16 20 20 CD work_ayatblpinzaztdzhilw6yqsi6m 236 17 % % NN work_ayatblpinzaztdzhilw6yqsi6m 236 18 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 236 19 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 236 20 for for IN work_ayatblpinzaztdzhilw6yqsi6m 236 21 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 236 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 237 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 237 2 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 237 3 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 237 4 K k NN work_ayatblpinzaztdzhilw6yqsi6m 237 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 237 6 fold fold NN work_ayatblpinzaztdzhilw6yqsi6m 237 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 237 8 k k NN work_ayatblpinzaztdzhilw6yqsi6m 237 9 = = SYM work_ayatblpinzaztdzhilw6yqsi6m 237 10 10 10 CD work_ayatblpinzaztdzhilw6yqsi6m 237 11 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 237 12 cross cross NN work_ayatblpinzaztdzhilw6yqsi6m 237 13 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 237 14 validation validation JJ work_ayatblpinzaztdzhilw6yqsi6m 237 15 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 237 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 237 17 compare compare VB work_ayatblpinzaztdzhilw6yqsi6m 237 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 237 19 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 237 20 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 237 21 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 237 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 237 23 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 237 24 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 237 25 to to TO work_ayatblpinzaztdzhilw6yqsi6m 237 26 make make VB work_ayatblpinzaztdzhilw6yqsi6m 237 27 sure sure JJ work_ayatblpinzaztdzhilw6yqsi6m 237 28 that that IN work_ayatblpinzaztdzhilw6yqsi6m 237 29 the the DT work_ayatblpinzaztdzhilw6yqsi6m 237 30 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 237 31 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 237 32 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 237 33 uniformly uniformly RB work_ayatblpinzaztdzhilw6yqsi6m 237 34 without without IN work_ayatblpinzaztdzhilw6yqsi6m 237 35 any any DT work_ayatblpinzaztdzhilw6yqsi6m 237 36 biasness biasness NN work_ayatblpinzaztdzhilw6yqsi6m 237 37 . . . work_ayatblpinzaztdzhilw6yqsi6m 238 1 This this DT work_ayatblpinzaztdzhilw6yqsi6m 238 2 results result VBZ work_ayatblpinzaztdzhilw6yqsi6m 238 3 in in IN work_ayatblpinzaztdzhilw6yqsi6m 238 4 un un NNP work_ayatblpinzaztdzhilw6yqsi6m 238 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 238 6 biased biased JJ work_ayatblpinzaztdzhilw6yqsi6m 238 7 training training NN work_ayatblpinzaztdzhilw6yqsi6m 238 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 238 9 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 238 10 cycles cycle NNS work_ayatblpinzaztdzhilw6yqsi6m 238 11 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 238 12 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 238 13 Features Features NNP work_ayatblpinzaztdzhilw6yqsi6m 238 14 rank rank NN work_ayatblpinzaztdzhilw6yqsi6m 238 15 list list NN work_ayatblpinzaztdzhilw6yqsi6m 238 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 239 1 Rank Rank NNP work_ayatblpinzaztdzhilw6yqsi6m 239 2 Score score NN work_ayatblpinzaztdzhilw6yqsi6m 239 3 Feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 239 4 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 239 5 0.20145 0.20145 CD work_ayatblpinzaztdzhilw6yqsi6m 239 6 Cache Cache NNP work_ayatblpinzaztdzhilw6yqsi6m 239 7 misses miss VBZ work_ayatblpinzaztdzhilw6yqsi6m 239 8 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 239 9 0.181887 0.181887 CD work_ayatblpinzaztdzhilw6yqsi6m 239 10 TaskClock taskclock NN work_ayatblpinzaztdzhilw6yqsi6m 239 11 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 239 12 0.153562 0.153562 CD work_ayatblpinzaztdzhilw6yqsi6m 239 13 Branches branch NNS work_ayatblpinzaztdzhilw6yqsi6m 239 14 4 4 CD work_ayatblpinzaztdzhilw6yqsi6m 239 15 0.10867 0.10867 CD work_ayatblpinzaztdzhilw6yqsi6m 239 16 SecondsTimeElapsed secondstimeelapse VBD work_ayatblpinzaztdzhilw6yqsi6m 239 17 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 239 18 0.086973 0.086973 CD work_ayatblpinzaztdzhilw6yqsi6m 239 19 Instructions instruction NNS work_ayatblpinzaztdzhilw6yqsi6m 239 20 6 6 CD work_ayatblpinzaztdzhilw6yqsi6m 239 21 0.085666 0.085666 CD work_ayatblpinzaztdzhilw6yqsi6m 239 22 BranchMisses BranchMisses NNP work_ayatblpinzaztdzhilw6yqsi6m 239 23 7 7 CD work_ayatblpinzaztdzhilw6yqsi6m 239 24 0.044272 0.044272 CD work_ayatblpinzaztdzhilw6yqsi6m 239 25 ContextSwitches ContextSwitches NNP work_ayatblpinzaztdzhilw6yqsi6m 239 26 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 239 27 0.042727 0.042727 CD work_ayatblpinzaztdzhilw6yqsi6m 239 28 PageFaults PageFaults NNP work_ayatblpinzaztdzhilw6yqsi6m 239 29 9 9 CD work_ayatblpinzaztdzhilw6yqsi6m 239 30 0.040087 0.040087 CD work_ayatblpinzaztdzhilw6yqsi6m 239 31 CPU cpu NN work_ayatblpinzaztdzhilw6yqsi6m 239 32 migration migration NN work_ayatblpinzaztdzhilw6yqsi6m 239 33 10 10 CD work_ayatblpinzaztdzhilw6yqsi6m 239 34 0.028564 0.028564 CD work_ayatblpinzaztdzhilw6yqsi6m 239 35 Cycles cycle NNS work_ayatblpinzaztdzhilw6yqsi6m 239 36 11 11 CD work_ayatblpinzaztdzhilw6yqsi6m 239 37 0.026142 0.026142 CD work_ayatblpinzaztdzhilw6yqsi6m 239 38 CPUsUtilized CPUsUtilized NNP work_ayatblpinzaztdzhilw6yqsi6m 239 39 Figure Figure NNP work_ayatblpinzaztdzhilw6yqsi6m 239 40 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 239 41 Feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 239 42 extraction extraction NN work_ayatblpinzaztdzhilw6yqsi6m 239 43 workflow workflow NN work_ayatblpinzaztdzhilw6yqsi6m 239 44 for for IN work_ayatblpinzaztdzhilw6yqsi6m 239 45 training training NN work_ayatblpinzaztdzhilw6yqsi6m 239 46 and and CC work_ayatblpinzaztdzhilw6yqsi6m 239 47 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 239 48 phases phase NNS work_ayatblpinzaztdzhilw6yqsi6m 239 49 : : : work_ayatblpinzaztdzhilw6yqsi6m 239 50 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 239 51 A a NN work_ayatblpinzaztdzhilw6yqsi6m 239 52 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 239 53 Workflow workflow NN work_ayatblpinzaztdzhilw6yqsi6m 239 54 of of IN work_ayatblpinzaztdzhilw6yqsi6m 239 55 the the DT work_ayatblpinzaztdzhilw6yqsi6m 239 56 training training NN work_ayatblpinzaztdzhilw6yqsi6m 239 57 process process NN work_ayatblpinzaztdzhilw6yqsi6m 239 58 , , , work_ayatblpinzaztdzhilw6yqsi6m 239 59 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 239 60 B b NN work_ayatblpinzaztdzhilw6yqsi6m 239 61 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 239 62 workflow workflow NN work_ayatblpinzaztdzhilw6yqsi6m 239 63 of of IN work_ayatblpinzaztdzhilw6yqsi6m 239 64 the the DT work_ayatblpinzaztdzhilw6yqsi6m 239 65 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 239 66 phase phase NN work_ayatblpinzaztdzhilw6yqsi6m 239 67 . . . work_ayatblpinzaztdzhilw6yqsi6m 240 1 Full full JJ work_ayatblpinzaztdzhilw6yqsi6m 240 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 240 3 size size NN work_ayatblpinzaztdzhilw6yqsi6m 240 4 DOI doi NN work_ayatblpinzaztdzhilw6yqsi6m 240 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 240 6 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 240 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 240 8 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 240 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 240 10 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 240 11 / / NFP work_ayatblpinzaztdzhilw6yqsi6m 240 12 fig-3 fig-3 UH work_ayatblpinzaztdzhilw6yqsi6m 240 13 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 240 14 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 240 15 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 240 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 241 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 241 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 241 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 241 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 241 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 241 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 241 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 242 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 242 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 242 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 242 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 242 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 242 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 242 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 242 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 242 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 242 10 13/24 13/24 CD work_ayatblpinzaztdzhilw6yqsi6m 242 11 http://dx.doi.org/10.7717/peerj-cs.361/fig-3 http://dx.doi.org/10.7717/peerj-cs.361/fig-3 NNP work_ayatblpinzaztdzhilw6yqsi6m 242 12 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 242 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NN work_ayatblpinzaztdzhilw6yqsi6m 242 14 producing produce VBG work_ayatblpinzaztdzhilw6yqsi6m 242 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 242 16 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 242 17 on on IN work_ayatblpinzaztdzhilw6yqsi6m 242 18 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 242 19 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 242 20 could could MD work_ayatblpinzaztdzhilw6yqsi6m 242 21 conclude conclude VB work_ayatblpinzaztdzhilw6yqsi6m 242 22 with with IN work_ayatblpinzaztdzhilw6yqsi6m 242 23 confidence confidence NN work_ayatblpinzaztdzhilw6yqsi6m 242 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 243 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 243 2 each each DT work_ayatblpinzaztdzhilw6yqsi6m 243 3 cycle cycle NN work_ayatblpinzaztdzhilw6yqsi6m 243 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 243 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 243 6 training training NN work_ayatblpinzaztdzhilw6yqsi6m 243 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 243 8 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 243 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 243 10 a a DT work_ayatblpinzaztdzhilw6yqsi6m 243 11 20 20 CD work_ayatblpinzaztdzhilw6yqsi6m 243 12 % % NN work_ayatblpinzaztdzhilw6yqsi6m 243 13 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 243 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 243 15 80 80 CD work_ayatblpinzaztdzhilw6yqsi6m 243 16 % % NN work_ayatblpinzaztdzhilw6yqsi6m 243 17 training training NN work_ayatblpinzaztdzhilw6yqsi6m 243 18 partition partition NN work_ayatblpinzaztdzhilw6yqsi6m 243 19 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 243 20 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 243 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 244 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 244 2 goal goal NN work_ayatblpinzaztdzhilw6yqsi6m 244 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 244 4 supervised supervise VBN work_ayatblpinzaztdzhilw6yqsi6m 244 5 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 244 6 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 244 7 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 244 8 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 244 9 to to TO work_ayatblpinzaztdzhilw6yqsi6m 244 10 find find VB work_ayatblpinzaztdzhilw6yqsi6m 244 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 244 12 function function NN work_ayatblpinzaztdzhilw6yqsi6m 244 13 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 244 14 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 244 15 trained train VBN work_ayatblpinzaztdzhilw6yqsi6m 244 16 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 244 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 244 18 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 244 19 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 244 20 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 244 21 that that IN work_ayatblpinzaztdzhilw6yqsi6m 244 22 the the DT work_ayatblpinzaztdzhilw6yqsi6m 244 23 error error NN work_ayatblpinzaztdzhilw6yqsi6m 244 24 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 244 25 minimum minimum JJ work_ayatblpinzaztdzhilw6yqsi6m 244 26 for for IN work_ayatblpinzaztdzhilw6yqsi6m 244 27 the the DT work_ayatblpinzaztdzhilw6yqsi6m 244 28 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 244 29 or or CC work_ayatblpinzaztdzhilw6yqsi6m 244 30 unseen unseen JJ work_ayatblpinzaztdzhilw6yqsi6m 244 31 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 244 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 245 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 245 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 245 3 training training NN work_ayatblpinzaztdzhilw6yqsi6m 245 4 phase phase NN work_ayatblpinzaztdzhilw6yqsi6m 245 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 245 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 245 7 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 245 8 model model NN work_ayatblpinzaztdzhilw6yqsi6m 245 9 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 245 10 trained train VBN work_ayatblpinzaztdzhilw6yqsi6m 245 11 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 245 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 245 13 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 245 14 as as IN work_ayatblpinzaztdzhilw6yqsi6m 245 15 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 245 16 in in IN work_ayatblpinzaztdzhilw6yqsi6m 245 17 Table Table NNP work_ayatblpinzaztdzhilw6yqsi6m 245 18 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 245 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 246 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 246 2 testing testing NN work_ayatblpinzaztdzhilw6yqsi6m 246 3 or or CC work_ayatblpinzaztdzhilw6yqsi6m 246 4 validation validation NN work_ayatblpinzaztdzhilw6yqsi6m 246 5 methodology methodology NN work_ayatblpinzaztdzhilw6yqsi6m 246 6 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 246 7 performed perform VBN work_ayatblpinzaztdzhilw6yqsi6m 246 8 after after IN work_ayatblpinzaztdzhilw6yqsi6m 246 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 246 10 training training NN work_ayatblpinzaztdzhilw6yqsi6m 246 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 246 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 246 13 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 246 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 247 1 Classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 247 2 model model NN work_ayatblpinzaztdzhilw6yqsi6m 247 3 The the DT work_ayatblpinzaztdzhilw6yqsi6m 247 4 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 247 5 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 247 6 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 247 7 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 247 8 namely namely RB work_ayatblpinzaztdzhilw6yqsi6m 247 9 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 247 10 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 247 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 247 12 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 247 13 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 247 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 247 15 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 247 16 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 247 17 and and CC work_ayatblpinzaztdzhilw6yqsi6m 247 18 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 247 19 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 247 20 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 247 21 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 247 22 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 247 23 for for IN work_ayatblpinzaztdzhilw6yqsi6m 247 24 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 247 25 purposes purpose NNS work_ayatblpinzaztdzhilw6yqsi6m 247 26 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 247 27 as as IN work_ayatblpinzaztdzhilw6yqsi6m 247 28 phishing phishe VBG work_ayatblpinzaztdzhilw6yqsi6m 247 29 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 247 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 247 31 facial facial JJ work_ayatblpinzaztdzhilw6yqsi6m 247 32 recognition recognition NN work_ayatblpinzaztdzhilw6yqsi6m 247 33 and and CC work_ayatblpinzaztdzhilw6yqsi6m 247 34 financial financial JJ work_ayatblpinzaztdzhilw6yqsi6m 247 35 predictions prediction NNS work_ayatblpinzaztdzhilw6yqsi6m 247 36 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 247 37 Jordan Jordan NNP work_ayatblpinzaztdzhilw6yqsi6m 247 38 & & CC work_ayatblpinzaztdzhilw6yqsi6m 247 39 Mitchell Mitchell NNP work_ayatblpinzaztdzhilw6yqsi6m 247 40 , , , work_ayatblpinzaztdzhilw6yqsi6m 247 41 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 247 42 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 247 43 , , , work_ayatblpinzaztdzhilw6yqsi6m 247 44 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 247 45 . . . work_ayatblpinzaztdzhilw6yqsi6m 248 1 We -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 248 2 employ employ VBP work_ayatblpinzaztdzhilw6yqsi6m 248 3 these these DT work_ayatblpinzaztdzhilw6yqsi6m 248 4 four four CD work_ayatblpinzaztdzhilw6yqsi6m 248 5 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 248 6 as as IN work_ayatblpinzaztdzhilw6yqsi6m 248 7 part part NN work_ayatblpinzaztdzhilw6yqsi6m 248 8 of of IN work_ayatblpinzaztdzhilw6yqsi6m 248 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 248 10 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 248 11 methodology methodology NN work_ayatblpinzaztdzhilw6yqsi6m 248 12 to to TO work_ayatblpinzaztdzhilw6yqsi6m 248 13 analyze analyze VB work_ayatblpinzaztdzhilw6yqsi6m 248 14 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 248 15 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 248 16 for for IN work_ayatblpinzaztdzhilw6yqsi6m 248 17 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 248 18 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 248 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 249 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 249 2 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 249 3 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 249 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 249 5 a a DT work_ayatblpinzaztdzhilw6yqsi6m 249 6 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 249 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 249 8 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 249 9 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 249 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 249 11 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 249 12 contains contain VBZ work_ayatblpinzaztdzhilw6yqsi6m 249 13 a a DT work_ayatblpinzaztdzhilw6yqsi6m 249 14 root root NN work_ayatblpinzaztdzhilw6yqsi6m 249 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 249 16 internal internal JJ work_ayatblpinzaztdzhilw6yqsi6m 249 17 nodes node NNS work_ayatblpinzaztdzhilw6yqsi6m 249 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 249 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 249 20 leaf leaf NN work_ayatblpinzaztdzhilw6yqsi6m 249 21 nodes node NNS work_ayatblpinzaztdzhilw6yqsi6m 249 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 250 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 250 2 class class NN work_ayatblpinzaztdzhilw6yqsi6m 250 3 label label NN work_ayatblpinzaztdzhilw6yqsi6m 250 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 250 5 assigned assign VBN work_ayatblpinzaztdzhilw6yqsi6m 250 6 to to IN work_ayatblpinzaztdzhilw6yqsi6m 250 7 each each DT work_ayatblpinzaztdzhilw6yqsi6m 250 8 leaf leaf NN work_ayatblpinzaztdzhilw6yqsi6m 250 9 node node NN work_ayatblpinzaztdzhilw6yqsi6m 250 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 250 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 250 12 decisions decision NNS work_ayatblpinzaztdzhilw6yqsi6m 250 13 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 250 14 rendered render VBN work_ayatblpinzaztdzhilw6yqsi6m 250 15 by by IN work_ayatblpinzaztdzhilw6yqsi6m 250 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 250 17 internal internal JJ work_ayatblpinzaztdzhilw6yqsi6m 250 18 nodes node NNS work_ayatblpinzaztdzhilw6yqsi6m 250 19 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 250 20 Tan Tan NNP work_ayatblpinzaztdzhilw6yqsi6m 250 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 250 22 Steinbach Steinbach NNP work_ayatblpinzaztdzhilw6yqsi6m 250 23 & & CC work_ayatblpinzaztdzhilw6yqsi6m 250 24 Kumar Kumar NNP work_ayatblpinzaztdzhilw6yqsi6m 250 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 250 26 2006 2006 CD work_ayatblpinzaztdzhilw6yqsi6m 250 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 250 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 251 1 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 251 2 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 251 3 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 251 4 RF RF NNP work_ayatblpinzaztdzhilw6yqsi6m 251 5 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 251 6 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 251 7 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 251 8 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 251 9 on on IN work_ayatblpinzaztdzhilw6yqsi6m 251 10 a a DT work_ayatblpinzaztdzhilw6yqsi6m 251 11 combination combination NN work_ayatblpinzaztdzhilw6yqsi6m 251 12 of of IN work_ayatblpinzaztdzhilw6yqsi6m 251 13 multiple multiple JJ work_ayatblpinzaztdzhilw6yqsi6m 251 14 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 251 15 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 251 16 predictors predictor NNS work_ayatblpinzaztdzhilw6yqsi6m 251 17 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 251 18 that that IN work_ayatblpinzaztdzhilw6yqsi6m 251 19 each each DT work_ayatblpinzaztdzhilw6yqsi6m 251 20 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 251 21 depends depend VBZ work_ayatblpinzaztdzhilw6yqsi6m 251 22 on on IN work_ayatblpinzaztdzhilw6yqsi6m 251 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 251 24 values value NNS work_ayatblpinzaztdzhilw6yqsi6m 251 25 of of IN work_ayatblpinzaztdzhilw6yqsi6m 251 26 a a DT work_ayatblpinzaztdzhilw6yqsi6m 251 27 random random JJ work_ayatblpinzaztdzhilw6yqsi6m 251 28 vector vector NN work_ayatblpinzaztdzhilw6yqsi6m 251 29 sampled sample VBN work_ayatblpinzaztdzhilw6yqsi6m 251 30 independently independently RB work_ayatblpinzaztdzhilw6yqsi6m 251 31 and and CC work_ayatblpinzaztdzhilw6yqsi6m 251 32 with with IN work_ayatblpinzaztdzhilw6yqsi6m 251 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 251 34 same same JJ work_ayatblpinzaztdzhilw6yqsi6m 251 35 distribution distribution NN work_ayatblpinzaztdzhilw6yqsi6m 251 36 for for IN work_ayatblpinzaztdzhilw6yqsi6m 251 37 all all DT work_ayatblpinzaztdzhilw6yqsi6m 251 38 trees tree NNS work_ayatblpinzaztdzhilw6yqsi6m 251 39 in in IN work_ayatblpinzaztdzhilw6yqsi6m 251 40 the the DT work_ayatblpinzaztdzhilw6yqsi6m 251 41 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 251 42 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 251 43 Xuan Xuan NNP work_ayatblpinzaztdzhilw6yqsi6m 251 44 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 251 45 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 251 46 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 251 47 , , , work_ayatblpinzaztdzhilw6yqsi6m 251 48 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 251 49 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 251 50 . . . work_ayatblpinzaztdzhilw6yqsi6m 252 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 252 2 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 252 3 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 252 4 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 252 5 XGBoost XGBoost NNP work_ayatblpinzaztdzhilw6yqsi6m 252 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 252 7 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 252 8 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 252 9 follow follow VB work_ayatblpinzaztdzhilw6yqsi6m 252 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 252 11 same same JJ work_ayatblpinzaztdzhilw6yqsi6m 252 12 basic basic JJ work_ayatblpinzaztdzhilw6yqsi6m 252 13 principle principle NN work_ayatblpinzaztdzhilw6yqsi6m 252 14 however however RB work_ayatblpinzaztdzhilw6yqsi6m 252 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 252 16 there there EX work_ayatblpinzaztdzhilw6yqsi6m 252 17 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 252 18 a a DT work_ayatblpinzaztdzhilw6yqsi6m 252 19 few few JJ work_ayatblpinzaztdzhilw6yqsi6m 252 20 differences difference NNS work_ayatblpinzaztdzhilw6yqsi6m 252 21 in in IN work_ayatblpinzaztdzhilw6yqsi6m 252 22 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 252 23 modeling modeling JJ work_ayatblpinzaztdzhilw6yqsi6m 252 24 details detail NNS work_ayatblpinzaztdzhilw6yqsi6m 252 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 253 1 Specifically specifically RB work_ayatblpinzaztdzhilw6yqsi6m 253 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 253 3 extreme extreme JJ work_ayatblpinzaztdzhilw6yqsi6m 253 4 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 253 5 boosting boosting NN work_ayatblpinzaztdzhilw6yqsi6m 253 6 utilizes utilize VBZ work_ayatblpinzaztdzhilw6yqsi6m 253 7 a a DT work_ayatblpinzaztdzhilw6yqsi6m 253 8 more more RBR work_ayatblpinzaztdzhilw6yqsi6m 253 9 regularized regularized JJ work_ayatblpinzaztdzhilw6yqsi6m 253 10 model model NN work_ayatblpinzaztdzhilw6yqsi6m 253 11 formalization formalization NN work_ayatblpinzaztdzhilw6yqsi6m 253 12 to to TO work_ayatblpinzaztdzhilw6yqsi6m 253 13 control control VB work_ayatblpinzaztdzhilw6yqsi6m 253 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 253 15 over over RB work_ayatblpinzaztdzhilw6yqsi6m 253 16 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 253 17 fitting fit VBG work_ayatblpinzaztdzhilw6yqsi6m 253 18 problem problem NN work_ayatblpinzaztdzhilw6yqsi6m 253 19 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 253 20 may may MD work_ayatblpinzaztdzhilw6yqsi6m 253 21 occur occur VB work_ayatblpinzaztdzhilw6yqsi6m 253 22 due due IN work_ayatblpinzaztdzhilw6yqsi6m 253 23 to to IN work_ayatblpinzaztdzhilw6yqsi6m 253 24 linear linear VB work_ayatblpinzaztdzhilw6yqsi6m 253 25 fitting fitting NN work_ayatblpinzaztdzhilw6yqsi6m 253 26 over over IN work_ayatblpinzaztdzhilw6yqsi6m 253 27 noisy noisy JJ work_ayatblpinzaztdzhilw6yqsi6m 253 28 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 253 29 to to TO work_ayatblpinzaztdzhilw6yqsi6m 253 30 provide provide VB work_ayatblpinzaztdzhilw6yqsi6m 253 31 better well JJR work_ayatblpinzaztdzhilw6yqsi6m 253 32 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 253 33 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 253 34 Jbabdi Jbabdi NNP work_ayatblpinzaztdzhilw6yqsi6m 253 35 et et FW work_ayatblpinzaztdzhilw6yqsi6m 253 36 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 253 37 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 253 38 , , , work_ayatblpinzaztdzhilw6yqsi6m 253 39 2012 2012 CD work_ayatblpinzaztdzhilw6yqsi6m 253 40 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 253 41 . . . work_ayatblpinzaztdzhilw6yqsi6m 254 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 254 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 254 3 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 254 4 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 254 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 254 6 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 254 7 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 254 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 254 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 254 10 maximum maximum JJ work_ayatblpinzaztdzhilw6yqsi6m 254 11 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 254 12 depth depth NN work_ayatblpinzaztdzhilw6yqsi6m 254 13 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 254 14 set set VBN work_ayatblpinzaztdzhilw6yqsi6m 254 15 as as IN work_ayatblpinzaztdzhilw6yqsi6m 254 16 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 254 17 to to TO work_ayatblpinzaztdzhilw6yqsi6m 254 18 ensure ensure VB work_ayatblpinzaztdzhilw6yqsi6m 254 19 that that IN work_ayatblpinzaztdzhilw6yqsi6m 254 20 under under RB work_ayatblpinzaztdzhilw6yqsi6m 254 21 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 254 22 fitting fitting JJ work_ayatblpinzaztdzhilw6yqsi6m 254 23 issues issue NNS work_ayatblpinzaztdzhilw6yqsi6m 254 24 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 254 25 avoided avoid VBN work_ayatblpinzaztdzhilw6yqsi6m 254 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 255 1 To to TO work_ayatblpinzaztdzhilw6yqsi6m 255 2 achieve achieve VB work_ayatblpinzaztdzhilw6yqsi6m 255 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 255 4 smoother smoother NN work_ayatblpinzaztdzhilw6yqsi6m 255 5 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 255 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 255 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 255 8 bagging bagging NN work_ayatblpinzaztdzhilw6yqsi6m 255 9 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 255 10 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 255 11 applied apply VBN work_ayatblpinzaztdzhilw6yqsi6m 255 12 to to IN work_ayatblpinzaztdzhilw6yqsi6m 255 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 255 14 Random random JJ work_ayatblpinzaztdzhilw6yqsi6m 255 15 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 255 16 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 255 17 where where WRB work_ayatblpinzaztdzhilw6yqsi6m 255 18 each each DT work_ayatblpinzaztdzhilw6yqsi6m 255 19 of of IN work_ayatblpinzaztdzhilw6yqsi6m 255 20 the the DT work_ayatblpinzaztdzhilw6yqsi6m 255 21 trees tree NNS work_ayatblpinzaztdzhilw6yqsi6m 255 22 executes execute VBZ work_ayatblpinzaztdzhilw6yqsi6m 255 23 in in IN work_ayatblpinzaztdzhilw6yqsi6m 255 24 a a DT work_ayatblpinzaztdzhilw6yqsi6m 255 25 parallel parallel JJ work_ayatblpinzaztdzhilw6yqsi6m 255 26 way way NN work_ayatblpinzaztdzhilw6yqsi6m 255 27 thus thus RB work_ayatblpinzaztdzhilw6yqsi6m 255 28 making make VBG work_ayatblpinzaztdzhilw6yqsi6m 255 29 a a DT work_ayatblpinzaztdzhilw6yqsi6m 255 30 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 255 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 256 1 As as IN work_ayatblpinzaztdzhilw6yqsi6m 256 2 each each DT work_ayatblpinzaztdzhilw6yqsi6m 256 3 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 256 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 256 5 independent independent JJ work_ayatblpinzaztdzhilw6yqsi6m 256 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 256 7 therefore therefore RB work_ayatblpinzaztdzhilw6yqsi6m 256 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 256 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 256 10 whole whole JJ work_ayatblpinzaztdzhilw6yqsi6m 256 11 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 256 12 result result NN work_ayatblpinzaztdzhilw6yqsi6m 256 13 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 256 14 taken take VBN work_ayatblpinzaztdzhilw6yqsi6m 256 15 for for IN work_ayatblpinzaztdzhilw6yqsi6m 256 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 256 17 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 256 18 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 256 19 resulting result VBG work_ayatblpinzaztdzhilw6yqsi6m 256 20 in in IN work_ayatblpinzaztdzhilw6yqsi6m 256 21 a a DT work_ayatblpinzaztdzhilw6yqsi6m 256 22 smoother smoother NN work_ayatblpinzaztdzhilw6yqsi6m 256 23 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 256 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 256 25 To to IN work_ayatblpinzaztdzhilw6yqsi6m 256 26 avoidover- avoidover- NN work_ayatblpinzaztdzhilw6yqsi6m 256 27 fitting fitting JJ work_ayatblpinzaztdzhilw6yqsi6m 256 28 issues issue NNS work_ayatblpinzaztdzhilw6yqsi6m 256 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 256 30 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 256 31 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 256 32 evaluated evaluate VBN work_ayatblpinzaztdzhilw6yqsi6m 256 33 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 256 34 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 256 35 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 256 36 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 256 37 K K NNP work_ayatblpinzaztdzhilw6yqsi6m 256 38 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 256 39 fold fold NN work_ayatblpinzaztdzhilw6yqsi6m 256 40 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 256 41 k k NN work_ayatblpinzaztdzhilw6yqsi6m 256 42 = = SYM work_ayatblpinzaztdzhilw6yqsi6m 256 43 10 10 CD work_ayatblpinzaztdzhilw6yqsi6m 256 44 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 256 45 cross- cross- JJ work_ayatblpinzaztdzhilw6yqsi6m 256 46 validation validation NN work_ayatblpinzaztdzhilw6yqsi6m 256 47 . . . work_ayatblpinzaztdzhilw6yqsi6m 257 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 257 2 first first JJ work_ayatblpinzaztdzhilw6yqsi6m 257 3 fold fold NN work_ayatblpinzaztdzhilw6yqsi6m 257 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 257 5 evaluated evaluate VBN work_ayatblpinzaztdzhilw6yqsi6m 257 6 with with IN work_ayatblpinzaztdzhilw6yqsi6m 257 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 257 8 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 257 9 folds fold NNS work_ayatblpinzaztdzhilw6yqsi6m 257 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 257 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 257 12 second second JJ work_ayatblpinzaztdzhilw6yqsi6m 257 13 time time NN work_ayatblpinzaztdzhilw6yqsi6m 257 14 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 257 15 executes execute VBZ work_ayatblpinzaztdzhilw6yqsi6m 257 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 257 17 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 257 18 takes take VBZ work_ayatblpinzaztdzhilw6yqsi6m 257 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 257 20 first first JJ work_ayatblpinzaztdzhilw6yqsi6m 257 21 and and CC work_ayatblpinzaztdzhilw6yqsi6m 257 22 second second JJ work_ayatblpinzaztdzhilw6yqsi6m 257 23 fold fold VB work_ayatblpinzaztdzhilw6yqsi6m 257 24 to to TO work_ayatblpinzaztdzhilw6yqsi6m 257 25 be be VB work_ayatblpinzaztdzhilw6yqsi6m 257 26 compared compare VBN work_ayatblpinzaztdzhilw6yqsi6m 257 27 with with IN work_ayatblpinzaztdzhilw6yqsi6m 257 28 the the DT work_ayatblpinzaztdzhilw6yqsi6m 257 29 rest rest NN work_ayatblpinzaztdzhilw6yqsi6m 257 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 257 31 this this DT work_ayatblpinzaztdzhilw6yqsi6m 257 32 goes go VBZ work_ayatblpinzaztdzhilw6yqsi6m 257 33 on on RP work_ayatblpinzaztdzhilw6yqsi6m 257 34 until until IN work_ayatblpinzaztdzhilw6yqsi6m 257 35 80 80 CD work_ayatblpinzaztdzhilw6yqsi6m 257 36 % % NN work_ayatblpinzaztdzhilw6yqsi6m 257 37 of of IN work_ayatblpinzaztdzhilw6yqsi6m 257 38 training training NN work_ayatblpinzaztdzhilw6yqsi6m 257 39 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 257 40 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 257 41 compared compare VBN work_ayatblpinzaztdzhilw6yqsi6m 257 42 against against IN work_ayatblpinzaztdzhilw6yqsi6m 257 43 20 20 CD work_ayatblpinzaztdzhilw6yqsi6m 257 44 % % NN work_ayatblpinzaztdzhilw6yqsi6m 257 45 of of IN work_ayatblpinzaztdzhilw6yqsi6m 257 46 the the DT work_ayatblpinzaztdzhilw6yqsi6m 257 47 test test NN work_ayatblpinzaztdzhilw6yqsi6m 257 48 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 257 49 . . . work_ayatblpinzaztdzhilw6yqsi6m 258 1 RESULTS RESULTS NNP work_ayatblpinzaztdzhilw6yqsi6m 258 2 AND and CC work_ayatblpinzaztdzhilw6yqsi6m 258 3 DISCUSSION discussion NN work_ayatblpinzaztdzhilw6yqsi6m 258 4 For for IN work_ayatblpinzaztdzhilw6yqsi6m 258 5 experimentation experimentation NN work_ayatblpinzaztdzhilw6yqsi6m 258 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 258 7 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 258 8 utilize utilize VBP work_ayatblpinzaztdzhilw6yqsi6m 258 9 a a DT work_ayatblpinzaztdzhilw6yqsi6m 258 10 system system NN work_ayatblpinzaztdzhilw6yqsi6m 258 11 with with IN work_ayatblpinzaztdzhilw6yqsi6m 258 12 Intel Intel NNP work_ayatblpinzaztdzhilw6yqsi6m 258 13 core core NN work_ayatblpinzaztdzhilw6yqsi6m 258 14 i7 i7 NN work_ayatblpinzaztdzhilw6yqsi6m 258 15 processor processor NN work_ayatblpinzaztdzhilw6yqsi6m 258 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 258 17 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 258 18 GBs gb NNS work_ayatblpinzaztdzhilw6yqsi6m 258 19 of of IN work_ayatblpinzaztdzhilw6yqsi6m 258 20 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 258 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 258 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 258 23 Ubuntu Ubuntu NNP work_ayatblpinzaztdzhilw6yqsi6m 258 24 12.10 12.10 CD work_ayatblpinzaztdzhilw6yqsi6m 258 25 OEM OEM NNP work_ayatblpinzaztdzhilw6yqsi6m 258 26 as as IN work_ayatblpinzaztdzhilw6yqsi6m 258 27 an an DT work_ayatblpinzaztdzhilw6yqsi6m 258 28 operating operating NN work_ayatblpinzaztdzhilw6yqsi6m 258 29 system system NN work_ayatblpinzaztdzhilw6yqsi6m 258 30 . . . work_ayatblpinzaztdzhilw6yqsi6m 259 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 259 2 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 259 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 259 4 a a DT work_ayatblpinzaztdzhilw6yqsi6m 259 5 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 259 6 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 259 7 tool tool NN work_ayatblpinzaztdzhilw6yqsi6m 259 8 Scikit Scikit NNPS work_ayatblpinzaztdzhilw6yqsi6m 259 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 259 10 learn learn VB work_ayatblpinzaztdzhilw6yqsi6m 259 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 259 12 Pedregosa Pedregosa NNP work_ayatblpinzaztdzhilw6yqsi6m 259 13 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 259 14 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 259 15 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 259 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 259 17 2011 2011 CD work_ayatblpinzaztdzhilw6yqsi6m 259 18 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 259 19 Black Black NNP work_ayatblpinzaztdzhilw6yqsi6m 259 20 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 259 21 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 259 22 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 259 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 259 24 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 259 25 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 259 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 259 27 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 259 28 employed employ VBN work_ayatblpinzaztdzhilw6yqsi6m 259 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 260 1 To to TO work_ayatblpinzaztdzhilw6yqsi6m 260 2 evaluate evaluate VB work_ayatblpinzaztdzhilw6yqsi6m 260 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 260 4 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 260 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 260 6 standard standard JJ work_ayatblpinzaztdzhilw6yqsi6m 260 7 evaluation evaluation NN work_ayatblpinzaztdzhilw6yqsi6m 260 8 measures measure NNS work_ayatblpinzaztdzhilw6yqsi6m 260 9 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 260 10 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 260 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 260 12 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 260 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 260 14 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 260 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 260 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 260 17 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 260 18 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 260 19 Measure Measure NNP work_ayatblpinzaztdzhilw6yqsi6m 260 20 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 260 21 calculated calculate VBN work_ayatblpinzaztdzhilw6yqsi6m 260 22 to to TO work_ayatblpinzaztdzhilw6yqsi6m 260 23 determine determine VB work_ayatblpinzaztdzhilw6yqsi6m 260 24 the the DT work_ayatblpinzaztdzhilw6yqsi6m 260 25 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 260 26 of of IN work_ayatblpinzaztdzhilw6yqsi6m 260 27 each each DT work_ayatblpinzaztdzhilw6yqsi6m 260 28 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 260 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 261 1 Equations equation NNS work_ayatblpinzaztdzhilw6yqsi6m 261 2 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 261 3 1)–(4 1)–(4 NN work_ayatblpinzaztdzhilw6yqsi6m 261 4 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 261 5 provide provide VB work_ayatblpinzaztdzhilw6yqsi6m 261 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 261 7 mathematical mathematical JJ work_ayatblpinzaztdzhilw6yqsi6m 261 8 description description NN work_ayatblpinzaztdzhilw6yqsi6m 261 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 261 10 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 261 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 261 12 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 261 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 261 14 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 261 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 261 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 261 17 f f NN work_ayatblpinzaztdzhilw6yqsi6m 261 18 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 261 19 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 261 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 261 21 respectively respectively RB work_ayatblpinzaztdzhilw6yqsi6m 261 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 262 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 262 2 terms term NNS work_ayatblpinzaztdzhilw6yqsi6m 262 3 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 262 4 in in IN work_ayatblpinzaztdzhilw6yqsi6m 262 5 Eqs Eqs NNP work_ayatblpinzaztdzhilw6yqsi6m 262 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 263 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 263 2 1)–(4 1)–(4 NN work_ayatblpinzaztdzhilw6yqsi6m 263 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 263 4 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 263 5 explained explain VBN work_ayatblpinzaztdzhilw6yqsi6m 263 6 as as IN work_ayatblpinzaztdzhilw6yqsi6m 263 7 follows follow VBZ work_ayatblpinzaztdzhilw6yqsi6m 263 8 : : : work_ayatblpinzaztdzhilw6yqsi6m 263 9 True true JJ work_ayatblpinzaztdzhilw6yqsi6m 263 10 Positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 263 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 263 12 TP tp NN work_ayatblpinzaztdzhilw6yqsi6m 263 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 263 14 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 263 15 shows show VBZ work_ayatblpinzaztdzhilw6yqsi6m 263 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 263 17 number number NN work_ayatblpinzaztdzhilw6yqsi6m 263 18 of of IN work_ayatblpinzaztdzhilw6yqsi6m 263 19 predicted predict VBN work_ayatblpinzaztdzhilw6yqsi6m 263 20 positives positive NNS work_ayatblpinzaztdzhilw6yqsi6m 263 21 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 263 22 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 263 23 correct correct JJ work_ayatblpinzaztdzhilw6yqsi6m 263 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 263 25 while while IN work_ayatblpinzaztdzhilw6yqsi6m 263 26 the the DT work_ayatblpinzaztdzhilw6yqsi6m 263 27 False False NNP work_ayatblpinzaztdzhilw6yqsi6m 263 28 Positive Positive NNP work_ayatblpinzaztdzhilw6yqsi6m 263 29 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 263 30 FP FP NNP work_ayatblpinzaztdzhilw6yqsi6m 263 31 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 263 32 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 263 33 refers refer VBZ work_ayatblpinzaztdzhilw6yqsi6m 263 34 to to IN work_ayatblpinzaztdzhilw6yqsi6m 263 35 the the DT work_ayatblpinzaztdzhilw6yqsi6m 263 36 number number NN work_ayatblpinzaztdzhilw6yqsi6m 263 37 of of IN work_ayatblpinzaztdzhilw6yqsi6m 263 38 predicted predict VBN work_ayatblpinzaztdzhilw6yqsi6m 263 39 positives positive NNS work_ayatblpinzaztdzhilw6yqsi6m 263 40 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 263 41 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 263 42 incorrect incorrect JJ work_ayatblpinzaztdzhilw6yqsi6m 263 43 . . . work_ayatblpinzaztdzhilw6yqsi6m 264 1 Similarly similarly RB work_ayatblpinzaztdzhilw6yqsi6m 264 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 264 3 True True NNP work_ayatblpinzaztdzhilw6yqsi6m 264 4 Negative Negative NNP work_ayatblpinzaztdzhilw6yqsi6m 264 5 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 264 6 TN TN NNP work_ayatblpinzaztdzhilw6yqsi6m 264 7 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 264 8 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 264 9 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 264 10 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 264 11 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 264 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 265 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 265 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 265 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 265 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 265 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 265 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 265 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 266 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 266 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 266 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 266 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 266 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 266 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 266 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 266 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 266 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 266 10 14/24 14/24 CD work_ayatblpinzaztdzhilw6yqsi6m 266 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 266 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 266 13 shows show VBZ work_ayatblpinzaztdzhilw6yqsi6m 266 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 266 15 number number NN work_ayatblpinzaztdzhilw6yqsi6m 266 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 266 17 predicted predict VBN work_ayatblpinzaztdzhilw6yqsi6m 266 18 negatives negative NNS work_ayatblpinzaztdzhilw6yqsi6m 266 19 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 266 20 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 266 21 correct correct JJ work_ayatblpinzaztdzhilw6yqsi6m 266 22 while while IN work_ayatblpinzaztdzhilw6yqsi6m 266 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 266 24 False False NNP work_ayatblpinzaztdzhilw6yqsi6m 266 25 Negative Negative NNP work_ayatblpinzaztdzhilw6yqsi6m 266 26 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 266 27 FN FN NNP work_ayatblpinzaztdzhilw6yqsi6m 266 28 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 266 29 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 266 30 refers refer VBZ work_ayatblpinzaztdzhilw6yqsi6m 266 31 to to IN work_ayatblpinzaztdzhilw6yqsi6m 266 32 the the DT work_ayatblpinzaztdzhilw6yqsi6m 266 33 number number NN work_ayatblpinzaztdzhilw6yqsi6m 266 34 of of IN work_ayatblpinzaztdzhilw6yqsi6m 266 35 predicted predict VBN work_ayatblpinzaztdzhilw6yqsi6m 266 36 negatives negative NNS work_ayatblpinzaztdzhilw6yqsi6m 266 37 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 266 38 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 266 39 incorrect incorrect JJ work_ayatblpinzaztdzhilw6yqsi6m 266 40 . . . work_ayatblpinzaztdzhilw6yqsi6m 267 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 267 2 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 267 3 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 267 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 267 5 sensitivity sensitivity NN work_ayatblpinzaztdzhilw6yqsi6m 267 6 for for IN work_ayatblpinzaztdzhilw6yqsi6m 267 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 267 8 most most RBS work_ayatblpinzaztdzhilw6yqsi6m 267 9 relevant relevant JJ work_ayatblpinzaztdzhilw6yqsi6m 267 10 result result NN work_ayatblpinzaztdzhilw6yqsi6m 267 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 268 1 F f NN work_ayatblpinzaztdzhilw6yqsi6m 268 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 268 3 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 268 4 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 268 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 268 6 value value NN work_ayatblpinzaztdzhilw6yqsi6m 268 7 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 268 8 estimates estimate VBZ work_ayatblpinzaztdzhilw6yqsi6m 268 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 268 10 entire entire JJ work_ayatblpinzaztdzhilw6yqsi6m 268 11 system system NN work_ayatblpinzaztdzhilw6yqsi6m 268 12 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 268 13 by by IN work_ayatblpinzaztdzhilw6yqsi6m 268 14 calculating calculate VBG work_ayatblpinzaztdzhilw6yqsi6m 268 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 268 16 harmonic harmonic JJ work_ayatblpinzaztdzhilw6yqsi6m 268 17 mean mean NN work_ayatblpinzaztdzhilw6yqsi6m 268 18 of of IN work_ayatblpinzaztdzhilw6yqsi6m 268 19 precision precision NNP work_ayatblpinzaztdzhilw6yqsi6m 268 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 268 21 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 268 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 269 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 269 2 maximum maximum JJ work_ayatblpinzaztdzhilw6yqsi6m 269 3 value value NN work_ayatblpinzaztdzhilw6yqsi6m 269 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 269 5 1.000 1.000 CD work_ayatblpinzaztdzhilw6yqsi6m 269 6 for for IN work_ayatblpinzaztdzhilw6yqsi6m 269 7 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 269 8 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 269 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 269 10 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 269 11 indicates indicate VBZ work_ayatblpinzaztdzhilw6yqsi6m 269 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 269 13 best good JJS work_ayatblpinzaztdzhilw6yqsi6m 269 14 result result NN work_ayatblpinzaztdzhilw6yqsi6m 269 15 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 269 16 Narudin Narudin NNP work_ayatblpinzaztdzhilw6yqsi6m 269 17 et et FW work_ayatblpinzaztdzhilw6yqsi6m 269 18 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 269 19 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 269 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 269 21 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 269 22 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 269 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 270 1 Accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 270 2 ¼ ¼ JJ work_ayatblpinzaztdzhilw6yqsi6m 270 3 TP TP NNP work_ayatblpinzaztdzhilw6yqsi6m 270 4 þ þ NN work_ayatblpinzaztdzhilw6yqsi6m 270 5 TN TN NNP work_ayatblpinzaztdzhilw6yqsi6m 270 6 TP TP NNP work_ayatblpinzaztdzhilw6yqsi6m 270 7 þ þ NNP work_ayatblpinzaztdzhilw6yqsi6m 270 8 TN TN NNP work_ayatblpinzaztdzhilw6yqsi6m 270 9 þ þ NN work_ayatblpinzaztdzhilw6yqsi6m 270 10 FP FP NNP work_ayatblpinzaztdzhilw6yqsi6m 270 11 þ þ NN work_ayatblpinzaztdzhilw6yqsi6m 270 12 FN fn NN work_ayatblpinzaztdzhilw6yqsi6m 270 13 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 270 14 1 1 LS work_ayatblpinzaztdzhilw6yqsi6m 270 15 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 270 16 Precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 270 17 denotes denote VBZ work_ayatblpinzaztdzhilw6yqsi6m 270 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 270 19 proportion proportion NN work_ayatblpinzaztdzhilw6yqsi6m 270 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 270 21 Predicted predict VBN work_ayatblpinzaztdzhilw6yqsi6m 270 22 Positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 270 23 cases case NNS work_ayatblpinzaztdzhilw6yqsi6m 270 24 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 270 25 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 270 26 correctly correctly RB work_ayatblpinzaztdzhilw6yqsi6m 270 27 Real real JJ work_ayatblpinzaztdzhilw6yqsi6m 270 28 Positives Positives NNPS work_ayatblpinzaztdzhilw6yqsi6m 270 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 271 1 Precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 271 2 ¼ ¼ NN work_ayatblpinzaztdzhilw6yqsi6m 271 3 TP TP NNP work_ayatblpinzaztdzhilw6yqsi6m 271 4 TP TP NNP work_ayatblpinzaztdzhilw6yqsi6m 271 5 þ þ NNP work_ayatblpinzaztdzhilw6yqsi6m 271 6 FP FP NNP work_ayatblpinzaztdzhilw6yqsi6m 271 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 271 8 2 2 LS work_ayatblpinzaztdzhilw6yqsi6m 271 9 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 271 10 The the DT work_ayatblpinzaztdzhilw6yqsi6m 271 11 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 271 12 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 271 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 271 14 proportion proportion NN work_ayatblpinzaztdzhilw6yqsi6m 271 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 271 16 Real real JJ work_ayatblpinzaztdzhilw6yqsi6m 271 17 Positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 271 18 cases case NNS work_ayatblpinzaztdzhilw6yqsi6m 271 19 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 271 20 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 271 21 Predicted predict VBN work_ayatblpinzaztdzhilw6yqsi6m 271 22 Positive Positive NNP work_ayatblpinzaztdzhilw6yqsi6m 271 23 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 271 24 ¼ ¼ JJ work_ayatblpinzaztdzhilw6yqsi6m 271 25 TP TP NNP work_ayatblpinzaztdzhilw6yqsi6m 271 26 TP TP NNP work_ayatblpinzaztdzhilw6yqsi6m 271 27 þ þ NNP work_ayatblpinzaztdzhilw6yqsi6m 271 28 FN FN NNP work_ayatblpinzaztdzhilw6yqsi6m 271 29 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 271 30 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 271 31 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 271 32 F‐Measure f‐measure NN work_ayatblpinzaztdzhilw6yqsi6m 271 33 ¼ ¼ IN work_ayatblpinzaztdzhilw6yqsi6m 271 34 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 271 35 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 271 36 ðPrecision ðPrecision NNP work_ayatblpinzaztdzhilw6yqsi6m 271 37 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 271 38 RecallÞðPrecision RecallÞðPrecision NNP work_ayatblpinzaztdzhilw6yqsi6m 271 39 þ þ NNP work_ayatblpinzaztdzhilw6yqsi6m 271 40 RecallÞ RecallÞ NNP work_ayatblpinzaztdzhilw6yqsi6m 271 41 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 271 42 4 4 LS work_ayatblpinzaztdzhilw6yqsi6m 271 43 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 271 44 Receiver receiver VB work_ayatblpinzaztdzhilw6yqsi6m 271 45 Operating operating NN work_ayatblpinzaztdzhilw6yqsi6m 271 46 Characteristic characteristic NN work_ayatblpinzaztdzhilw6yqsi6m 271 47 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 271 48 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 271 49 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 271 50 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 271 51 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 271 52 Metz Metz NNP work_ayatblpinzaztdzhilw6yqsi6m 271 53 , , , work_ayatblpinzaztdzhilw6yqsi6m 271 54 1978 1978 CD work_ayatblpinzaztdzhilw6yqsi6m 271 55 ; ; : work_ayatblpinzaztdzhilw6yqsi6m 271 56 Dion Dion NNP work_ayatblpinzaztdzhilw6yqsi6m 271 57 & & CC work_ayatblpinzaztdzhilw6yqsi6m 271 58 Brohi Brohi NNP work_ayatblpinzaztdzhilw6yqsi6m 271 59 , , , work_ayatblpinzaztdzhilw6yqsi6m 271 60 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 271 61 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 271 62 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 271 63 extensively extensively RB work_ayatblpinzaztdzhilw6yqsi6m 271 64 being be VBG work_ayatblpinzaztdzhilw6yqsi6m 271 65 applied apply VBN work_ayatblpinzaztdzhilw6yqsi6m 271 66 in in IN work_ayatblpinzaztdzhilw6yqsi6m 271 67 significant significant JJ work_ayatblpinzaztdzhilw6yqsi6m 271 68 researches research NNS work_ayatblpinzaztdzhilw6yqsi6m 271 69 to to TO work_ayatblpinzaztdzhilw6yqsi6m 271 70 measure measure VB work_ayatblpinzaztdzhilw6yqsi6m 271 71 the the DT work_ayatblpinzaztdzhilw6yqsi6m 271 72 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 271 73 of of IN work_ayatblpinzaztdzhilw6yqsi6m 271 74 the the DT work_ayatblpinzaztdzhilw6yqsi6m 271 75 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 271 76 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 271 77 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 271 78 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 271 79 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 271 80 being be VBG work_ayatblpinzaztdzhilw6yqsi6m 271 81 trained train VBN work_ayatblpinzaztdzhilw6yqsi6m 271 82 to to TO work_ayatblpinzaztdzhilw6yqsi6m 271 83 achieve achieve VB work_ayatblpinzaztdzhilw6yqsi6m 271 84 actual actual JJ work_ayatblpinzaztdzhilw6yqsi6m 271 85 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 271 86 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 271 87 Bradley Bradley NNP work_ayatblpinzaztdzhilw6yqsi6m 271 88 , , , work_ayatblpinzaztdzhilw6yqsi6m 271 89 1997 1997 CD work_ayatblpinzaztdzhilw6yqsi6m 271 90 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 271 91 . . . work_ayatblpinzaztdzhilw6yqsi6m 272 1 Furthermore furthermore RB work_ayatblpinzaztdzhilw6yqsi6m 272 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 272 3 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 272 4 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 272 5 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 272 6 applied apply VBN work_ayatblpinzaztdzhilw6yqsi6m 272 7 in in IN work_ayatblpinzaztdzhilw6yqsi6m 272 8 numerous numerous JJ work_ayatblpinzaztdzhilw6yqsi6m 272 9 systematic systematic JJ work_ayatblpinzaztdzhilw6yqsi6m 272 10 approaches approach NNS work_ayatblpinzaztdzhilw6yqsi6m 272 11 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 272 12 merge merge VBP work_ayatblpinzaztdzhilw6yqsi6m 272 13 multiple multiple JJ work_ayatblpinzaztdzhilw6yqsi6m 272 14 clues clue NNS work_ayatblpinzaztdzhilw6yqsi6m 272 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 272 16 test test NN work_ayatblpinzaztdzhilw6yqsi6m 272 17 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 272 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 272 19 etc etc FW work_ayatblpinzaztdzhilw6yqsi6m 272 20 . . FW work_ayatblpinzaztdzhilw6yqsi6m 272 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 272 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 272 23 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 272 24 plotted plot VBN work_ayatblpinzaztdzhilw6yqsi6m 272 25 and and CC work_ayatblpinzaztdzhilw6yqsi6m 272 26 evaluated evaluate VBN work_ayatblpinzaztdzhilw6yqsi6m 272 27 to to TO work_ayatblpinzaztdzhilw6yqsi6m 272 28 characterize characterize VB work_ayatblpinzaztdzhilw6yqsi6m 272 29 a a DT work_ayatblpinzaztdzhilw6yqsi6m 272 30 qualitative qualitative JJ work_ayatblpinzaztdzhilw6yqsi6m 272 31 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 272 32 of of IN work_ayatblpinzaztdzhilw6yqsi6m 272 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 272 34 particular particular JJ work_ayatblpinzaztdzhilw6yqsi6m 272 35 . . . work_ayatblpinzaztdzhilw6yqsi6m 273 1 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 273 2 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 273 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 273 4 plot plot NN work_ayatblpinzaztdzhilw6yqsi6m 273 5 wherein wherein WRB work_ayatblpinzaztdzhilw6yqsi6m 273 6 Y y NN work_ayatblpinzaztdzhilw6yqsi6m 273 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 273 8 axis axis NNP work_ayatblpinzaztdzhilw6yqsi6m 273 9 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 273 10 reserved reserve VBN work_ayatblpinzaztdzhilw6yqsi6m 273 11 for for IN work_ayatblpinzaztdzhilw6yqsi6m 273 12 True true JJ work_ayatblpinzaztdzhilw6yqsi6m 273 13 Positive Positive NNP work_ayatblpinzaztdzhilw6yqsi6m 273 14 Rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 273 15 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 273 16 TPR tpr NN work_ayatblpinzaztdzhilw6yqsi6m 273 17 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 273 18 and and CC work_ayatblpinzaztdzhilw6yqsi6m 273 19 X X NNS work_ayatblpinzaztdzhilw6yqsi6m 273 20 - - NN work_ayatblpinzaztdzhilw6yqsi6m 273 21 axis axis NN work_ayatblpinzaztdzhilw6yqsi6m 273 22 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 273 23 reserved reserve VBN work_ayatblpinzaztdzhilw6yqsi6m 273 24 for for IN work_ayatblpinzaztdzhilw6yqsi6m 273 25 False false JJ work_ayatblpinzaztdzhilw6yqsi6m 273 26 Positive Positive NNP work_ayatblpinzaztdzhilw6yqsi6m 273 27 Rate Rate NNP work_ayatblpinzaztdzhilw6yqsi6m 273 28 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 273 29 FPR FPR NNP work_ayatblpinzaztdzhilw6yqsi6m 273 30 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 273 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 274 1 For for IN work_ayatblpinzaztdzhilw6yqsi6m 274 2 all all DT work_ayatblpinzaztdzhilw6yqsi6m 274 3 possible possible JJ work_ayatblpinzaztdzhilw6yqsi6m 274 4 classifications classification NNS work_ayatblpinzaztdzhilw6yqsi6m 274 5 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 274 6 as as IN work_ayatblpinzaztdzhilw6yqsi6m 274 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 274 8 output output NN work_ayatblpinzaztdzhilw6yqsi6m 274 9 class class NN work_ayatblpinzaztdzhilw6yqsi6m 274 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 274 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 274 12 TPR TPR NNP work_ayatblpinzaztdzhilw6yqsi6m 274 13 rate rate NN work_ayatblpinzaztdzhilw6yqsi6m 274 14 depends depend VBZ work_ayatblpinzaztdzhilw6yqsi6m 274 15 on on IN work_ayatblpinzaztdzhilw6yqsi6m 274 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 274 17 set set NN work_ayatblpinzaztdzhilw6yqsi6m 274 18 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 274 19 up up RP work_ayatblpinzaztdzhilw6yqsi6m 274 20 where where WRB work_ayatblpinzaztdzhilw6yqsi6m 274 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 274 22 real real JJ work_ayatblpinzaztdzhilw6yqsi6m 274 23 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 274 24 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 274 25 considered consider VBN work_ayatblpinzaztdzhilw6yqsi6m 274 26 to to TO work_ayatblpinzaztdzhilw6yqsi6m 274 27 be be VB work_ayatblpinzaztdzhilw6yqsi6m 274 28 as as RB work_ayatblpinzaztdzhilw6yqsi6m 274 29 positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 274 30 and and CC work_ayatblpinzaztdzhilw6yqsi6m 274 31 the the DT work_ayatblpinzaztdzhilw6yqsi6m 274 32 number number NN work_ayatblpinzaztdzhilw6yqsi6m 274 33 of of IN work_ayatblpinzaztdzhilw6yqsi6m 274 34 times time NNS work_ayatblpinzaztdzhilw6yqsi6m 274 35 the the DT work_ayatblpinzaztdzhilw6yqsi6m 274 36 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 274 37 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 274 38 predicted predict VBN work_ayatblpinzaztdzhilw6yqsi6m 274 39 the the DT work_ayatblpinzaztdzhilw6yqsi6m 274 40 result result NN work_ayatblpinzaztdzhilw6yqsi6m 274 41 to to TO work_ayatblpinzaztdzhilw6yqsi6m 274 42 be be VB work_ayatblpinzaztdzhilw6yqsi6m 274 43 as as RB work_ayatblpinzaztdzhilw6yqsi6m 274 44 positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 274 45 . . . work_ayatblpinzaztdzhilw6yqsi6m 275 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 275 2 FPR FPR NNP work_ayatblpinzaztdzhilw6yqsi6m 275 3 can can MD work_ayatblpinzaztdzhilw6yqsi6m 275 4 be be VB work_ayatblpinzaztdzhilw6yqsi6m 275 5 defined define VBN work_ayatblpinzaztdzhilw6yqsi6m 275 6 as as IN work_ayatblpinzaztdzhilw6yqsi6m 275 7 how how WRB work_ayatblpinzaztdzhilw6yqsi6m 275 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 275 9 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 275 10 incorrectly incorrectly RB work_ayatblpinzaztdzhilw6yqsi6m 275 11 labeled label VBD work_ayatblpinzaztdzhilw6yqsi6m 275 12 positive positive JJ work_ayatblpinzaztdzhilw6yqsi6m 275 13 to to IN work_ayatblpinzaztdzhilw6yqsi6m 275 14 those those DT work_ayatblpinzaztdzhilw6yqsi6m 275 15 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 275 16 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 275 17 classified classify VBN work_ayatblpinzaztdzhilw6yqsi6m 275 18 to to TO work_ayatblpinzaztdzhilw6yqsi6m 275 19 be be VB work_ayatblpinzaztdzhilw6yqsi6m 275 20 negative negative JJ work_ayatblpinzaztdzhilw6yqsi6m 275 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 276 1 Together together RB work_ayatblpinzaztdzhilw6yqsi6m 276 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 276 3 TPR TPR NNP work_ayatblpinzaztdzhilw6yqsi6m 276 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 276 5 FPR FPR NNP work_ayatblpinzaztdzhilw6yqsi6m 276 6 values value NNS work_ayatblpinzaztdzhilw6yqsi6m 276 7 lie lie VBP work_ayatblpinzaztdzhilw6yqsi6m 276 8 in in IN work_ayatblpinzaztdzhilw6yqsi6m 276 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 276 10 between between IN work_ayatblpinzaztdzhilw6yqsi6m 276 11 0 0 CD work_ayatblpinzaztdzhilw6yqsi6m 276 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 276 13 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 276 14 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 276 15 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 276 16 indicating indicate VBG work_ayatblpinzaztdzhilw6yqsi6m 276 17 an an DT work_ayatblpinzaztdzhilw6yqsi6m 276 18 accurate accurate JJ work_ayatblpinzaztdzhilw6yqsi6m 276 19 prediction prediction NN work_ayatblpinzaztdzhilw6yqsi6m 276 20 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 276 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 277 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 277 2 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 277 3 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 277 4 on on IN work_ayatblpinzaztdzhilw6yqsi6m 277 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 277 6 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 277 7 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 277 8 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 277 9 can can MD work_ayatblpinzaztdzhilw6yqsi6m 277 10 be be VB work_ayatblpinzaztdzhilw6yqsi6m 277 11 seen see VBN work_ayatblpinzaztdzhilw6yqsi6m 277 12 in in IN work_ayatblpinzaztdzhilw6yqsi6m 277 13 Fig Fig NNP work_ayatblpinzaztdzhilw6yqsi6m 277 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 278 1 4 4 LS work_ayatblpinzaztdzhilw6yqsi6m 278 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 279 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 279 2 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 279 3 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 279 4 for for IN work_ayatblpinzaztdzhilw6yqsi6m 279 5 both both DT work_ayatblpinzaztdzhilw6yqsi6m 279 6 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 279 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 279 8 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 279 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 279 10 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 279 11 as as IN work_ayatblpinzaztdzhilw6yqsi6m 279 12 class class NN work_ayatblpinzaztdzhilw6yqsi6m 279 13 “ " `` work_ayatblpinzaztdzhilw6yqsi6m 279 14 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 279 15 ” " '' work_ayatblpinzaztdzhilw6yqsi6m 279 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 279 17 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 279 18 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 279 19 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 279 20 as as IN work_ayatblpinzaztdzhilw6yqsi6m 279 21 class class NN work_ayatblpinzaztdzhilw6yqsi6m 279 22 “ " `` work_ayatblpinzaztdzhilw6yqsi6m 279 23 0 0 NNP work_ayatblpinzaztdzhilw6yqsi6m 279 24 ” " '' work_ayatblpinzaztdzhilw6yqsi6m 279 25 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 279 26 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 279 27 the the DT work_ayatblpinzaztdzhilw6yqsi6m 279 28 same same JJ work_ayatblpinzaztdzhilw6yqsi6m 279 29 having have VBG work_ayatblpinzaztdzhilw6yqsi6m 279 30 value value NN work_ayatblpinzaztdzhilw6yqsi6m 279 31 of of IN work_ayatblpinzaztdzhilw6yqsi6m 279 32 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 279 33 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 279 34 signifies signify VBZ work_ayatblpinzaztdzhilw6yqsi6m 279 35 the the DT work_ayatblpinzaztdzhilw6yqsi6m 279 36 excellent excellent JJ work_ayatblpinzaztdzhilw6yqsi6m 279 37 prediction prediction NN work_ayatblpinzaztdzhilw6yqsi6m 279 38 . . . work_ayatblpinzaztdzhilw6yqsi6m 280 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 280 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 280 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 280 4 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 280 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 280 6 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 280 7 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 280 8 for for IN work_ayatblpinzaztdzhilw6yqsi6m 280 9 class class NN work_ayatblpinzaztdzhilw6yqsi6m 280 10 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 280 11 that that RB work_ayatblpinzaztdzhilw6yqsi6m 280 12 is is RB work_ayatblpinzaztdzhilw6yqsi6m 280 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 280 14 for for IN work_ayatblpinzaztdzhilw6yqsi6m 280 15 Non non JJ work_ayatblpinzaztdzhilw6yqsi6m 280 16 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 280 17 Ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 280 18 shows show VBZ work_ayatblpinzaztdzhilw6yqsi6m 280 19 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 280 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 280 21 0.89 0.89 CD work_ayatblpinzaztdzhilw6yqsi6m 280 22 or or CC work_ayatblpinzaztdzhilw6yqsi6m 280 23 89 89 CD work_ayatblpinzaztdzhilw6yqsi6m 280 24 % % NN work_ayatblpinzaztdzhilw6yqsi6m 280 25 whereas wherea NNS work_ayatblpinzaztdzhilw6yqsi6m 280 26 for for IN work_ayatblpinzaztdzhilw6yqsi6m 280 27 class class NN work_ayatblpinzaztdzhilw6yqsi6m 280 28 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 280 29 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 280 30 is is RB work_ayatblpinzaztdzhilw6yqsi6m 280 31 , , , work_ayatblpinzaztdzhilw6yqsi6m 280 32 ransomware ransomware VB work_ayatblpinzaztdzhilw6yqsi6m 280 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 280 34 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 280 35 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 280 36 0.93 0.93 CD work_ayatblpinzaztdzhilw6yqsi6m 280 37 . . . work_ayatblpinzaztdzhilw6yqsi6m 281 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 281 2 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 281 3 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 281 4 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 281 5 score score NN work_ayatblpinzaztdzhilw6yqsi6m 281 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 281 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 281 8 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 281 9 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 281 10 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 281 11 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 281 12 as as IN work_ayatblpinzaztdzhilw6yqsi6m 281 13 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 281 14 in in IN work_ayatblpinzaztdzhilw6yqsi6m 281 15 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 281 16 4 4 CD work_ayatblpinzaztdzhilw6yqsi6m 281 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 282 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 282 2 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 282 3 obtained obtain VBD work_ayatblpinzaztdzhilw6yqsi6m 282 4 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 282 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 282 6 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 282 7 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 282 8 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 282 9 for for IN work_ayatblpinzaztdzhilw6yqsi6m 282 10 two two CD work_ayatblpinzaztdzhilw6yqsi6m 282 11 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 282 12 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 282 13 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 282 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 282 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 282 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 282 17 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 282 18 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 282 19 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 282 20 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 282 21 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 282 22 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 282 23 in in IN work_ayatblpinzaztdzhilw6yqsi6m 282 24 Fig Fig NNP work_ayatblpinzaztdzhilw6yqsi6m 282 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 283 1 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 283 2 and and CC work_ayatblpinzaztdzhilw6yqsi6m 283 3 F f NN work_ayatblpinzaztdzhilw6yqsi6m 283 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 283 5 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 283 6 score score NN work_ayatblpinzaztdzhilw6yqsi6m 283 7 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 283 8 illustrated illustrate VBN work_ayatblpinzaztdzhilw6yqsi6m 283 9 in in IN work_ayatblpinzaztdzhilw6yqsi6m 283 10 Table Table NNP work_ayatblpinzaztdzhilw6yqsi6m 283 11 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 283 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 284 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 284 2 higher high JJR work_ayatblpinzaztdzhilw6yqsi6m 284 3 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 284 4 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 284 5 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 284 6 evident evident JJ work_ayatblpinzaztdzhilw6yqsi6m 284 7 from from IN work_ayatblpinzaztdzhilw6yqsi6m 284 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 284 9 similar similar JJ work_ayatblpinzaztdzhilw6yqsi6m 284 10 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 284 11 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 284 12 value value NN work_ayatblpinzaztdzhilw6yqsi6m 284 13 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 284 14 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 284 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 284 16 0.99 0.99 CD work_ayatblpinzaztdzhilw6yqsi6m 284 17 for for IN work_ayatblpinzaztdzhilw6yqsi6m 284 18 both both DT work_ayatblpinzaztdzhilw6yqsi6m 284 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 284 20 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 284 21 and and CC work_ayatblpinzaztdzhilw6yqsi6m 284 22 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 284 23 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 284 24 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 284 25 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 284 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 285 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 285 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 285 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 285 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 286 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 286 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 286 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 286 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 286 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 286 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 286 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 287 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 287 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 287 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 287 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 287 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 287 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 287 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 287 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 287 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 287 10 15/24 15/24 CD work_ayatblpinzaztdzhilw6yqsi6m 287 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 287 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 287 13 Figure Figure NNP work_ayatblpinzaztdzhilw6yqsi6m 287 14 4 4 CD work_ayatblpinzaztdzhilw6yqsi6m 287 15 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 287 16 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 287 17 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 287 18 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 287 19 metrics metric NNS work_ayatblpinzaztdzhilw6yqsi6m 287 20 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 287 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 287 22 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 287 23 A a NN work_ayatblpinzaztdzhilw6yqsi6m 287 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 287 25 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 287 26 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 287 27 for for IN work_ayatblpinzaztdzhilw6yqsi6m 287 28 the the DT work_ayatblpinzaztdzhilw6yqsi6m 287 29 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 287 30 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 287 31 and and CC work_ayatblpinzaztdzhilw6yqsi6m 287 32 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 287 33 , , , work_ayatblpinzaztdzhilw6yqsi6m 287 34 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 287 35 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 287 36 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 287 37 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 287 38 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 287 39 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 287 40 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 287 41 for for IN work_ayatblpinzaztdzhilw6yqsi6m 287 42 the the DT work_ayatblpinzaztdzhilw6yqsi6m 287 43 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 287 44 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 287 45 and and CC work_ayatblpinzaztdzhilw6yqsi6m 287 46 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 287 47 . . . work_ayatblpinzaztdzhilw6yqsi6m 288 1 Full full JJ work_ayatblpinzaztdzhilw6yqsi6m 288 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 288 3 size size NN work_ayatblpinzaztdzhilw6yqsi6m 288 4 DOI doi NN work_ayatblpinzaztdzhilw6yqsi6m 288 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 288 6 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 288 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 288 8 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 288 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 288 10 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 288 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 288 12 fig-4 fig-4 NNP work_ayatblpinzaztdzhilw6yqsi6m 288 13 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 288 14 4 4 CD work_ayatblpinzaztdzhilw6yqsi6m 288 15 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 288 16 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 288 17 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 288 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 288 19 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 288 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 288 21 F f NN work_ayatblpinzaztdzhilw6yqsi6m 288 22 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 288 23 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 288 24 score score NN work_ayatblpinzaztdzhilw6yqsi6m 288 25 for for IN work_ayatblpinzaztdzhilw6yqsi6m 288 26 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 288 27 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 288 28 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 288 29 0 0 CD work_ayatblpinzaztdzhilw6yqsi6m 288 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 288 31 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 288 32 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 288 33 . . . work_ayatblpinzaztdzhilw6yqsi6m 289 1 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 289 2 class class NN work_ayatblpinzaztdzhilw6yqsi6m 289 3 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 289 4 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 289 5 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 289 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 289 7 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 289 8 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 289 9 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 289 10 class class NN work_ayatblpinzaztdzhilw6yqsi6m 289 11 label label NN work_ayatblpinzaztdzhilw6yqsi6m 289 12 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 289 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 289 14 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 289 15 0.88 0.88 CD work_ayatblpinzaztdzhilw6yqsi6m 289 16 0.93 0.93 CD work_ayatblpinzaztdzhilw6yqsi6m 289 17 Non Non NNS work_ayatblpinzaztdzhilw6yqsi6m 289 18 - - NN work_ayatblpinzaztdzhilw6yqsi6m 289 19 Ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 289 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 289 21 class class NN work_ayatblpinzaztdzhilw6yqsi6m 289 22 label label NN work_ayatblpinzaztdzhilw6yqsi6m 289 23 0 0 CD work_ayatblpinzaztdzhilw6yqsi6m 289 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 289 25 0.89 0.89 CD work_ayatblpinzaztdzhilw6yqsi6m 289 26 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 289 27 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 289 28 Figure figure NN work_ayatblpinzaztdzhilw6yqsi6m 289 29 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 289 30 Random random JJ work_ayatblpinzaztdzhilw6yqsi6m 289 31 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 289 32 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 289 33 metrics metric NNS work_ayatblpinzaztdzhilw6yqsi6m 289 34 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 289 35 , , , work_ayatblpinzaztdzhilw6yqsi6m 289 36 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 289 37 A a NN work_ayatblpinzaztdzhilw6yqsi6m 289 38 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 289 39 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 289 40 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 289 41 for for IN work_ayatblpinzaztdzhilw6yqsi6m 289 42 the the DT work_ayatblpinzaztdzhilw6yqsi6m 289 43 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 289 44 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 289 45 and and CC work_ayatblpinzaztdzhilw6yqsi6m 289 46 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 289 47 , , , work_ayatblpinzaztdzhilw6yqsi6m 289 48 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 289 49 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 289 50 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 289 51 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 289 52 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 289 53 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 289 54 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 289 55 for for IN work_ayatblpinzaztdzhilw6yqsi6m 289 56 the the DT work_ayatblpinzaztdzhilw6yqsi6m 289 57 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 289 58 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 289 59 and and CC work_ayatblpinzaztdzhilw6yqsi6m 289 60 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 289 61 . . . work_ayatblpinzaztdzhilw6yqsi6m 290 1 Full full JJ work_ayatblpinzaztdzhilw6yqsi6m 290 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 290 3 size size NN work_ayatblpinzaztdzhilw6yqsi6m 290 4 DOI doi NN work_ayatblpinzaztdzhilw6yqsi6m 290 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 290 6 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 290 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 290 8 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 290 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 290 10 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 290 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 290 12 fig-5 fig-5 NNP work_ayatblpinzaztdzhilw6yqsi6m 290 13 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 290 14 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 290 15 Random random JJ work_ayatblpinzaztdzhilw6yqsi6m 290 16 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 290 17 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 290 18 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 290 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 290 20 F f NN work_ayatblpinzaztdzhilw6yqsi6m 290 21 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 290 22 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 290 23 score score NN work_ayatblpinzaztdzhilw6yqsi6m 290 24 against against IN work_ayatblpinzaztdzhilw6yqsi6m 290 25 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 290 26 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 290 27 and and CC work_ayatblpinzaztdzhilw6yqsi6m 290 28 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 290 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 291 1 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 291 2 class class NN work_ayatblpinzaztdzhilw6yqsi6m 291 3 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 291 4 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 291 5 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 291 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 291 7 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 291 8 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 291 9 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 291 10 class class NN work_ayatblpinzaztdzhilw6yqsi6m 291 11 label label NN work_ayatblpinzaztdzhilw6yqsi6m 291 12 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 291 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 291 14 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 291 15 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 291 16 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 291 17 Non Non NNP work_ayatblpinzaztdzhilw6yqsi6m 291 18 - - NNP work_ayatblpinzaztdzhilw6yqsi6m 291 19 Ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 291 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 291 21 class class NN work_ayatblpinzaztdzhilw6yqsi6m 291 22 label label NN work_ayatblpinzaztdzhilw6yqsi6m 291 23 0 0 CD work_ayatblpinzaztdzhilw6yqsi6m 291 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 291 25 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 291 26 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 291 27 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 291 28 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 291 29 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 291 30 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 291 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 292 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 292 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 292 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 292 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 292 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 292 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 292 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 293 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 293 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 293 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 293 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 293 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 293 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 293 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 293 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 293 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 293 10 16/24 16/24 CD work_ayatblpinzaztdzhilw6yqsi6m 293 11 http://dx.doi.org/10.7717/peerj-cs.361/fig-4 http://dx.doi.org/10.7717/peerj-cs.361/fig-4 CD work_ayatblpinzaztdzhilw6yqsi6m 293 12 http://dx.doi.org/10.7717/peerj-cs.361/fig-5 http://dx.doi.org/10.7717/peerj-cs.361/fig-5 NNP work_ayatblpinzaztdzhilw6yqsi6m 293 13 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 293 14 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_ayatblpinzaztdzhilw6yqsi6m 293 15 The the DT work_ayatblpinzaztdzhilw6yqsi6m 293 16 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 293 17 depicting depict VBG work_ayatblpinzaztdzhilw6yqsi6m 293 18 the the DT work_ayatblpinzaztdzhilw6yqsi6m 293 19 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 293 20 of of IN work_ayatblpinzaztdzhilw6yqsi6m 293 21 gradient gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 293 22 boosting boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 293 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 293 24 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 293 25 in in IN work_ayatblpinzaztdzhilw6yqsi6m 293 26 Fig Fig NNP work_ayatblpinzaztdzhilw6yqsi6m 293 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 294 1 6 6 CD work_ayatblpinzaztdzhilw6yqsi6m 294 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 294 3 reveal reveal VBP work_ayatblpinzaztdzhilw6yqsi6m 294 4 that that IN work_ayatblpinzaztdzhilw6yqsi6m 294 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 294 6 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 294 7 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 294 8 values value NNS work_ayatblpinzaztdzhilw6yqsi6m 294 9 for for IN work_ayatblpinzaztdzhilw6yqsi6m 294 10 both both PDT work_ayatblpinzaztdzhilw6yqsi6m 294 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 294 12 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 294 13 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 294 14 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 294 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 294 16 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 294 17 and and CC work_ayatblpinzaztdzhilw6yqsi6m 294 18 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 294 19 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 294 20 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 294 21 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 294 22 as as RB work_ayatblpinzaztdzhilw6yqsi6m 294 23 well well RB work_ayatblpinzaztdzhilw6yqsi6m 294 24 as as IN work_ayatblpinzaztdzhilw6yqsi6m 294 25 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 294 26 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 294 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 294 28 1.0 1.0 LS work_ayatblpinzaztdzhilw6yqsi6m 294 29 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 294 30 the the DT work_ayatblpinzaztdzhilw6yqsi6m 294 31 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 294 32 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 294 33 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 294 34 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 294 35 of of IN work_ayatblpinzaztdzhilw6yqsi6m 294 36 both both DT work_ayatblpinzaztdzhilw6yqsi6m 294 37 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 294 38 follow follow VBP work_ayatblpinzaztdzhilw6yqsi6m 294 39 similar similar JJ work_ayatblpinzaztdzhilw6yqsi6m 294 40 pattern pattern NN work_ayatblpinzaztdzhilw6yqsi6m 294 41 of of IN work_ayatblpinzaztdzhilw6yqsi6m 294 42 high high JJ work_ayatblpinzaztdzhilw6yqsi6m 294 43 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 294 44 . . . work_ayatblpinzaztdzhilw6yqsi6m 295 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 295 2 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 295 3 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 295 4 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 295 5 score score NN work_ayatblpinzaztdzhilw6yqsi6m 295 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 295 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 295 8 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 295 9 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 295 10 classifier classifier NN work_ayatblpinzaztdzhilw6yqsi6m 295 11 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 295 12 0.93 0.93 CD work_ayatblpinzaztdzhilw6yqsi6m 295 13 for for IN work_ayatblpinzaztdzhilw6yqsi6m 295 14 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 295 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 295 16 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 295 17 for for IN work_ayatblpinzaztdzhilw6yqsi6m 295 18 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 295 19 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 295 20 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 295 21 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 295 22 as as IN work_ayatblpinzaztdzhilw6yqsi6m 295 23 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 295 24 in in IN work_ayatblpinzaztdzhilw6yqsi6m 295 25 Table Table NNP work_ayatblpinzaztdzhilw6yqsi6m 295 26 6 6 CD work_ayatblpinzaztdzhilw6yqsi6m 295 27 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 295 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 296 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 296 2 extreme extreme JJ work_ayatblpinzaztdzhilw6yqsi6m 296 3 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 296 4 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 296 5 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 296 6 model model NN work_ayatblpinzaztdzhilw6yqsi6m 296 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 296 8 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 296 9 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 296 10 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 296 11 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 296 12 in in IN work_ayatblpinzaztdzhilw6yqsi6m 296 13 Fig Fig NNP work_ayatblpinzaztdzhilw6yqsi6m 296 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 297 1 7 7 CD work_ayatblpinzaztdzhilw6yqsi6m 297 2 and and CC work_ayatblpinzaztdzhilw6yqsi6m 297 3 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 297 4 7 7 CD work_ayatblpinzaztdzhilw6yqsi6m 297 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 298 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 298 2 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 298 3 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 298 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 298 5 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 298 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 298 7 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 298 8 Curve Curve NNP work_ayatblpinzaztdzhilw6yqsi6m 298 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 298 10 both both DT work_ayatblpinzaztdzhilw6yqsi6m 298 11 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 298 12 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 298 13 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 298 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 298 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 298 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 298 17 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 298 18 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 298 19 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 298 20 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 298 21 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 298 22 the the DT work_ayatblpinzaztdzhilw6yqsi6m 298 23 same same JJ work_ayatblpinzaztdzhilw6yqsi6m 298 24 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 298 25 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 298 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 298 27 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 298 28 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 298 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 299 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 299 2 extreme extreme JJ work_ayatblpinzaztdzhilw6yqsi6m 299 3 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 299 4 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 299 5 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 299 6 model model NN work_ayatblpinzaztdzhilw6yqsi6m 299 7 ’s ’s , work_ayatblpinzaztdzhilw6yqsi6m 299 8 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 299 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 299 10 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 299 11 score score NN work_ayatblpinzaztdzhilw6yqsi6m 299 12 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 299 13 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 299 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 299 15 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 299 16 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 299 17 similar similar JJ work_ayatblpinzaztdzhilw6yqsi6m 299 18 to to IN work_ayatblpinzaztdzhilw6yqsi6m 299 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 299 20 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 299 21 boosting boosting NN work_ayatblpinzaztdzhilw6yqsi6m 299 22 and and CC work_ayatblpinzaztdzhilw6yqsi6m 299 23 random random JJ work_ayatblpinzaztdzhilw6yqsi6m 299 24 Figure figure NN work_ayatblpinzaztdzhilw6yqsi6m 299 25 6 6 CD work_ayatblpinzaztdzhilw6yqsi6m 299 26 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 299 27 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 299 28 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 299 29 metrics metric NNS work_ayatblpinzaztdzhilw6yqsi6m 299 30 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 299 31 : : : work_ayatblpinzaztdzhilw6yqsi6m 299 32 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 299 33 A a NN work_ayatblpinzaztdzhilw6yqsi6m 299 34 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 299 35 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 299 36 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 299 37 for for IN work_ayatblpinzaztdzhilw6yqsi6m 299 38 the the DT work_ayatblpinzaztdzhilw6yqsi6m 299 39 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 299 40 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 299 41 and and CC work_ayatblpinzaztdzhilw6yqsi6m 299 42 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 299 43 . . . work_ayatblpinzaztdzhilw6yqsi6m 300 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 300 2 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 300 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 300 4 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 300 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 300 6 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 300 7 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 300 8 for for IN work_ayatblpinzaztdzhilw6yqsi6m 300 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 300 10 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 300 11 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 300 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 300 13 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 300 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 301 1 Full full JJ work_ayatblpinzaztdzhilw6yqsi6m 301 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 301 3 size size NN work_ayatblpinzaztdzhilw6yqsi6m 301 4 DOI doi NN work_ayatblpinzaztdzhilw6yqsi6m 301 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 301 6 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 301 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 301 8 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 301 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 301 10 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 301 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 301 12 fig-6 fig-6 NNP work_ayatblpinzaztdzhilw6yqsi6m 301 13 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 301 14 6 6 CD work_ayatblpinzaztdzhilw6yqsi6m 301 15 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 301 16 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 301 17 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 301 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 301 19 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 301 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 301 21 F f NN work_ayatblpinzaztdzhilw6yqsi6m 301 22 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 301 23 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 301 24 score score NN work_ayatblpinzaztdzhilw6yqsi6m 301 25 for for IN work_ayatblpinzaztdzhilw6yqsi6m 301 26 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 301 27 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 301 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 302 1 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 302 2 class class NN work_ayatblpinzaztdzhilw6yqsi6m 302 3 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 302 4 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 302 5 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 302 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 302 7 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 302 8 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 302 9 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 302 10 class class NN work_ayatblpinzaztdzhilw6yqsi6m 302 11 label label NN work_ayatblpinzaztdzhilw6yqsi6m 302 12 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 302 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 302 14 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 302 15 0.88 0.88 CD work_ayatblpinzaztdzhilw6yqsi6m 302 16 0.93 0.93 CD work_ayatblpinzaztdzhilw6yqsi6m 302 17 Non Non NNS work_ayatblpinzaztdzhilw6yqsi6m 302 18 - - NN work_ayatblpinzaztdzhilw6yqsi6m 302 19 Ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 302 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 302 21 class class NN work_ayatblpinzaztdzhilw6yqsi6m 302 22 label label NN work_ayatblpinzaztdzhilw6yqsi6m 302 23 0 0 CD work_ayatblpinzaztdzhilw6yqsi6m 302 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 302 25 0.89 0.89 CD work_ayatblpinzaztdzhilw6yqsi6m 302 26 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 302 27 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 302 28 Figure figure NN work_ayatblpinzaztdzhilw6yqsi6m 302 29 7 7 CD work_ayatblpinzaztdzhilw6yqsi6m 302 30 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 302 31 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 302 32 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 302 33 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 302 34 metrics metric NNS work_ayatblpinzaztdzhilw6yqsi6m 302 35 behavior behavior NN work_ayatblpinzaztdzhilw6yqsi6m 302 36 : : : work_ayatblpinzaztdzhilw6yqsi6m 302 37 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 302 38 A a NN work_ayatblpinzaztdzhilw6yqsi6m 302 39 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 302 40 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 302 41 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 302 42 for for IN work_ayatblpinzaztdzhilw6yqsi6m 302 43 the the DT work_ayatblpinzaztdzhilw6yqsi6m 302 44 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 302 45 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 302 46 and and CC work_ayatblpinzaztdzhilw6yqsi6m 302 47 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 302 48 . . . work_ayatblpinzaztdzhilw6yqsi6m 303 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 303 2 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 303 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 303 4 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 303 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 303 6 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 303 7 curves curve NNS work_ayatblpinzaztdzhilw6yqsi6m 303 8 for for IN work_ayatblpinzaztdzhilw6yqsi6m 303 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 303 10 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 303 11 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 303 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 303 13 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 303 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 304 1 Full full JJ work_ayatblpinzaztdzhilw6yqsi6m 304 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 304 3 size size NN work_ayatblpinzaztdzhilw6yqsi6m 304 4 DOI doi NN work_ayatblpinzaztdzhilw6yqsi6m 304 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 304 6 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 304 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 304 8 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 304 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 304 10 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 304 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 304 12 fig-7 fig-7 NNP work_ayatblpinzaztdzhilw6yqsi6m 304 13 Aurangzeb Aurangzeb NNPS work_ayatblpinzaztdzhilw6yqsi6m 304 14 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 304 15 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 304 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 305 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 305 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 305 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 305 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 305 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 305 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 305 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 306 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 306 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 306 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 306 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 306 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 306 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 306 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 306 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 306 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 306 10 17/24 17/24 CD work_ayatblpinzaztdzhilw6yqsi6m 306 11 http://dx.doi.org/10.7717/peerj-cs.361/fig-6 http://dx.doi.org/10.7717/peerj-cs.361/fig-6 NNP work_ayatblpinzaztdzhilw6yqsi6m 306 12 http://dx.doi.org/10.7717/peerj-cs.361/fig-7 http://dx.doi.org/10.7717/peerj-cs.361/fig-7 IN work_ayatblpinzaztdzhilw6yqsi6m 306 13 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 306 14 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 306 15 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 306 16 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 306 17 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 306 18 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 306 19 as as IN work_ayatblpinzaztdzhilw6yqsi6m 306 20 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 306 21 in in IN work_ayatblpinzaztdzhilw6yqsi6m 306 22 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 306 23 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 306 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 307 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 307 2 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 307 3 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 307 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 307 5 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 307 6 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 307 7 model model NN work_ayatblpinzaztdzhilw6yqsi6m 307 8 outperformed outperform VBN work_ayatblpinzaztdzhilw6yqsi6m 307 9 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 307 10 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 307 11 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 307 12 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 307 13 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 307 14 by by IN work_ayatblpinzaztdzhilw6yqsi6m 307 15 attaining attain VBG work_ayatblpinzaztdzhilw6yqsi6m 307 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 307 17 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 307 18 of of IN work_ayatblpinzaztdzhilw6yqsi6m 307 19 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 307 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 307 21 as as IN work_ayatblpinzaztdzhilw6yqsi6m 307 22 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 307 23 in in IN work_ayatblpinzaztdzhilw6yqsi6m 307 24 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 307 25 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 307 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 308 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 308 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 308 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 308 4 value value NN work_ayatblpinzaztdzhilw6yqsi6m 308 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 308 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 308 7 F f NN work_ayatblpinzaztdzhilw6yqsi6m 308 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 308 9 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 308 10 for for IN work_ayatblpinzaztdzhilw6yqsi6m 308 11 both both PDT work_ayatblpinzaztdzhilw6yqsi6m 308 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 308 13 classes class NNS work_ayatblpinzaztdzhilw6yqsi6m 308 14 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 308 15 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 308 16 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 308 17 as as IN work_ayatblpinzaztdzhilw6yqsi6m 308 18 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 308 19 in in IN work_ayatblpinzaztdzhilw6yqsi6m 308 20 Table Table NNP work_ayatblpinzaztdzhilw6yqsi6m 308 21 8) 8) CD work_ayatblpinzaztdzhilw6yqsi6m 308 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 309 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 309 2 model model NN work_ayatblpinzaztdzhilw6yqsi6m 309 3 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 309 4 attained attain VBN work_ayatblpinzaztdzhilw6yqsi6m 309 5 an an DT work_ayatblpinzaztdzhilw6yqsi6m 309 6 improvement improvement NN work_ayatblpinzaztdzhilw6yqsi6m 309 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 309 8 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 309 9 % % NN work_ayatblpinzaztdzhilw6yqsi6m 309 10 than than IN work_ayatblpinzaztdzhilw6yqsi6m 309 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 309 12 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 309 13 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 309 14 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 309 15 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 309 16 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 309 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 310 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 310 2 model model NN work_ayatblpinzaztdzhilw6yqsi6m 310 3 shows show VBZ work_ayatblpinzaztdzhilw6yqsi6m 310 4 similar similar JJ work_ayatblpinzaztdzhilw6yqsi6m 310 5 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 310 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 310 7 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 310 8 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 310 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 310 10 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 310 11 as as IN work_ayatblpinzaztdzhilw6yqsi6m 310 12 observed observe VBN work_ayatblpinzaztdzhilw6yqsi6m 310 13 for for IN work_ayatblpinzaztdzhilw6yqsi6m 310 14 random random JJ work_ayatblpinzaztdzhilw6yqsi6m 310 15 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 310 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 310 17 extreme extreme JJ work_ayatblpinzaztdzhilw6yqsi6m 310 18 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 310 19 boosting boosting NN work_ayatblpinzaztdzhilw6yqsi6m 310 20 . . . work_ayatblpinzaztdzhilw6yqsi6m 311 1 This this DT work_ayatblpinzaztdzhilw6yqsi6m 311 2 study study NN work_ayatblpinzaztdzhilw6yqsi6m 311 3 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 311 4 demonstrated demonstrate VBN work_ayatblpinzaztdzhilw6yqsi6m 311 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 311 6 possibility possibility NN work_ayatblpinzaztdzhilw6yqsi6m 311 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 311 8 exploiting exploit VBG work_ayatblpinzaztdzhilw6yqsi6m 311 9 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 311 10 as as IN work_ayatblpinzaztdzhilw6yqsi6m 311 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 311 12 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 311 13 features feature VBZ work_ayatblpinzaztdzhilw6yqsi6m 311 14 for for IN work_ayatblpinzaztdzhilw6yqsi6m 311 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 311 16 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 311 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 312 1 After after IN work_ayatblpinzaztdzhilw6yqsi6m 312 2 analyzing analyze VBG work_ayatblpinzaztdzhilw6yqsi6m 312 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 312 4 sets set NNS work_ayatblpinzaztdzhilw6yqsi6m 312 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 312 6 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 312 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 312 8 non- non- NNP work_ayatblpinzaztdzhilw6yqsi6m 312 9 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 312 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 312 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 312 12 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 312 13 obtained obtain VBN work_ayatblpinzaztdzhilw6yqsi6m 312 14 from from IN work_ayatblpinzaztdzhilw6yqsi6m 312 15 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 312 16 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 312 17 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 312 18 analyzed analyze VBN work_ayatblpinzaztdzhilw6yqsi6m 312 19 to to TO work_ayatblpinzaztdzhilw6yqsi6m 312 20 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 312 21 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 312 22 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 312 23 into into IN work_ayatblpinzaztdzhilw6yqsi6m 312 24 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 312 25 and and CC work_ayatblpinzaztdzhilw6yqsi6m 312 26 non non JJ work_ayatblpinzaztdzhilw6yqsi6m 312 27 - - JJ work_ayatblpinzaztdzhilw6yqsi6m 312 28 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 312 29 categories category NNS work_ayatblpinzaztdzhilw6yqsi6m 312 30 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 312 31 several several JJ work_ayatblpinzaztdzhilw6yqsi6m 312 32 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 312 33 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 312 34 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 312 35 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 312 36 as as IN work_ayatblpinzaztdzhilw6yqsi6m 312 37 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 312 38 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 312 39 , , , work_ayatblpinzaztdzhilw6yqsi6m 312 40 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 312 41 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 312 42 , , , work_ayatblpinzaztdzhilw6yqsi6m 312 43 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 312 44 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 312 45 and and CC work_ayatblpinzaztdzhilw6yqsi6m 312 46 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 312 47 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 312 48 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 312 49 . . . work_ayatblpinzaztdzhilw6yqsi6m 313 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 313 2 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 313 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 313 4 detailed detailed JJ work_ayatblpinzaztdzhilw6yqsi6m 313 5 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 313 6 as as IN work_ayatblpinzaztdzhilw6yqsi6m 313 7 stated state VBN work_ayatblpinzaztdzhilw6yqsi6m 313 8 earlier early RBR work_ayatblpinzaztdzhilw6yqsi6m 313 9 in in IN work_ayatblpinzaztdzhilw6yqsi6m 313 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 313 11 section section NN work_ayatblpinzaztdzhilw6yqsi6m 313 12 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 313 13 revealed reveal VBN work_ayatblpinzaztdzhilw6yqsi6m 313 14 that that IN work_ayatblpinzaztdzhilw6yqsi6m 313 15 extracted extract VBN work_ayatblpinzaztdzhilw6yqsi6m 313 16 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 313 17 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 313 18 play play VBP work_ayatblpinzaztdzhilw6yqsi6m 313 19 a a DT work_ayatblpinzaztdzhilw6yqsi6m 313 20 significant significant JJ work_ayatblpinzaztdzhilw6yqsi6m 313 21 role role NN work_ayatblpinzaztdzhilw6yqsi6m 313 22 in in IN work_ayatblpinzaztdzhilw6yqsi6m 313 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 313 24 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 313 25 and and CC work_ayatblpinzaztdzhilw6yqsi6m 313 26 identification identification NN work_ayatblpinzaztdzhilw6yqsi6m 313 27 of of IN work_ayatblpinzaztdzhilw6yqsi6m 313 28 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 313 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 314 1 Among among IN work_ayatblpinzaztdzhilw6yqsi6m 314 2 all all PDT work_ayatblpinzaztdzhilw6yqsi6m 314 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 314 4 employed employed JJ work_ayatblpinzaztdzhilw6yqsi6m 314 5 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 314 6 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 314 7 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 314 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 314 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 314 10 random random JJ work_ayatblpinzaztdzhilw6yqsi6m 314 11 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 314 12 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 314 13 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 314 14 model model NN work_ayatblpinzaztdzhilw6yqsi6m 314 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 314 16 extreme extreme JJ work_ayatblpinzaztdzhilw6yqsi6m 314 17 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 314 18 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 314 19 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 314 20 outperformed outperform VBN work_ayatblpinzaztdzhilw6yqsi6m 314 21 by by IN work_ayatblpinzaztdzhilw6yqsi6m 314 22 yielding yield VBG work_ayatblpinzaztdzhilw6yqsi6m 314 23 F f NN work_ayatblpinzaztdzhilw6yqsi6m 314 24 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 314 25 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 314 26 score score NN work_ayatblpinzaztdzhilw6yqsi6m 314 27 of of IN work_ayatblpinzaztdzhilw6yqsi6m 314 28 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 314 29 followed follow VBN work_ayatblpinzaztdzhilw6yqsi6m 314 30 by by IN work_ayatblpinzaztdzhilw6yqsi6m 314 31 a a DT work_ayatblpinzaztdzhilw6yqsi6m 314 32 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 314 33 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 314 34 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 314 35 achieved achieve VBD work_ayatblpinzaztdzhilw6yqsi6m 314 36 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 314 37 F f NN work_ayatblpinzaztdzhilw6yqsi6m 314 38 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 314 39 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 314 40 . . . work_ayatblpinzaztdzhilw6yqsi6m 315 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 315 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 315 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 315 4 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 315 5 cache cache NNP work_ayatblpinzaztdzhilw6yqsi6m 315 6 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 315 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 315 8 task task NN work_ayatblpinzaztdzhilw6yqsi6m 315 9 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 315 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 315 11 and and CC work_ayatblpinzaztdzhilw6yqsi6m 315 12 branches branch NNS work_ayatblpinzaztdzhilw6yqsi6m 315 13 obtained obtain VBN work_ayatblpinzaztdzhilw6yqsi6m 315 14 through through IN work_ayatblpinzaztdzhilw6yqsi6m 315 15 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 315 16 could could MD work_ayatblpinzaztdzhilw6yqsi6m 315 17 be be VB work_ayatblpinzaztdzhilw6yqsi6m 315 18 deemed deem VBN work_ayatblpinzaztdzhilw6yqsi6m 315 19 as as IN work_ayatblpinzaztdzhilw6yqsi6m 315 20 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 315 21 parameters parameter NNS work_ayatblpinzaztdzhilw6yqsi6m 315 22 in in IN work_ayatblpinzaztdzhilw6yqsi6m 315 23 classifying classify VBG work_ayatblpinzaztdzhilw6yqsi6m 315 24 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 315 25 from from IN work_ayatblpinzaztdzhilw6yqsi6m 315 26 non- non- NNP work_ayatblpinzaztdzhilw6yqsi6m 315 27 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 315 28 . . . work_ayatblpinzaztdzhilw6yqsi6m 316 1 CONCLUSIONS conclusion NNS work_ayatblpinzaztdzhilw6yqsi6m 316 2 In in IN work_ayatblpinzaztdzhilw6yqsi6m 316 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 316 4 article article NN work_ayatblpinzaztdzhilw6yqsi6m 316 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 316 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 316 7 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 316 8 of of IN work_ayatblpinzaztdzhilw6yqsi6m 316 9 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 316 10 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 316 11 been be VBN work_ayatblpinzaztdzhilw6yqsi6m 316 12 presented present VBN work_ayatblpinzaztdzhilw6yqsi6m 316 13 for for IN work_ayatblpinzaztdzhilw6yqsi6m 316 14 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 316 15 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 316 16 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 316 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 317 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 317 2 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 317 3 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 317 4 revealed reveal VBN work_ayatblpinzaztdzhilw6yqsi6m 317 5 that that IN work_ayatblpinzaztdzhilw6yqsi6m 317 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 317 7 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 317 8 hold hold VBP work_ayatblpinzaztdzhilw6yqsi6m 317 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 317 10 considerable considerable JJ work_ayatblpinzaztdzhilw6yqsi6m 317 11 potential potential NN work_ayatblpinzaztdzhilw6yqsi6m 317 12 to to TO work_ayatblpinzaztdzhilw6yqsi6m 317 13 expose expose VB work_ayatblpinzaztdzhilw6yqsi6m 317 14 hidden hide VBN work_ayatblpinzaztdzhilw6yqsi6m 317 15 indicators indicator NNS work_ayatblpinzaztdzhilw6yqsi6m 317 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 317 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 317 18 executing execute VBG work_ayatblpinzaztdzhilw6yqsi6m 317 19 applications application NNS work_ayatblpinzaztdzhilw6yqsi6m 317 20 such such JJ work_ayatblpinzaztdzhilw6yqsi6m 317 21 as as IN work_ayatblpinzaztdzhilw6yqsi6m 317 22 malicious malicious JJ work_ayatblpinzaztdzhilw6yqsi6m 317 23 codes code NNS work_ayatblpinzaztdzhilw6yqsi6m 317 24 and and CC work_ayatblpinzaztdzhilw6yqsi6m 317 25 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 317 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 318 1 Performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 318 2 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 318 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 318 4 that that RB work_ayatblpinzaztdzhilw6yqsi6m 318 5 is is RB work_ayatblpinzaztdzhilw6yqsi6m 318 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 318 7 cache cache NNP work_ayatblpinzaztdzhilw6yqsi6m 318 8 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 318 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 318 10 task task NN work_ayatblpinzaztdzhilw6yqsi6m 318 11 clock clock NN work_ayatblpinzaztdzhilw6yqsi6m 318 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 318 13 branches branch NNS work_ayatblpinzaztdzhilw6yqsi6m 318 14 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 318 15 played play VBN work_ayatblpinzaztdzhilw6yqsi6m 318 16 a a DT work_ayatblpinzaztdzhilw6yqsi6m 318 17 pivotal pivotal JJ work_ayatblpinzaztdzhilw6yqsi6m 318 18 role role NN work_ayatblpinzaztdzhilw6yqsi6m 318 19 in in IN work_ayatblpinzaztdzhilw6yqsi6m 318 20 classifying classify VBG work_ayatblpinzaztdzhilw6yqsi6m 318 21 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 318 22 in in IN work_ayatblpinzaztdzhilw6yqsi6m 318 23 a a DT work_ayatblpinzaztdzhilw6yqsi6m 318 24 way way NN work_ayatblpinzaztdzhilw6yqsi6m 318 25 that that IN work_ayatblpinzaztdzhilw6yqsi6m 318 26 if if IN work_ayatblpinzaztdzhilw6yqsi6m 318 27 there there EX work_ayatblpinzaztdzhilw6yqsi6m 318 28 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 318 29 a a DT work_ayatblpinzaztdzhilw6yqsi6m 318 30 high high JJ work_ayatblpinzaztdzhilw6yqsi6m 318 31 number number NN work_ayatblpinzaztdzhilw6yqsi6m 318 32 of of IN work_ayatblpinzaztdzhilw6yqsi6m 318 33 cache cache JJ work_ayatblpinzaztdzhilw6yqsi6m 318 34 misses miss NNS work_ayatblpinzaztdzhilw6yqsi6m 318 35 or or CC work_ayatblpinzaztdzhilw6yqsi6m 318 36 a a DT work_ayatblpinzaztdzhilw6yqsi6m 318 37 high high JJ work_ayatblpinzaztdzhilw6yqsi6m 318 38 number number NN work_ayatblpinzaztdzhilw6yqsi6m 318 39 of of IN work_ayatblpinzaztdzhilw6yqsi6m 318 40 branch branch NN work_ayatblpinzaztdzhilw6yqsi6m 318 41 mispredictions misprediction NNS work_ayatblpinzaztdzhilw6yqsi6m 318 42 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 318 43 where where WRB work_ayatblpinzaztdzhilw6yqsi6m 318 44 control control NN work_ayatblpinzaztdzhilw6yqsi6m 318 45 flow flow NN work_ayatblpinzaztdzhilw6yqsi6m 318 46 becomes become VBZ work_ayatblpinzaztdzhilw6yqsi6m 318 47 detectably detectably RB work_ayatblpinzaztdzhilw6yqsi6m 318 48 anomalous anomalous JJ work_ayatblpinzaztdzhilw6yqsi6m 318 49 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 318 50 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 318 51 good good JJ work_ayatblpinzaztdzhilw6yqsi6m 318 52 indicators indicator NNS work_ayatblpinzaztdzhilw6yqsi6m 318 53 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 318 54 help help VBP work_ayatblpinzaztdzhilw6yqsi6m 318 55 in in IN work_ayatblpinzaztdzhilw6yqsi6m 318 56 indicating indicate VBG work_ayatblpinzaztdzhilw6yqsi6m 318 57 a a DT work_ayatblpinzaztdzhilw6yqsi6m 318 58 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 318 59 attack attack NN work_ayatblpinzaztdzhilw6yqsi6m 318 60 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 318 61 Foreman Foreman NNP work_ayatblpinzaztdzhilw6yqsi6m 318 62 , , , work_ayatblpinzaztdzhilw6yqsi6m 318 63 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 318 64 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 318 65 . . . work_ayatblpinzaztdzhilw6yqsi6m 319 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 319 2 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 319 3 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 319 4 holds hold VBZ work_ayatblpinzaztdzhilw6yqsi6m 319 5 adequate adequate JJ work_ayatblpinzaztdzhilw6yqsi6m 319 6 potential potential NN work_ayatblpinzaztdzhilw6yqsi6m 319 7 to to TO work_ayatblpinzaztdzhilw6yqsi6m 319 8 provide provide VB work_ayatblpinzaztdzhilw6yqsi6m 319 9 sufficient sufficient JJ work_ayatblpinzaztdzhilw6yqsi6m 319 10 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 319 11 7 7 CD work_ayatblpinzaztdzhilw6yqsi6m 319 12 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 319 13 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 319 14 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 319 15 precision precision NN work_ayatblpinzaztdzhilw6yqsi6m 319 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 319 17 recall recall NN work_ayatblpinzaztdzhilw6yqsi6m 319 18 and and CC work_ayatblpinzaztdzhilw6yqsi6m 319 19 F f NN work_ayatblpinzaztdzhilw6yqsi6m 319 20 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 319 21 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 319 22 score score NN work_ayatblpinzaztdzhilw6yqsi6m 319 23 for for IN work_ayatblpinzaztdzhilw6yqsi6m 319 24 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 319 25 . . . work_ayatblpinzaztdzhilw6yqsi6m 320 1 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 320 2 class class NN work_ayatblpinzaztdzhilw6yqsi6m 320 3 Precision Precision NNP work_ayatblpinzaztdzhilw6yqsi6m 320 4 Recall Recall NNP work_ayatblpinzaztdzhilw6yqsi6m 320 5 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 320 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 320 7 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 320 8 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 320 9 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 320 10 class class NN work_ayatblpinzaztdzhilw6yqsi6m 320 11 label label NN work_ayatblpinzaztdzhilw6yqsi6m 320 12 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 320 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 320 14 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 320 15 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 320 16 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 320 17 Non Non NNP work_ayatblpinzaztdzhilw6yqsi6m 320 18 - - NNP work_ayatblpinzaztdzhilw6yqsi6m 320 19 Ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 320 20 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 320 21 class class NN work_ayatblpinzaztdzhilw6yqsi6m 320 22 label label NN work_ayatblpinzaztdzhilw6yqsi6m 320 23 0 0 CD work_ayatblpinzaztdzhilw6yqsi6m 320 24 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 320 25 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 320 26 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 320 27 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 320 28 Table table NN work_ayatblpinzaztdzhilw6yqsi6m 320 29 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 320 30 Four four CD work_ayatblpinzaztdzhilw6yqsi6m 320 31 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 320 32 result result VBP work_ayatblpinzaztdzhilw6yqsi6m 320 33 and and CC work_ayatblpinzaztdzhilw6yqsi6m 320 34 their -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 320 35 comparison comparison NN work_ayatblpinzaztdzhilw6yqsi6m 320 36 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 320 37 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 320 38 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 320 39 score score NN work_ayatblpinzaztdzhilw6yqsi6m 320 40 . . . work_ayatblpinzaztdzhilw6yqsi6m 321 1 Classifier Classifier NNP work_ayatblpinzaztdzhilw6yqsi6m 321 2 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 321 3 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 321 4 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 321 5 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 321 6 Tree Tree NNP work_ayatblpinzaztdzhilw6yqsi6m 321 7 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 321 8 Random Random NNP work_ayatblpinzaztdzhilw6yqsi6m 321 9 Forest Forest NNP work_ayatblpinzaztdzhilw6yqsi6m 321 10 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 321 11 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 321 12 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 321 13 0.94 0.94 CD work_ayatblpinzaztdzhilw6yqsi6m 321 14 Extreme Extreme NNP work_ayatblpinzaztdzhilw6yqsi6m 321 15 Gradient Gradient NNP work_ayatblpinzaztdzhilw6yqsi6m 321 16 Boosting Boosting NNP work_ayatblpinzaztdzhilw6yqsi6m 321 17 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 321 18 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 321 19 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 321 20 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 321 21 . . . work_ayatblpinzaztdzhilw6yqsi6m 322 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 322 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 322 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 322 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 322 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 322 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 322 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 323 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 323 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 323 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 323 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 323 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 323 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 323 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 323 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 323 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 323 10 18/24 18/24 CD work_ayatblpinzaztdzhilw6yqsi6m 323 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 323 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ POS work_ayatblpinzaztdzhilw6yqsi6m 323 13 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 323 14 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 323 15 by by IN work_ayatblpinzaztdzhilw6yqsi6m 323 16 attaining attain VBG work_ayatblpinzaztdzhilw6yqsi6m 323 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 323 18 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 323 19 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 323 20 measure measure NN work_ayatblpinzaztdzhilw6yqsi6m 323 21 score score NN work_ayatblpinzaztdzhilw6yqsi6m 323 22 of of IN work_ayatblpinzaztdzhilw6yqsi6m 323 23 0.97 0.97 CD work_ayatblpinzaztdzhilw6yqsi6m 323 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 324 1 This this DT work_ayatblpinzaztdzhilw6yqsi6m 324 2 study study NN work_ayatblpinzaztdzhilw6yqsi6m 324 3 demonstrated demonstrate VBD work_ayatblpinzaztdzhilw6yqsi6m 324 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 324 5 possibility possibility NN work_ayatblpinzaztdzhilw6yqsi6m 324 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 324 7 exploiting exploit VBG work_ayatblpinzaztdzhilw6yqsi6m 324 8 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 324 9 as as IN work_ayatblpinzaztdzhilw6yqsi6m 324 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 324 11 potential potential JJ work_ayatblpinzaztdzhilw6yqsi6m 324 12 feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 324 13 for for IN work_ayatblpinzaztdzhilw6yqsi6m 324 14 the the DT work_ayatblpinzaztdzhilw6yqsi6m 324 15 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 324 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 324 17 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 324 18 . . . work_ayatblpinzaztdzhilw6yqsi6m 325 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 325 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 325 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 325 4 topic topic NN work_ayatblpinzaztdzhilw6yqsi6m 325 5 needs need VBZ work_ayatblpinzaztdzhilw6yqsi6m 325 6 further further JJ work_ayatblpinzaztdzhilw6yqsi6m 325 7 investigation investigation NN work_ayatblpinzaztdzhilw6yqsi6m 325 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 326 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 326 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 326 3 future future NN work_ayatblpinzaztdzhilw6yqsi6m 326 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 326 5 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 326 6 intend intend VBP work_ayatblpinzaztdzhilw6yqsi6m 326 7 to to TO work_ayatblpinzaztdzhilw6yqsi6m 326 8 scrutinize scrutinize VB work_ayatblpinzaztdzhilw6yqsi6m 326 9 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 326 10 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 326 11 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 326 12 with with IN work_ayatblpinzaztdzhilw6yqsi6m 326 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 326 14 combination combination NN work_ayatblpinzaztdzhilw6yqsi6m 326 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 326 16 call call JJ work_ayatblpinzaztdzhilw6yqsi6m 326 17 graphs graphs NN work_ayatblpinzaztdzhilw6yqsi6m 326 18 to to TO work_ayatblpinzaztdzhilw6yqsi6m 326 19 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 326 20 and and CC work_ayatblpinzaztdzhilw6yqsi6m 326 21 classify classify VB work_ayatblpinzaztdzhilw6yqsi6m 326 22 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 326 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 327 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 327 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 327 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 327 4 application application NN work_ayatblpinzaztdzhilw6yqsi6m 327 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 327 6 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 327 7 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 327 8 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 327 9 has have VBZ work_ayatblpinzaztdzhilw6yqsi6m 327 10 shown show VBN work_ayatblpinzaztdzhilw6yqsi6m 327 11 very very RB work_ayatblpinzaztdzhilw6yqsi6m 327 12 promising promising JJ work_ayatblpinzaztdzhilw6yqsi6m 327 13 results result NNS work_ayatblpinzaztdzhilw6yqsi6m 327 14 in in IN work_ayatblpinzaztdzhilw6yqsi6m 327 15 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 327 16 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 327 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 328 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 328 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 328 3 future future NN work_ayatblpinzaztdzhilw6yqsi6m 328 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 328 5 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 328 6 will will MD work_ayatblpinzaztdzhilw6yqsi6m 328 7 expand expand VB work_ayatblpinzaztdzhilw6yqsi6m 328 8 this this DT work_ayatblpinzaztdzhilw6yqsi6m 328 9 study study NN work_ayatblpinzaztdzhilw6yqsi6m 328 10 to to TO work_ayatblpinzaztdzhilw6yqsi6m 328 11 perform perform VB work_ayatblpinzaztdzhilw6yqsi6m 328 12 in in IN work_ayatblpinzaztdzhilw6yqsi6m 328 13 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 328 14 depth depth NN work_ayatblpinzaztdzhilw6yqsi6m 328 15 static static JJ work_ayatblpinzaztdzhilw6yqsi6m 328 16 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 328 17 as as RB work_ayatblpinzaztdzhilw6yqsi6m 328 18 well well RB work_ayatblpinzaztdzhilw6yqsi6m 328 19 as as IN work_ayatblpinzaztdzhilw6yqsi6m 328 20 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 328 21 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 328 22 with with IN work_ayatblpinzaztdzhilw6yqsi6m 328 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 328 24 combination combination NN work_ayatblpinzaztdzhilw6yqsi6m 328 25 of of IN work_ayatblpinzaztdzhilw6yqsi6m 328 26 HPCs hpc NNS work_ayatblpinzaztdzhilw6yqsi6m 328 27 in in IN work_ayatblpinzaztdzhilw6yqsi6m 328 28 the the DT work_ayatblpinzaztdzhilw6yqsi6m 328 29 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 328 30 of of IN work_ayatblpinzaztdzhilw6yqsi6m 328 31 that that DT work_ayatblpinzaztdzhilw6yqsi6m 328 32 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 328 33 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 328 34 usually usually RB work_ayatblpinzaztdzhilw6yqsi6m 328 35 hides hide VBZ work_ayatblpinzaztdzhilw6yqsi6m 328 36 by by IN work_ayatblpinzaztdzhilw6yqsi6m 328 37 implementing implement VBG work_ayatblpinzaztdzhilw6yqsi6m 328 38 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 328 39 obfuscation obfuscation NN work_ayatblpinzaztdzhilw6yqsi6m 328 40 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 328 41 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 328 42 like like UH work_ayatblpinzaztdzhilw6yqsi6m 328 43 packed packed JJ work_ayatblpinzaztdzhilw6yqsi6m 328 44 or or CC work_ayatblpinzaztdzhilw6yqsi6m 328 45 compressed compress VBN work_ayatblpinzaztdzhilw6yqsi6m 328 46 programs program NNS work_ayatblpinzaztdzhilw6yqsi6m 328 47 , , , work_ayatblpinzaztdzhilw6yqsi6m 328 48 or or CC work_ayatblpinzaztdzhilw6yqsi6m 328 49 indirect indirect JJ work_ayatblpinzaztdzhilw6yqsi6m 328 50 addressing addressing NN work_ayatblpinzaztdzhilw6yqsi6m 328 51 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 328 52 Behera Behera NNP work_ayatblpinzaztdzhilw6yqsi6m 328 53 & & CC work_ayatblpinzaztdzhilw6yqsi6m 328 54 Bhaskari Bhaskari NNP work_ayatblpinzaztdzhilw6yqsi6m 328 55 , , , work_ayatblpinzaztdzhilw6yqsi6m 328 56 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 328 57 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 328 58 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 328 59 . . . work_ayatblpinzaztdzhilw6yqsi6m 329 1 One one CD work_ayatblpinzaztdzhilw6yqsi6m 329 2 major major JJ work_ayatblpinzaztdzhilw6yqsi6m 329 3 challenge challenge NN work_ayatblpinzaztdzhilw6yqsi6m 329 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 329 5 limitation limitation NN work_ayatblpinzaztdzhilw6yqsi6m 329 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 329 7 this this DT work_ayatblpinzaztdzhilw6yqsi6m 329 8 research research NN work_ayatblpinzaztdzhilw6yqsi6m 329 9 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 329 10 in in IN work_ayatblpinzaztdzhilw6yqsi6m 329 11 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 329 12 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 329 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 329 14 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 329 15 positives positive NNS work_ayatblpinzaztdzhilw6yqsi6m 329 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 329 17 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 329 18 negatives negative NNS work_ayatblpinzaztdzhilw6yqsi6m 329 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 330 1 Consider consider VB work_ayatblpinzaztdzhilw6yqsi6m 330 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 330 3 case case NN work_ayatblpinzaztdzhilw6yqsi6m 330 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 330 5 Qwerty Qwerty NNP work_ayatblpinzaztdzhilw6yqsi6m 330 6 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 330 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 330 8 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 330 9 uses use VBZ work_ayatblpinzaztdzhilw6yqsi6m 330 10 a a DT work_ayatblpinzaztdzhilw6yqsi6m 330 11 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 330 12 GPG GPG NNP work_ayatblpinzaztdzhilw6yqsi6m 330 13 executable executable JJ work_ayatblpinzaztdzhilw6yqsi6m 330 14 to to TO work_ayatblpinzaztdzhilw6yqsi6m 330 15 perform perform VB work_ayatblpinzaztdzhilw6yqsi6m 330 16 encryption encryption NN work_ayatblpinzaztdzhilw6yqsi6m 330 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 331 1 Perhaps perhaps RB work_ayatblpinzaztdzhilw6yqsi6m 331 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 331 3 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 331 4 solution solution NN work_ayatblpinzaztdzhilw6yqsi6m 331 5 would would MD work_ayatblpinzaztdzhilw6yqsi6m 331 6 correctly correctly RB work_ayatblpinzaztdzhilw6yqsi6m 331 7 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 331 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 331 9 GPG GPG NNP work_ayatblpinzaztdzhilw6yqsi6m 331 10 binary binary NN work_ayatblpinzaztdzhilw6yqsi6m 331 11 when when WRB work_ayatblpinzaztdzhilw6yqsi6m 331 12 used use VBN work_ayatblpinzaztdzhilw6yqsi6m 331 13 in in IN work_ayatblpinzaztdzhilw6yqsi6m 331 14 this this DT work_ayatblpinzaztdzhilw6yqsi6m 331 15 way way NN work_ayatblpinzaztdzhilw6yqsi6m 331 16 , , , work_ayatblpinzaztdzhilw6yqsi6m 331 17 but but CC work_ayatblpinzaztdzhilw6yqsi6m 331 18 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 331 19 suspect suspect VBP work_ayatblpinzaztdzhilw6yqsi6m 331 20 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 331 21 would would MD work_ayatblpinzaztdzhilw6yqsi6m 331 22 also also RB work_ayatblpinzaztdzhilw6yqsi6m 331 23 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 331 24 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 331 25 in in IN work_ayatblpinzaztdzhilw6yqsi6m 331 26 a a DT work_ayatblpinzaztdzhilw6yqsi6m 331 27 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 331 28 case case NN work_ayatblpinzaztdzhilw6yqsi6m 331 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 332 1 Since since IN work_ayatblpinzaztdzhilw6yqsi6m 332 2 in in IN work_ayatblpinzaztdzhilw6yqsi6m 332 3 this this DT work_ayatblpinzaztdzhilw6yqsi6m 332 4 work work NN work_ayatblpinzaztdzhilw6yqsi6m 332 5 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 332 6 did do VBD work_ayatblpinzaztdzhilw6yqsi6m 332 7 not not RB work_ayatblpinzaztdzhilw6yqsi6m 332 8 evaluate evaluate VB work_ayatblpinzaztdzhilw6yqsi6m 332 9 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 332 10 executables executable NNS work_ayatblpinzaztdzhilw6yqsi6m 332 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 332 12 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 332 13 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 332 14 not not RB work_ayatblpinzaztdzhilw6yqsi6m 332 15 clear clear JJ work_ayatblpinzaztdzhilw6yqsi6m 332 16 how how WRB work_ayatblpinzaztdzhilw6yqsi6m 332 17 the the DT work_ayatblpinzaztdzhilw6yqsi6m 332 18 system system NN work_ayatblpinzaztdzhilw6yqsi6m 332 19 performs perform VBZ work_ayatblpinzaztdzhilw6yqsi6m 332 20 with with IN work_ayatblpinzaztdzhilw6yqsi6m 332 21 software software NN work_ayatblpinzaztdzhilw6yqsi6m 332 22 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 332 23 performs perform VBZ work_ayatblpinzaztdzhilw6yqsi6m 332 24 encryption encryption NN work_ayatblpinzaztdzhilw6yqsi6m 332 25 and/or and/or CC work_ayatblpinzaztdzhilw6yqsi6m 332 26 compression compression NN work_ayatblpinzaztdzhilw6yqsi6m 332 27 tasks task NNS work_ayatblpinzaztdzhilw6yqsi6m 332 28 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 332 29 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 332 30 the the DT work_ayatblpinzaztdzhilw6yqsi6m 332 31 limitation limitation NN work_ayatblpinzaztdzhilw6yqsi6m 332 32 of of IN work_ayatblpinzaztdzhilw6yqsi6m 332 33 this this DT work_ayatblpinzaztdzhilw6yqsi6m 332 34 research research NN work_ayatblpinzaztdzhilw6yqsi6m 332 35 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 332 36 will will MD work_ayatblpinzaztdzhilw6yqsi6m 332 37 be be VB work_ayatblpinzaztdzhilw6yqsi6m 332 38 investigated investigate VBN work_ayatblpinzaztdzhilw6yqsi6m 332 39 in in IN work_ayatblpinzaztdzhilw6yqsi6m 332 40 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 332 41 future future JJ work_ayatblpinzaztdzhilw6yqsi6m 332 42 work work NN work_ayatblpinzaztdzhilw6yqsi6m 332 43 . . . work_ayatblpinzaztdzhilw6yqsi6m 333 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 333 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 333 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 333 4 collected collect VBN work_ayatblpinzaztdzhilw6yqsi6m 333 5 features feature NNS work_ayatblpinzaztdzhilw6yqsi6m 333 6 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 333 7 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 333 8 to to IN work_ayatblpinzaztdzhilw6yqsi6m 333 9 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 333 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 333 11 specific specific JJ work_ayatblpinzaztdzhilw6yqsi6m 333 12 environments environment NNS work_ayatblpinzaztdzhilw6yqsi6m 333 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 333 14 so so CC work_ayatblpinzaztdzhilw6yqsi6m 333 15 if if IN work_ayatblpinzaztdzhilw6yqsi6m 333 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 333 17 system system NN work_ayatblpinzaztdzhilw6yqsi6m 333 18 having have VBG work_ayatblpinzaztdzhilw6yqsi6m 333 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 333 20 same same JJ work_ayatblpinzaztdzhilw6yqsi6m 333 21 architecture architecture NN work_ayatblpinzaztdzhilw6yqsi6m 333 22 then then RB work_ayatblpinzaztdzhilw6yqsi6m 333 23 the the DT work_ayatblpinzaztdzhilw6yqsi6m 333 24 trained trained JJ work_ayatblpinzaztdzhilw6yqsi6m 333 25 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 333 26 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 333 27 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 333 28 applicable applicable JJ work_ayatblpinzaztdzhilw6yqsi6m 333 29 as as IN work_ayatblpinzaztdzhilw6yqsi6m 333 30 it -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 333 31 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 333 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 334 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 334 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 334 3 in in IN work_ayatblpinzaztdzhilw6yqsi6m 334 4 case case NN work_ayatblpinzaztdzhilw6yqsi6m 334 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 334 6 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 334 7 environment environment NN work_ayatblpinzaztdzhilw6yqsi6m 334 8 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 334 9 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 334 10 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 334 11 i.e. i.e. FW work_ayatblpinzaztdzhilw6yqsi6m 334 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 334 13 different different JJ work_ayatblpinzaztdzhilw6yqsi6m 334 14 architecture architecture NN work_ayatblpinzaztdzhilw6yqsi6m 334 15 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 334 16 then then RB work_ayatblpinzaztdzhilw6yqsi6m 334 17 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 334 18 have have VBP work_ayatblpinzaztdzhilw6yqsi6m 334 19 to to TO work_ayatblpinzaztdzhilw6yqsi6m 334 20 retrain retrain VB work_ayatblpinzaztdzhilw6yqsi6m 334 21 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 334 22 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 334 23 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 334 24 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 334 25 for for IN work_ayatblpinzaztdzhilw6yqsi6m 334 26 that that DT work_ayatblpinzaztdzhilw6yqsi6m 334 27 specific specific JJ work_ayatblpinzaztdzhilw6yqsi6m 334 28 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 334 29 environment environment NN work_ayatblpinzaztdzhilw6yqsi6m 334 30 . . . work_ayatblpinzaztdzhilw6yqsi6m 335 1 This this DT work_ayatblpinzaztdzhilw6yqsi6m 335 2 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 335 3 one one CD work_ayatblpinzaztdzhilw6yqsi6m 335 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 335 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 335 6 limitations limitation NNS work_ayatblpinzaztdzhilw6yqsi6m 335 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 335 8 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 335 9 proposed propose VBN work_ayatblpinzaztdzhilw6yqsi6m 335 10 work work NN work_ayatblpinzaztdzhilw6yqsi6m 335 11 that that WDT work_ayatblpinzaztdzhilw6yqsi6m 335 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 335 13 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 335 14 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 335 15 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 335 16 trained train VBN work_ayatblpinzaztdzhilw6yqsi6m 335 17 on on IN work_ayatblpinzaztdzhilw6yqsi6m 335 18 specific specific JJ work_ayatblpinzaztdzhilw6yqsi6m 335 19 architecture architecture NN work_ayatblpinzaztdzhilw6yqsi6m 335 20 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 335 21 not not RB work_ayatblpinzaztdzhilw6yqsi6m 335 22 portable portable JJ work_ayatblpinzaztdzhilw6yqsi6m 335 23 across across IN work_ayatblpinzaztdzhilw6yqsi6m 335 24 other other JJ work_ayatblpinzaztdzhilw6yqsi6m 335 25 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 335 26 architectures architecture NNS work_ayatblpinzaztdzhilw6yqsi6m 335 27 . . . work_ayatblpinzaztdzhilw6yqsi6m 336 1 Moreover moreover RB work_ayatblpinzaztdzhilw6yqsi6m 336 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 336 3 due due IN work_ayatblpinzaztdzhilw6yqsi6m 336 4 to to IN work_ayatblpinzaztdzhilw6yqsi6m 336 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 336 6 modest modest JJ work_ayatblpinzaztdzhilw6yqsi6m 336 7 dataset dataset JJ work_ayatblpinzaztdzhilw6yqsi6m 336 8 deep deep JJ work_ayatblpinzaztdzhilw6yqsi6m 336 9 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 336 10 mechanism mechanism NN work_ayatblpinzaztdzhilw6yqsi6m 336 11 at at IN work_ayatblpinzaztdzhilw6yqsi6m 336 12 present present JJ work_ayatblpinzaztdzhilw6yqsi6m 336 13 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 336 14 not not RB work_ayatblpinzaztdzhilw6yqsi6m 336 15 applicable applicable JJ work_ayatblpinzaztdzhilw6yqsi6m 336 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 337 1 However however RB work_ayatblpinzaztdzhilw6yqsi6m 337 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 337 3 in in IN work_ayatblpinzaztdzhilw6yqsi6m 337 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 337 5 future future NN work_ayatblpinzaztdzhilw6yqsi6m 337 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 337 7 we -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 337 8 intend intend VBP work_ayatblpinzaztdzhilw6yqsi6m 337 9 to to TO work_ayatblpinzaztdzhilw6yqsi6m 337 10 extend extend VB work_ayatblpinzaztdzhilw6yqsi6m 337 11 our -PRON- PRP$ work_ayatblpinzaztdzhilw6yqsi6m 337 12 dataset dataset NN work_ayatblpinzaztdzhilw6yqsi6m 337 13 to to TO work_ayatblpinzaztdzhilw6yqsi6m 337 14 implement implement VB work_ayatblpinzaztdzhilw6yqsi6m 337 15 more more RBR work_ayatblpinzaztdzhilw6yqsi6m 337 16 robust robust JJ work_ayatblpinzaztdzhilw6yqsi6m 337 17 Auto Auto NNP work_ayatblpinzaztdzhilw6yqsi6m 337 18 Denoising Denoising NNP work_ayatblpinzaztdzhilw6yqsi6m 337 19 Encoders Encoders NNPS work_ayatblpinzaztdzhilw6yqsi6m 337 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 337 21 which which WDT work_ayatblpinzaztdzhilw6yqsi6m 337 22 comprises comprise VBZ work_ayatblpinzaztdzhilw6yqsi6m 337 23 of of IN work_ayatblpinzaztdzhilw6yqsi6m 337 24 multiple multiple JJ work_ayatblpinzaztdzhilw6yqsi6m 337 25 layers layer NNS work_ayatblpinzaztdzhilw6yqsi6m 337 26 of of IN work_ayatblpinzaztdzhilw6yqsi6m 337 27 neural neural JJ work_ayatblpinzaztdzhilw6yqsi6m 337 28 networks network NNS work_ayatblpinzaztdzhilw6yqsi6m 337 29 and and CC work_ayatblpinzaztdzhilw6yqsi6m 337 30 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 337 31 best well RBS work_ayatblpinzaztdzhilw6yqsi6m 337 32 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 337 33 known know VBN work_ayatblpinzaztdzhilw6yqsi6m 337 34 for for IN work_ayatblpinzaztdzhilw6yqsi6m 337 35 providing provide VBG work_ayatblpinzaztdzhilw6yqsi6m 337 36 good good JJ work_ayatblpinzaztdzhilw6yqsi6m 337 37 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 337 38 . . . work_ayatblpinzaztdzhilw6yqsi6m 338 1 ADDITIONAL additional JJ work_ayatblpinzaztdzhilw6yqsi6m 338 2 INFORMATION information NN work_ayatblpinzaztdzhilw6yqsi6m 338 3 AND and CC work_ayatblpinzaztdzhilw6yqsi6m 338 4 DECLARATIONS declaration NNS work_ayatblpinzaztdzhilw6yqsi6m 338 5 Funding fund VBG work_ayatblpinzaztdzhilw6yqsi6m 338 6 The the DT work_ayatblpinzaztdzhilw6yqsi6m 338 7 work work NN work_ayatblpinzaztdzhilw6yqsi6m 338 8 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 338 9 partially partially RB work_ayatblpinzaztdzhilw6yqsi6m 338 10 funded fund VBN work_ayatblpinzaztdzhilw6yqsi6m 338 11 by by IN work_ayatblpinzaztdzhilw6yqsi6m 338 12 Deanship Deanship NNP work_ayatblpinzaztdzhilw6yqsi6m 338 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 338 14 Graduate Graduate NNP work_ayatblpinzaztdzhilw6yqsi6m 338 15 Studies Studies NNPS work_ayatblpinzaztdzhilw6yqsi6m 338 16 and and CC work_ayatblpinzaztdzhilw6yqsi6m 338 17 Research Research NNP work_ayatblpinzaztdzhilw6yqsi6m 338 18 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 338 19 DGSR DGSR NNP work_ayatblpinzaztdzhilw6yqsi6m 338 20 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 338 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 338 22 Ajman Ajman NNP work_ayatblpinzaztdzhilw6yqsi6m 338 23 University University NNP work_ayatblpinzaztdzhilw6yqsi6m 338 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 338 25 UAE UAE NNP work_ayatblpinzaztdzhilw6yqsi6m 338 26 . . . work_ayatblpinzaztdzhilw6yqsi6m 339 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 339 2 funders funder NNS work_ayatblpinzaztdzhilw6yqsi6m 339 3 had have VBD work_ayatblpinzaztdzhilw6yqsi6m 339 4 no no DT work_ayatblpinzaztdzhilw6yqsi6m 339 5 role role NN work_ayatblpinzaztdzhilw6yqsi6m 339 6 in in IN work_ayatblpinzaztdzhilw6yqsi6m 339 7 study study NN work_ayatblpinzaztdzhilw6yqsi6m 339 8 design design NN work_ayatblpinzaztdzhilw6yqsi6m 339 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 339 10 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 339 11 collection collection NN work_ayatblpinzaztdzhilw6yqsi6m 339 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 339 13 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 339 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 339 15 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 339 16 to to TO work_ayatblpinzaztdzhilw6yqsi6m 339 17 publish publish VB work_ayatblpinzaztdzhilw6yqsi6m 339 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 339 19 or or CC work_ayatblpinzaztdzhilw6yqsi6m 339 20 preparation preparation NN work_ayatblpinzaztdzhilw6yqsi6m 339 21 of of IN work_ayatblpinzaztdzhilw6yqsi6m 339 22 the the DT work_ayatblpinzaztdzhilw6yqsi6m 339 23 manuscript manuscript NN work_ayatblpinzaztdzhilw6yqsi6m 339 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 340 1 Grant Grant NNP work_ayatblpinzaztdzhilw6yqsi6m 340 2 Disclosures disclosure VBZ work_ayatblpinzaztdzhilw6yqsi6m 340 3 The the DT work_ayatblpinzaztdzhilw6yqsi6m 340 4 following follow VBG work_ayatblpinzaztdzhilw6yqsi6m 340 5 grant grant NN work_ayatblpinzaztdzhilw6yqsi6m 340 6 information information NN work_ayatblpinzaztdzhilw6yqsi6m 340 7 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 340 8 disclosed disclose VBN work_ayatblpinzaztdzhilw6yqsi6m 340 9 by by IN work_ayatblpinzaztdzhilw6yqsi6m 340 10 the the DT work_ayatblpinzaztdzhilw6yqsi6m 340 11 authors author NNS work_ayatblpinzaztdzhilw6yqsi6m 340 12 : : : work_ayatblpinzaztdzhilw6yqsi6m 340 13 Deanship deanship NN work_ayatblpinzaztdzhilw6yqsi6m 340 14 of of IN work_ayatblpinzaztdzhilw6yqsi6m 340 15 Graduate Graduate NNP work_ayatblpinzaztdzhilw6yqsi6m 340 16 Studies Studies NNPS work_ayatblpinzaztdzhilw6yqsi6m 340 17 and and CC work_ayatblpinzaztdzhilw6yqsi6m 340 18 Research Research NNP work_ayatblpinzaztdzhilw6yqsi6m 340 19 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 340 20 DGSR DGSR NNP work_ayatblpinzaztdzhilw6yqsi6m 340 21 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 340 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 341 1 Competing compete VBG work_ayatblpinzaztdzhilw6yqsi6m 341 2 Interests Interests NNPS work_ayatblpinzaztdzhilw6yqsi6m 341 3 Muhammad Muhammad NNP work_ayatblpinzaztdzhilw6yqsi6m 341 4 Aleem Aleem NNP work_ayatblpinzaztdzhilw6yqsi6m 341 5 is be VBZ work_ayatblpinzaztdzhilw6yqsi6m 341 6 an an DT work_ayatblpinzaztdzhilw6yqsi6m 341 7 Academic Academic NNP work_ayatblpinzaztdzhilw6yqsi6m 341 8 Editor Editor NNP work_ayatblpinzaztdzhilw6yqsi6m 341 9 for for IN work_ayatblpinzaztdzhilw6yqsi6m 341 10 PeerJ. PeerJ. NNP work_ayatblpinzaztdzhilw6yqsi6m 342 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 342 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 342 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 342 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 343 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 343 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 343 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 343 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 343 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 343 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 343 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 344 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 344 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 344 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 344 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 344 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 344 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 344 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 344 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 344 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 344 10 19/24 19/24 CD work_ayatblpinzaztdzhilw6yqsi6m 344 11 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 CD work_ayatblpinzaztdzhilw6yqsi6m 344 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 344 13 Author Author NNP work_ayatblpinzaztdzhilw6yqsi6m 344 14 Contributions contribution NNS work_ayatblpinzaztdzhilw6yqsi6m 344 15 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 344 16 Sana Sana NNP work_ayatblpinzaztdzhilw6yqsi6m 344 17 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 344 18 conceived conceive VBD work_ayatblpinzaztdzhilw6yqsi6m 344 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 344 20 designed design VBD work_ayatblpinzaztdzhilw6yqsi6m 344 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 344 22 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 344 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 344 24 performed perform VBD work_ayatblpinzaztdzhilw6yqsi6m 344 25 the the DT work_ayatblpinzaztdzhilw6yqsi6m 344 26 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 344 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 344 28 analyzed analyze VBD work_ayatblpinzaztdzhilw6yqsi6m 344 29 the the DT work_ayatblpinzaztdzhilw6yqsi6m 344 30 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 344 31 , , , work_ayatblpinzaztdzhilw6yqsi6m 344 32 performed perform VBD work_ayatblpinzaztdzhilw6yqsi6m 344 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 344 34 computation computation NN work_ayatblpinzaztdzhilw6yqsi6m 344 35 work work NN work_ayatblpinzaztdzhilw6yqsi6m 344 36 , , , work_ayatblpinzaztdzhilw6yqsi6m 344 37 prepared prepare VBN work_ayatblpinzaztdzhilw6yqsi6m 344 38 figures figure NNS work_ayatblpinzaztdzhilw6yqsi6m 344 39 and/or and/or CC work_ayatblpinzaztdzhilw6yqsi6m 344 40 tables table NNS work_ayatblpinzaztdzhilw6yqsi6m 344 41 , , , work_ayatblpinzaztdzhilw6yqsi6m 344 42 authored author VBN work_ayatblpinzaztdzhilw6yqsi6m 344 43 or or CC work_ayatblpinzaztdzhilw6yqsi6m 344 44 reviewed review VBN work_ayatblpinzaztdzhilw6yqsi6m 344 45 drafts draft NNS work_ayatblpinzaztdzhilw6yqsi6m 344 46 of of IN work_ayatblpinzaztdzhilw6yqsi6m 344 47 the the DT work_ayatblpinzaztdzhilw6yqsi6m 344 48 paper paper NN work_ayatblpinzaztdzhilw6yqsi6m 344 49 , , , work_ayatblpinzaztdzhilw6yqsi6m 344 50 and and CC work_ayatblpinzaztdzhilw6yqsi6m 344 51 approved approve VBD work_ayatblpinzaztdzhilw6yqsi6m 344 52 the the DT work_ayatblpinzaztdzhilw6yqsi6m 344 53 final final JJ work_ayatblpinzaztdzhilw6yqsi6m 344 54 draft draft NN work_ayatblpinzaztdzhilw6yqsi6m 344 55 . . . work_ayatblpinzaztdzhilw6yqsi6m 345 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 345 2 Rao Rao NNP work_ayatblpinzaztdzhilw6yqsi6m 345 3 Naveed Naveed NNP work_ayatblpinzaztdzhilw6yqsi6m 345 4 Bin Bin NNP work_ayatblpinzaztdzhilw6yqsi6m 345 5 Rais Rais NNP work_ayatblpinzaztdzhilw6yqsi6m 345 6 conceived conceive VBD work_ayatblpinzaztdzhilw6yqsi6m 345 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 345 8 designed design VBD work_ayatblpinzaztdzhilw6yqsi6m 345 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 345 10 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 345 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 345 12 analyzed analyze VBD work_ayatblpinzaztdzhilw6yqsi6m 345 13 the the DT work_ayatblpinzaztdzhilw6yqsi6m 345 14 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 345 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 345 16 prepared prepare VBN work_ayatblpinzaztdzhilw6yqsi6m 345 17 figures figure NNS work_ayatblpinzaztdzhilw6yqsi6m 345 18 and/or and/or CC work_ayatblpinzaztdzhilw6yqsi6m 345 19 tables table NNS work_ayatblpinzaztdzhilw6yqsi6m 345 20 , , , work_ayatblpinzaztdzhilw6yqsi6m 345 21 authored author VBN work_ayatblpinzaztdzhilw6yqsi6m 345 22 or or CC work_ayatblpinzaztdzhilw6yqsi6m 345 23 reviewed review VBN work_ayatblpinzaztdzhilw6yqsi6m 345 24 drafts draft NNS work_ayatblpinzaztdzhilw6yqsi6m 345 25 of of IN work_ayatblpinzaztdzhilw6yqsi6m 345 26 the the DT work_ayatblpinzaztdzhilw6yqsi6m 345 27 paper paper NN work_ayatblpinzaztdzhilw6yqsi6m 345 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 345 29 and and CC work_ayatblpinzaztdzhilw6yqsi6m 345 30 approved approve VBD work_ayatblpinzaztdzhilw6yqsi6m 345 31 the the DT work_ayatblpinzaztdzhilw6yqsi6m 345 32 final final JJ work_ayatblpinzaztdzhilw6yqsi6m 345 33 draft draft NN work_ayatblpinzaztdzhilw6yqsi6m 345 34 . . . work_ayatblpinzaztdzhilw6yqsi6m 346 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 346 2 Muhammad Muhammad NNP work_ayatblpinzaztdzhilw6yqsi6m 346 3 Aleem Aleem NNP work_ayatblpinzaztdzhilw6yqsi6m 346 4 conceived conceive VBD work_ayatblpinzaztdzhilw6yqsi6m 346 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 346 6 designed design VBD work_ayatblpinzaztdzhilw6yqsi6m 346 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 346 8 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 346 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 346 10 performed perform VBD work_ayatblpinzaztdzhilw6yqsi6m 346 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 346 12 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 346 13 , , , work_ayatblpinzaztdzhilw6yqsi6m 346 14 analyzed analyze VBD work_ayatblpinzaztdzhilw6yqsi6m 346 15 the the DT work_ayatblpinzaztdzhilw6yqsi6m 346 16 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 346 17 , , , work_ayatblpinzaztdzhilw6yqsi6m 346 18 performed perform VBD work_ayatblpinzaztdzhilw6yqsi6m 346 19 the the DT work_ayatblpinzaztdzhilw6yqsi6m 346 20 computation computation NN work_ayatblpinzaztdzhilw6yqsi6m 346 21 work work NN work_ayatblpinzaztdzhilw6yqsi6m 346 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 346 23 authored author VBN work_ayatblpinzaztdzhilw6yqsi6m 346 24 or or CC work_ayatblpinzaztdzhilw6yqsi6m 346 25 reviewed review VBN work_ayatblpinzaztdzhilw6yqsi6m 346 26 drafts draft NNS work_ayatblpinzaztdzhilw6yqsi6m 346 27 of of IN work_ayatblpinzaztdzhilw6yqsi6m 346 28 the the DT work_ayatblpinzaztdzhilw6yqsi6m 346 29 paper paper NN work_ayatblpinzaztdzhilw6yqsi6m 346 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 346 31 and and CC work_ayatblpinzaztdzhilw6yqsi6m 346 32 approved approve VBD work_ayatblpinzaztdzhilw6yqsi6m 346 33 the the DT work_ayatblpinzaztdzhilw6yqsi6m 346 34 final final JJ work_ayatblpinzaztdzhilw6yqsi6m 346 35 draft draft NN work_ayatblpinzaztdzhilw6yqsi6m 346 36 . . . work_ayatblpinzaztdzhilw6yqsi6m 347 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 347 2 Muhammad Muhammad NNP work_ayatblpinzaztdzhilw6yqsi6m 347 3 Arshad Arshad NNP work_ayatblpinzaztdzhilw6yqsi6m 347 4 Islam Islam NNP work_ayatblpinzaztdzhilw6yqsi6m 347 5 conceived conceive VBD work_ayatblpinzaztdzhilw6yqsi6m 347 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 347 7 designed design VBD work_ayatblpinzaztdzhilw6yqsi6m 347 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 347 9 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 347 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 347 11 authored author VBN work_ayatblpinzaztdzhilw6yqsi6m 347 12 or or CC work_ayatblpinzaztdzhilw6yqsi6m 347 13 reviewed review VBN work_ayatblpinzaztdzhilw6yqsi6m 347 14 drafts draft NNS work_ayatblpinzaztdzhilw6yqsi6m 347 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 347 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 347 17 paper paper NN work_ayatblpinzaztdzhilw6yqsi6m 347 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 347 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 347 20 approved approve VBD work_ayatblpinzaztdzhilw6yqsi6m 347 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 347 22 final final JJ work_ayatblpinzaztdzhilw6yqsi6m 347 23 draft draft NN work_ayatblpinzaztdzhilw6yqsi6m 347 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 348 1 � � NNP work_ayatblpinzaztdzhilw6yqsi6m 348 2 Muhammad Muhammad NNP work_ayatblpinzaztdzhilw6yqsi6m 348 3 Azhar Azhar NNP work_ayatblpinzaztdzhilw6yqsi6m 348 4 Iqbal Iqbal NNP work_ayatblpinzaztdzhilw6yqsi6m 348 5 conceived conceive VBD work_ayatblpinzaztdzhilw6yqsi6m 348 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 348 7 designed design VBD work_ayatblpinzaztdzhilw6yqsi6m 348 8 the the DT work_ayatblpinzaztdzhilw6yqsi6m 348 9 experiments experiment NNS work_ayatblpinzaztdzhilw6yqsi6m 348 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 348 11 authored author VBN work_ayatblpinzaztdzhilw6yqsi6m 348 12 or or CC work_ayatblpinzaztdzhilw6yqsi6m 348 13 reviewed review VBN work_ayatblpinzaztdzhilw6yqsi6m 348 14 drafts draft NNS work_ayatblpinzaztdzhilw6yqsi6m 348 15 of of IN work_ayatblpinzaztdzhilw6yqsi6m 348 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 348 17 paper paper NN work_ayatblpinzaztdzhilw6yqsi6m 348 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 348 19 and and CC work_ayatblpinzaztdzhilw6yqsi6m 348 20 approved approve VBD work_ayatblpinzaztdzhilw6yqsi6m 348 21 the the DT work_ayatblpinzaztdzhilw6yqsi6m 348 22 final final JJ work_ayatblpinzaztdzhilw6yqsi6m 348 23 draft draft NN work_ayatblpinzaztdzhilw6yqsi6m 348 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 349 1 Data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 349 2 Availability availability NN work_ayatblpinzaztdzhilw6yqsi6m 349 3 The the DT work_ayatblpinzaztdzhilw6yqsi6m 349 4 following follow VBG work_ayatblpinzaztdzhilw6yqsi6m 349 5 information information NN work_ayatblpinzaztdzhilw6yqsi6m 349 6 was be VBD work_ayatblpinzaztdzhilw6yqsi6m 349 7 supplied supply VBN work_ayatblpinzaztdzhilw6yqsi6m 349 8 regarding regard VBG work_ayatblpinzaztdzhilw6yqsi6m 349 9 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 349 10 availability availability NN work_ayatblpinzaztdzhilw6yqsi6m 349 11 : : : work_ayatblpinzaztdzhilw6yqsi6m 349 12 Raw raw JJ work_ayatblpinzaztdzhilw6yqsi6m 349 13 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 349 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 349 15 sample sample VB work_ayatblpinzaztdzhilw6yqsi6m 349 16 python python NNP work_ayatblpinzaztdzhilw6yqsi6m 349 17 script script NN work_ayatblpinzaztdzhilw6yqsi6m 349 18 are be VBP work_ayatblpinzaztdzhilw6yqsi6m 349 19 available available JJ work_ayatblpinzaztdzhilw6yqsi6m 349 20 as as IN work_ayatblpinzaztdzhilw6yqsi6m 349 21 a a DT work_ayatblpinzaztdzhilw6yqsi6m 349 22 Supplemental Supplemental NNP work_ayatblpinzaztdzhilw6yqsi6m 349 23 File File NNP work_ayatblpinzaztdzhilw6yqsi6m 349 24 . . . work_ayatblpinzaztdzhilw6yqsi6m 350 1 Supplemental supplemental JJ work_ayatblpinzaztdzhilw6yqsi6m 350 2 Information information NN work_ayatblpinzaztdzhilw6yqsi6m 350 3 Supplemental supplemental JJ work_ayatblpinzaztdzhilw6yqsi6m 350 4 information information NN work_ayatblpinzaztdzhilw6yqsi6m 350 5 for for IN work_ayatblpinzaztdzhilw6yqsi6m 350 6 this this DT work_ayatblpinzaztdzhilw6yqsi6m 350 7 article article NN work_ayatblpinzaztdzhilw6yqsi6m 350 8 can can MD work_ayatblpinzaztdzhilw6yqsi6m 350 9 be be VB work_ayatblpinzaztdzhilw6yqsi6m 350 10 found find VBN work_ayatblpinzaztdzhilw6yqsi6m 350 11 online online RB work_ayatblpinzaztdzhilw6yqsi6m 350 12 at at IN work_ayatblpinzaztdzhilw6yqsi6m 350 13 http://dx.doi.org/10.7717/ http://dx.doi.org/10.7717/ -RRB- work_ayatblpinzaztdzhilw6yqsi6m 350 14 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 350 15 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 350 16 cs.361#supplemental cs.361#supplemental NNP work_ayatblpinzaztdzhilw6yqsi6m 350 17 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 350 18 information information NN work_ayatblpinzaztdzhilw6yqsi6m 350 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 351 1 REFERENCES references JJ work_ayatblpinzaztdzhilw6yqsi6m 351 2 Ahmadian ahmadian JJ work_ayatblpinzaztdzhilw6yqsi6m 351 3 MM mm NN work_ayatblpinzaztdzhilw6yqsi6m 351 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 351 5 Shahriari Shahriari NNP work_ayatblpinzaztdzhilw6yqsi6m 351 6 HR HR NNP work_ayatblpinzaztdzhilw6yqsi6m 351 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 351 8 Ghaffarian Ghaffarian NNP work_ayatblpinzaztdzhilw6yqsi6m 351 9 SM SM NNP work_ayatblpinzaztdzhilw6yqsi6m 351 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 352 1 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 352 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 353 1 Connection connection NN work_ayatblpinzaztdzhilw6yqsi6m 353 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 353 3 monitor monitor NN work_ayatblpinzaztdzhilw6yqsi6m 353 4 & & CC work_ayatblpinzaztdzhilw6yqsi6m 353 5 connection connection NN work_ayatblpinzaztdzhilw6yqsi6m 353 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 353 7 breaker breaker NN work_ayatblpinzaztdzhilw6yqsi6m 353 8 : : : work_ayatblpinzaztdzhilw6yqsi6m 353 9 a a DT work_ayatblpinzaztdzhilw6yqsi6m 353 10 novel novel JJ work_ayatblpinzaztdzhilw6yqsi6m 353 11 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 353 12 for for IN work_ayatblpinzaztdzhilw6yqsi6m 353 13 prevention prevention NN work_ayatblpinzaztdzhilw6yqsi6m 353 14 and and CC work_ayatblpinzaztdzhilw6yqsi6m 353 15 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 353 16 of of IN work_ayatblpinzaztdzhilw6yqsi6m 353 17 high high JJ work_ayatblpinzaztdzhilw6yqsi6m 353 18 survivable survivable JJ work_ayatblpinzaztdzhilw6yqsi6m 353 19 ransomwares ransomware NNS work_ayatblpinzaztdzhilw6yqsi6m 353 20 . . . work_ayatblpinzaztdzhilw6yqsi6m 354 1 New New NNP work_ayatblpinzaztdzhilw6yqsi6m 354 2 York York NNP work_ayatblpinzaztdzhilw6yqsi6m 354 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 354 4 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 354 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 354 6 79–84 79–84 CD work_ayatblpinzaztdzhilw6yqsi6m 354 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 355 1 Al Al NNP work_ayatblpinzaztdzhilw6yqsi6m 355 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 355 3 rimy rimy NNP work_ayatblpinzaztdzhilw6yqsi6m 355 4 BAS BAS NNP work_ayatblpinzaztdzhilw6yqsi6m 355 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 355 6 Maarof Maarof NNP work_ayatblpinzaztdzhilw6yqsi6m 355 7 MA MA NNP work_ayatblpinzaztdzhilw6yqsi6m 355 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 355 9 Shaid Shaid NNP work_ayatblpinzaztdzhilw6yqsi6m 355 10 SZM SZM NNP work_ayatblpinzaztdzhilw6yqsi6m 355 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 356 1 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 356 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 357 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 357 2 0-Day 0-day CD work_ayatblpinzaztdzhilw6yqsi6m 357 3 Aware Aware NNP work_ayatblpinzaztdzhilw6yqsi6m 357 4 Crypto Crypto NNP work_ayatblpinzaztdzhilw6yqsi6m 357 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 357 6 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 357 7 Early early JJ work_ayatblpinzaztdzhilw6yqsi6m 357 8 Behavioral Behavioral NNP work_ayatblpinzaztdzhilw6yqsi6m 357 9 Detection Detection NNP work_ayatblpinzaztdzhilw6yqsi6m 357 10 Framework Framework NNP work_ayatblpinzaztdzhilw6yqsi6m 357 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 358 1 Cham Cham NNP work_ayatblpinzaztdzhilw6yqsi6m 358 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 358 3 Springer Springer NNP work_ayatblpinzaztdzhilw6yqsi6m 358 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 358 5 758–766 758–766 CD work_ayatblpinzaztdzhilw6yqsi6m 358 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 359 1 Al Al NNP work_ayatblpinzaztdzhilw6yqsi6m 359 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 359 3 rimy rimy NNP work_ayatblpinzaztdzhilw6yqsi6m 359 4 BAS BAS NNP work_ayatblpinzaztdzhilw6yqsi6m 359 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 359 6 Maarof Maarof NNP work_ayatblpinzaztdzhilw6yqsi6m 359 7 MA MA NNP work_ayatblpinzaztdzhilw6yqsi6m 359 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 359 9 Shaid Shaid NNP work_ayatblpinzaztdzhilw6yqsi6m 359 10 SZM SZM NNP work_ayatblpinzaztdzhilw6yqsi6m 359 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 360 1 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 360 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 361 1 Ransomware ransomware VB work_ayatblpinzaztdzhilw6yqsi6m 361 2 threat threat NN work_ayatblpinzaztdzhilw6yqsi6m 361 3 success success NN work_ayatblpinzaztdzhilw6yqsi6m 361 4 factors factor NNS work_ayatblpinzaztdzhilw6yqsi6m 361 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 361 6 taxonomy taxonomy NN work_ayatblpinzaztdzhilw6yqsi6m 361 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 361 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 361 9 countermeasures countermeasure NNS work_ayatblpinzaztdzhilw6yqsi6m 361 10 : : : work_ayatblpinzaztdzhilw6yqsi6m 361 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 361 12 survey survey NN work_ayatblpinzaztdzhilw6yqsi6m 361 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 361 14 research research NN work_ayatblpinzaztdzhilw6yqsi6m 361 15 directions direction NNS work_ayatblpinzaztdzhilw6yqsi6m 361 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 362 1 Computers Computers NNPS work_ayatblpinzaztdzhilw6yqsi6m 362 2 & & CC work_ayatblpinzaztdzhilw6yqsi6m 362 3 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 362 4 74:144–166 74:144–166 CD work_ayatblpinzaztdzhilw6yqsi6m 362 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 362 6 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 362 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 362 8 j.cose.2018.01.001 j.cose.2018.01.001 CD work_ayatblpinzaztdzhilw6yqsi6m 362 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 363 1 Alam Alam NNP work_ayatblpinzaztdzhilw6yqsi6m 363 2 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 363 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 363 4 Sinha Sinha NNP work_ayatblpinzaztdzhilw6yqsi6m 363 5 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 363 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 363 7 Bhattacharya Bhattacharya NNP work_ayatblpinzaztdzhilw6yqsi6m 363 8 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 363 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 363 10 Dutta Dutta NNP work_ayatblpinzaztdzhilw6yqsi6m 363 11 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 363 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 363 13 Mukhopadhyay Mukhopadhyay NNP work_ayatblpinzaztdzhilw6yqsi6m 363 14 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 363 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 363 16 Chattopadhyay Chattopadhyay NNP work_ayatblpinzaztdzhilw6yqsi6m 363 17 A. a. NN work_ayatblpinzaztdzhilw6yqsi6m 364 1 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 364 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 365 1 RAPPER RAPPER NNP work_ayatblpinzaztdzhilw6yqsi6m 365 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 365 3 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 365 4 prevention prevention NN work_ayatblpinzaztdzhilw6yqsi6m 365 5 via via IN work_ayatblpinzaztdzhilw6yqsi6m 365 6 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 365 7 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 365 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 366 1 ArXiv ArXiv NNP work_ayatblpinzaztdzhilw6yqsi6m 366 2 Available available JJ work_ayatblpinzaztdzhilw6yqsi6m 366 3 at at IN work_ayatblpinzaztdzhilw6yqsi6m 366 4 http://arxiv.org/ http://arxiv.org/ CD work_ayatblpinzaztdzhilw6yqsi6m 366 5 abs/2004.01712 abs/2004.01712 NN work_ayatblpinzaztdzhilw6yqsi6m 366 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 367 1 Ali Ali NNP work_ayatblpinzaztdzhilw6yqsi6m 367 2 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 368 1 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 368 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 369 1 Ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 369 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 369 3 A a DT work_ayatblpinzaztdzhilw6yqsi6m 369 4 research research NN work_ayatblpinzaztdzhilw6yqsi6m 369 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 369 6 a a DT work_ayatblpinzaztdzhilw6yqsi6m 369 7 personal personal JJ work_ayatblpinzaztdzhilw6yqsi6m 369 8 case case NN work_ayatblpinzaztdzhilw6yqsi6m 369 9 study study NN work_ayatblpinzaztdzhilw6yqsi6m 369 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 369 11 dealing deal VBG work_ayatblpinzaztdzhilw6yqsi6m 369 12 with with IN work_ayatblpinzaztdzhilw6yqsi6m 369 13 this this DT work_ayatblpinzaztdzhilw6yqsi6m 369 14 nasty nasty JJ work_ayatblpinzaztdzhilw6yqsi6m 369 15 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 369 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 370 1 Issues issue NNS work_ayatblpinzaztdzhilw6yqsi6m 370 2 in in IN work_ayatblpinzaztdzhilw6yqsi6m 370 3 Informing Informing NNP work_ayatblpinzaztdzhilw6yqsi6m 370 4 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 370 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 370 6 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 370 7 Technology Technology NNP work_ayatblpinzaztdzhilw6yqsi6m 370 8 14:87–99 14:87–99 CD work_ayatblpinzaztdzhilw6yqsi6m 370 9 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 370 10 10.28945/3707 10.28945/3707 CD work_ayatblpinzaztdzhilw6yqsi6m 370 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 371 1 Alzahrani Alzahrani NNP work_ayatblpinzaztdzhilw6yqsi6m 371 2 N N NNP work_ayatblpinzaztdzhilw6yqsi6m 371 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 371 4 Alghazzawi Alghazzawi NNP work_ayatblpinzaztdzhilw6yqsi6m 371 5 D. D. NNP work_ayatblpinzaztdzhilw6yqsi6m 371 6 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 371 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 372 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 372 2 review review NN work_ayatblpinzaztdzhilw6yqsi6m 372 3 on on IN work_ayatblpinzaztdzhilw6yqsi6m 372 4 android android NN work_ayatblpinzaztdzhilw6yqsi6m 372 5 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 372 6 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 372 7 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 372 8 deep deep JJ work_ayatblpinzaztdzhilw6yqsi6m 372 9 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 372 10 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 372 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 373 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 373 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 373 3 Proceedings proceeding NNS work_ayatblpinzaztdzhilw6yqsi6m 373 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 373 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 373 6 11th 11th JJ work_ayatblpinzaztdzhilw6yqsi6m 373 7 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 373 8 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 373 9 on on IN work_ayatblpinzaztdzhilw6yqsi6m 373 10 Management Management NNP work_ayatblpinzaztdzhilw6yqsi6m 373 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 373 12 Digital Digital NNP work_ayatblpinzaztdzhilw6yqsi6m 373 13 EcoSystems EcoSystems NNP work_ayatblpinzaztdzhilw6yqsi6m 373 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 374 1 330–335 330–335 CD work_ayatblpinzaztdzhilw6yqsi6m 374 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 375 1 Anderson Anderson NNP work_ayatblpinzaztdzhilw6yqsi6m 375 2 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 375 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 375 4 Thane Thane NNP work_ayatblpinzaztdzhilw6yqsi6m 375 5 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 375 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 375 7 Alfonso Alfonso NNP work_ayatblpinzaztdzhilw6yqsi6m 375 8 V. V. NNP work_ayatblpinzaztdzhilw6yqsi6m 375 9 1995 1995 CD work_ayatblpinzaztdzhilw6yqsi6m 375 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 376 1 Next next JJ work_ayatblpinzaztdzhilw6yqsi6m 376 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 376 3 generation generation NN work_ayatblpinzaztdzhilw6yqsi6m 376 4 intrusion intrusion NN work_ayatblpinzaztdzhilw6yqsi6m 376 5 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 376 6 expert expert NN work_ayatblpinzaztdzhilw6yqsi6m 376 7 system system NN work_ayatblpinzaztdzhilw6yqsi6m 376 8 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 376 9 NIDES NIDES NNP work_ayatblpinzaztdzhilw6yqsi6m 376 10 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 376 11 : : : work_ayatblpinzaztdzhilw6yqsi6m 376 12 a a DT work_ayatblpinzaztdzhilw6yqsi6m 376 13 summary summary NN work_ayatblpinzaztdzhilw6yqsi6m 376 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 377 1 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 377 2 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 377 3 Laboratory Laboratory NNP work_ayatblpinzaztdzhilw6yqsi6m 377 4 SRI SRI NNP work_ayatblpinzaztdzhilw6yqsi6m 377 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 377 6 CSL-95 csl-95 CD work_ayatblpinzaztdzhilw6yqsi6m 377 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 377 8 07 07 CD work_ayatblpinzaztdzhilw6yqsi6m 377 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 378 1 Available available JJ work_ayatblpinzaztdzhilw6yqsi6m 378 2 at at IN work_ayatblpinzaztdzhilw6yqsi6m 378 3 http://www.csl.sri.com/papers/4sri/4sri.pdf http://www.csl.sri.com/papers/4sri/4sri.pdf NN work_ayatblpinzaztdzhilw6yqsi6m 378 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 379 1 Andronio Andronio NNP work_ayatblpinzaztdzhilw6yqsi6m 379 2 N N NNP work_ayatblpinzaztdzhilw6yqsi6m 379 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 379 4 Zanero Zanero NNP work_ayatblpinzaztdzhilw6yqsi6m 379 5 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 379 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 379 7 Maggi Maggi NNP work_ayatblpinzaztdzhilw6yqsi6m 379 8 F. F. NNP work_ayatblpinzaztdzhilw6yqsi6m 379 9 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 379 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 380 1 Heldroid heldroid NN work_ayatblpinzaztdzhilw6yqsi6m 380 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 380 3 dissecting dissect VBG work_ayatblpinzaztdzhilw6yqsi6m 380 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 380 5 detecting detect VBG work_ayatblpinzaztdzhilw6yqsi6m 380 6 mobile mobile JJ work_ayatblpinzaztdzhilw6yqsi6m 380 7 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 380 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 381 1 New New NNP work_ayatblpinzaztdzhilw6yqsi6m 381 2 York York NNP work_ayatblpinzaztdzhilw6yqsi6m 381 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 381 4 Springer Springer NNP work_ayatblpinzaztdzhilw6yqsi6m 381 5 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 381 6 Publishing Publishing NNP work_ayatblpinzaztdzhilw6yqsi6m 381 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 381 8 382–404 382–404 CD work_ayatblpinzaztdzhilw6yqsi6m 381 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 382 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 382 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 382 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 382 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 383 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 383 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 383 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 383 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 383 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 383 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 383 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 384 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 384 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 384 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 384 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 384 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 384 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 384 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 384 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 384 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 384 10 20/24 20/24 CD work_ayatblpinzaztdzhilw6yqsi6m 384 11 http://dx.doi.org/10.7717/peerj-cs.361#supplemental-information http://dx.doi.org/10.7717/peerj-cs.361#supplemental-information NNP work_ayatblpinzaztdzhilw6yqsi6m 384 12 http://dx.doi.org/10.7717/peerj-cs.361#supplemental-information http://dx.doi.org/10.7717/peerj-cs.361#supplemental-information NNP work_ayatblpinzaztdzhilw6yqsi6m 384 13 http://dx.doi.org/10.7717/peerj-cs.361#supplemental-information http://dx.doi.org/10.7717/peerj-cs.361#supplemental-information NNP work_ayatblpinzaztdzhilw6yqsi6m 384 14 http://dx.doi.org/10.1016/j.cose.2018.01.001 http://dx.doi.org/10.1016/j.cose.2018.01.001 NNP work_ayatblpinzaztdzhilw6yqsi6m 384 15 http://arxiv.org/abs/2004.01712 http://arxiv.org/abs/2004.01712 NNP work_ayatblpinzaztdzhilw6yqsi6m 384 16 http://arxiv.org/abs/2004.01712 http://arxiv.org/abs/2004.01712 NNP work_ayatblpinzaztdzhilw6yqsi6m 384 17 http://dx.doi.org/10.28945/3707 http://dx.doi.org/10.28945/3707 NNP work_ayatblpinzaztdzhilw6yqsi6m 384 18 http://www.csl.sri.com/papers/4sri/4sri.pdf http://www.csl.sri.com/papers/4sri/4sri.pdf NN work_ayatblpinzaztdzhilw6yqsi6m 384 19 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 384 20 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 384 21 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 384 22 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 384 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 384 24 Aleem Aleem NNP work_ayatblpinzaztdzhilw6yqsi6m 384 25 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 384 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 384 27 Iqbal Iqbal NNP work_ayatblpinzaztdzhilw6yqsi6m 384 28 MA MA NNP work_ayatblpinzaztdzhilw6yqsi6m 384 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 384 30 Islam Islam NNP work_ayatblpinzaztdzhilw6yqsi6m 384 31 MA MA NNP work_ayatblpinzaztdzhilw6yqsi6m 384 32 . . . work_ayatblpinzaztdzhilw6yqsi6m 385 1 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 385 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 386 1 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 386 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 386 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 386 4 Survey Survey NNP work_ayatblpinzaztdzhilw6yqsi6m 386 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 386 6 Trends Trends NNPS work_ayatblpinzaztdzhilw6yqsi6m 386 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 387 1 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 387 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 387 3 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 387 4 Assurance Assurance NNP work_ayatblpinzaztdzhilw6yqsi6m 387 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 387 6 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 387 7 12:48–58 12:48–58 CD work_ayatblpinzaztdzhilw6yqsi6m 387 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 388 1 Bahador Bahador NNP work_ayatblpinzaztdzhilw6yqsi6m 388 2 MB MB NNS work_ayatblpinzaztdzhilw6yqsi6m 388 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 388 4 Abadi Abadi NNP work_ayatblpinzaztdzhilw6yqsi6m 388 5 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 388 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 388 7 Tajoddin Tajoddin NNP work_ayatblpinzaztdzhilw6yqsi6m 388 8 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 389 1 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 389 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 390 1 Hpcmalhunter hpcmalhunter NN work_ayatblpinzaztdzhilw6yqsi6m 390 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 390 3 behavioral behavioral JJ work_ayatblpinzaztdzhilw6yqsi6m 390 4 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 390 5 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 390 6 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 390 7 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 390 8 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 390 9 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 390 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 390 11 singular singular JJ work_ayatblpinzaztdzhilw6yqsi6m 390 12 value value NN work_ayatblpinzaztdzhilw6yqsi6m 390 13 decomposition decomposition NN work_ayatblpinzaztdzhilw6yqsi6m 390 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 391 1 New New NNP work_ayatblpinzaztdzhilw6yqsi6m 391 2 York York NNP work_ayatblpinzaztdzhilw6yqsi6m 391 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 391 4 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 391 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 391 6 703–708 703–708 CD work_ayatblpinzaztdzhilw6yqsi6m 391 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 392 1 Bahador Bahador NNP work_ayatblpinzaztdzhilw6yqsi6m 392 2 MB MB NNS work_ayatblpinzaztdzhilw6yqsi6m 392 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 392 4 Abadi Abadi NNP work_ayatblpinzaztdzhilw6yqsi6m 392 5 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 392 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 392 7 Tajoddin Tajoddin NNP work_ayatblpinzaztdzhilw6yqsi6m 392 8 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 393 1 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 393 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 394 1 HLMD HLMD NNP work_ayatblpinzaztdzhilw6yqsi6m 394 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 394 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 394 4 signature signature NN work_ayatblpinzaztdzhilw6yqsi6m 394 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 394 6 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 394 7 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 394 8 to to IN work_ayatblpinzaztdzhilw6yqsi6m 394 9 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 394 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 394 11 level level NN work_ayatblpinzaztdzhilw6yqsi6m 394 12 behavioral behavioral JJ work_ayatblpinzaztdzhilw6yqsi6m 394 13 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 394 14 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 394 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 394 16 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 394 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 395 1 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 395 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 395 3 Supercomputing supercompute VBG work_ayatblpinzaztdzhilw6yqsi6m 395 4 75(8):5551–5582 75(8):5551–5582 CD work_ayatblpinzaztdzhilw6yqsi6m 395 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 395 6 10.1007 10.1007 CD work_ayatblpinzaztdzhilw6yqsi6m 395 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 395 8 s11227 s11227 CD work_ayatblpinzaztdzhilw6yqsi6m 395 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 395 10 019 019 CD work_ayatblpinzaztdzhilw6yqsi6m 395 11 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 395 12 02810-z 02810-z NN work_ayatblpinzaztdzhilw6yqsi6m 395 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 396 1 Basu basu JJ work_ayatblpinzaztdzhilw6yqsi6m 396 2 K K NNP work_ayatblpinzaztdzhilw6yqsi6m 396 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 396 4 Krishnamurthy Krishnamurthy NNP work_ayatblpinzaztdzhilw6yqsi6m 396 5 P P NNP work_ayatblpinzaztdzhilw6yqsi6m 396 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 396 7 Khorrami Khorrami NNP work_ayatblpinzaztdzhilw6yqsi6m 396 8 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 396 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 396 10 Karri Karri NNP work_ayatblpinzaztdzhilw6yqsi6m 396 11 R. R. NNP work_ayatblpinzaztdzhilw6yqsi6m 396 12 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 396 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 397 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 397 2 theoretical theoretical JJ work_ayatblpinzaztdzhilw6yqsi6m 397 3 study study NN work_ayatblpinzaztdzhilw6yqsi6m 397 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 397 5 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 397 6 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 397 7 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 397 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 397 9 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 397 10 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 397 11 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 397 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 398 1 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 398 2 Transactions transaction NNS work_ayatblpinzaztdzhilw6yqsi6m 398 3 on on IN work_ayatblpinzaztdzhilw6yqsi6m 398 4 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 398 5 Forensics Forensics NNPS work_ayatblpinzaztdzhilw6yqsi6m 398 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 398 7 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 398 8 15:512–525 15:512–525 CD work_ayatblpinzaztdzhilw6yqsi6m 398 9 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 398 10 10.1109 10.1109 CD work_ayatblpinzaztdzhilw6yqsi6m 398 11 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 398 12 TIFS.2019.2924549 TIFS.2019.2924549 NNP work_ayatblpinzaztdzhilw6yqsi6m 398 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 399 1 Behera Behera NNP work_ayatblpinzaztdzhilw6yqsi6m 399 2 CK CK NNP work_ayatblpinzaztdzhilw6yqsi6m 399 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 399 4 Bhaskari Bhaskari NNP work_ayatblpinzaztdzhilw6yqsi6m 399 5 DL DL NNP work_ayatblpinzaztdzhilw6yqsi6m 399 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 400 1 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 400 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 401 1 Different different JJ work_ayatblpinzaztdzhilw6yqsi6m 401 2 obfuscation obfuscation NN work_ayatblpinzaztdzhilw6yqsi6m 401 3 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 401 4 for for IN work_ayatblpinzaztdzhilw6yqsi6m 401 5 code code NN work_ayatblpinzaztdzhilw6yqsi6m 401 6 protection protection NN work_ayatblpinzaztdzhilw6yqsi6m 401 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 402 1 Procedia Procedia NNP work_ayatblpinzaztdzhilw6yqsi6m 402 2 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 402 3 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 402 4 70:757–763 70:757–763 CD work_ayatblpinzaztdzhilw6yqsi6m 402 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 402 6 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 402 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 402 8 j.procs.2015.10.114 j.procs.2015.10.114 ADD work_ayatblpinzaztdzhilw6yqsi6m 402 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 403 1 Beneventi Beneventi NNP work_ayatblpinzaztdzhilw6yqsi6m 403 2 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 403 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 403 4 Bartolini Bartolini NNP work_ayatblpinzaztdzhilw6yqsi6m 403 5 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 403 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 403 7 Cavazzoni Cavazzoni NNP work_ayatblpinzaztdzhilw6yqsi6m 403 8 C C NNP work_ayatblpinzaztdzhilw6yqsi6m 403 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 403 10 Benini Benini NNP work_ayatblpinzaztdzhilw6yqsi6m 403 11 L. L. NNP work_ayatblpinzaztdzhilw6yqsi6m 403 12 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 403 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 404 1 Continuous continuous JJ work_ayatblpinzaztdzhilw6yqsi6m 404 2 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 404 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 404 4 HPC hpc NN work_ayatblpinzaztdzhilw6yqsi6m 404 5 infrastructure infrastructure NN work_ayatblpinzaztdzhilw6yqsi6m 404 6 models model NNS work_ayatblpinzaztdzhilw6yqsi6m 404 7 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 404 8 big big JJ work_ayatblpinzaztdzhilw6yqsi6m 404 9 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 404 10 analytics analytic NNS work_ayatblpinzaztdzhilw6yqsi6m 404 11 and and CC work_ayatblpinzaztdzhilw6yqsi6m 404 12 in in IN work_ayatblpinzaztdzhilw6yqsi6m 404 13 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 404 14 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 404 15 processing processing NN work_ayatblpinzaztdzhilw6yqsi6m 404 16 tools tool NNS work_ayatblpinzaztdzhilw6yqsi6m 404 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 405 1 New New NNP work_ayatblpinzaztdzhilw6yqsi6m 405 2 York York NNP work_ayatblpinzaztdzhilw6yqsi6m 405 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 405 4 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 405 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 405 6 1038–1043 1038–1043 CD work_ayatblpinzaztdzhilw6yqsi6m 405 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 406 1 Black Black NNP work_ayatblpinzaztdzhilw6yqsi6m 406 2 P p NN work_ayatblpinzaztdzhilw6yqsi6m 406 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 406 4 Sohail Sohail NNP work_ayatblpinzaztdzhilw6yqsi6m 406 5 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 406 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 406 7 Gondal Gondal NNP work_ayatblpinzaztdzhilw6yqsi6m 406 8 I I NNP work_ayatblpinzaztdzhilw6yqsi6m 406 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 406 10 Kamruzzaman Kamruzzaman NNP work_ayatblpinzaztdzhilw6yqsi6m 406 11 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 406 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 406 13 Vamplew Vamplew NNP work_ayatblpinzaztdzhilw6yqsi6m 406 14 P P NNP work_ayatblpinzaztdzhilw6yqsi6m 406 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 406 16 Watters Watters NNP work_ayatblpinzaztdzhilw6yqsi6m 406 17 P. P. NNP work_ayatblpinzaztdzhilw6yqsi6m 406 18 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 406 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 407 1 API API NNP work_ayatblpinzaztdzhilw6yqsi6m 407 2 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 407 3 discrimination discrimination NN work_ayatblpinzaztdzhilw6yqsi6m 407 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 407 5 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 407 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 407 7 benign benign JJ work_ayatblpinzaztdzhilw6yqsi6m 407 8 cryptographic cryptographic JJ work_ayatblpinzaztdzhilw6yqsi6m 407 9 programs program NNS work_ayatblpinzaztdzhilw6yqsi6m 407 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 408 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 408 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 408 3 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 408 4 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 408 5 on on IN work_ayatblpinzaztdzhilw6yqsi6m 408 6 Neural Neural NNP work_ayatblpinzaztdzhilw6yqsi6m 408 7 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 408 8 Processing Processing NNP work_ayatblpinzaztdzhilw6yqsi6m 408 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 409 1 Cham Cham NNP work_ayatblpinzaztdzhilw6yqsi6m 409 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 409 3 Springer Springer NNP work_ayatblpinzaztdzhilw6yqsi6m 409 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 409 5 177–188 177–188 CD work_ayatblpinzaztdzhilw6yqsi6m 409 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 410 1 Bradley Bradley NNP work_ayatblpinzaztdzhilw6yqsi6m 410 2 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 411 1 1997 1997 CD work_ayatblpinzaztdzhilw6yqsi6m 411 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 412 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 412 2 use use NN work_ayatblpinzaztdzhilw6yqsi6m 412 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 412 4 the the DT work_ayatblpinzaztdzhilw6yqsi6m 412 5 area area NN work_ayatblpinzaztdzhilw6yqsi6m 412 6 under under IN work_ayatblpinzaztdzhilw6yqsi6m 412 7 the the DT work_ayatblpinzaztdzhilw6yqsi6m 412 8 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 412 9 curve curve NN work_ayatblpinzaztdzhilw6yqsi6m 412 10 in in IN work_ayatblpinzaztdzhilw6yqsi6m 412 11 the the DT work_ayatblpinzaztdzhilw6yqsi6m 412 12 evaluation evaluation NN work_ayatblpinzaztdzhilw6yqsi6m 412 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 412 14 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 412 15 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 412 16 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 412 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 413 1 Pattern Pattern NNP work_ayatblpinzaztdzhilw6yqsi6m 413 2 Recognition Recognition NNP work_ayatblpinzaztdzhilw6yqsi6m 413 3 30(7):1145–1159 30(7):1145–1159 CD work_ayatblpinzaztdzhilw6yqsi6m 413 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 413 5 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 413 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 413 7 S0031 S0031 NNP work_ayatblpinzaztdzhilw6yqsi6m 413 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 413 9 3203(96)00142 3203(96)00142 NNP work_ayatblpinzaztdzhilw6yqsi6m 413 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 413 11 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 413 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 414 1 Brewer Brewer NNP work_ayatblpinzaztdzhilw6yqsi6m 414 2 R. R. NNP work_ayatblpinzaztdzhilw6yqsi6m 414 3 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 414 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 415 1 Ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 415 2 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 415 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 415 4 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 415 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 415 6 prevention prevention NN work_ayatblpinzaztdzhilw6yqsi6m 415 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 415 8 cure cure NN work_ayatblpinzaztdzhilw6yqsi6m 415 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 416 1 Network Network NNP work_ayatblpinzaztdzhilw6yqsi6m 416 2 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 416 3 2016(9):5–9 2016(9):5–9 NNP work_ayatblpinzaztdzhilw6yqsi6m 416 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 416 5 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 416 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 416 7 S1353 S1353 NNP work_ayatblpinzaztdzhilw6yqsi6m 416 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 416 9 4858(16)30086 4858(16)30086 NNP work_ayatblpinzaztdzhilw6yqsi6m 416 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 416 11 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 416 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 417 1 Chen Chen NNP work_ayatblpinzaztdzhilw6yqsi6m 417 2 Z Z NNP work_ayatblpinzaztdzhilw6yqsi6m 417 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 417 4 Kang Kang NNP work_ayatblpinzaztdzhilw6yqsi6m 417 5 H H NNP work_ayatblpinzaztdzhilw6yqsi6m 417 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 417 7 Yin Yin NNP work_ayatblpinzaztdzhilw6yqsi6m 417 8 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 417 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 417 10 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 417 11 S. S. NNP work_ayatblpinzaztdzhilw6yqsi6m 417 12 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 417 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 418 1 Automatic automatic JJ work_ayatblpinzaztdzhilw6yqsi6m 418 2 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 418 3 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 418 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 418 5 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 418 6 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 418 7 on on IN work_ayatblpinzaztdzhilw6yqsi6m 418 8 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 418 9 API API NNP work_ayatblpinzaztdzhilw6yqsi6m 418 10 calls call NNS work_ayatblpinzaztdzhilw6yqsi6m 418 11 flow flow VBP work_ayatblpinzaztdzhilw6yqsi6m 418 12 graph graph NN work_ayatblpinzaztdzhilw6yqsi6m 418 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 419 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 419 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 419 3 Proceedings Proceedings NNP work_ayatblpinzaztdzhilw6yqsi6m 419 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 419 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 419 6 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 419 7 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 419 8 on on IN work_ayatblpinzaztdzhilw6yqsi6m 419 9 Research Research NNP work_ayatblpinzaztdzhilw6yqsi6m 419 10 in in IN work_ayatblpinzaztdzhilw6yqsi6m 419 11 Adaptive Adaptive NNP work_ayatblpinzaztdzhilw6yqsi6m 419 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 419 13 Convergent Convergent NNP work_ayatblpinzaztdzhilw6yqsi6m 419 14 Systems Systems NNPS work_ayatblpinzaztdzhilw6yqsi6m 419 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 419 16 196–201 196–201 CD work_ayatblpinzaztdzhilw6yqsi6m 419 17 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 419 18 10.1145/3129676.3129704 10.1145/3129676.3129704 CD work_ayatblpinzaztdzhilw6yqsi6m 419 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 420 1 Chen Chen NNP work_ayatblpinzaztdzhilw6yqsi6m 420 2 Q Q NNP work_ayatblpinzaztdzhilw6yqsi6m 420 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 420 4 Robert Robert NNP work_ayatblpinzaztdzhilw6yqsi6m 420 5 AB AB NNP work_ayatblpinzaztdzhilw6yqsi6m 420 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 421 1 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 421 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 422 1 Automated automated JJ work_ayatblpinzaztdzhilw6yqsi6m 422 2 behavioral behavioral JJ work_ayatblpinzaztdzhilw6yqsi6m 422 3 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 422 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 422 5 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 422 6 a a DT work_ayatblpinzaztdzhilw6yqsi6m 422 7 case case NN work_ayatblpinzaztdzhilw6yqsi6m 422 8 study study NN work_ayatblpinzaztdzhilw6yqsi6m 422 9 of of IN work_ayatblpinzaztdzhilw6yqsi6m 422 10 wanna wanna NNP work_ayatblpinzaztdzhilw6yqsi6m 422 11 cry cry NNP work_ayatblpinzaztdzhilw6yqsi6m 422 12 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 422 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 423 1 ArXiv ArXiv NNP work_ayatblpinzaztdzhilw6yqsi6m 423 2 Available available JJ work_ayatblpinzaztdzhilw6yqsi6m 423 3 at at IN work_ayatblpinzaztdzhilw6yqsi6m 423 4 http://arxiv.org/abs/1709.08753 http://arxiv.org/abs/1709.08753 NNP work_ayatblpinzaztdzhilw6yqsi6m 423 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 424 1 Chen Chen NNP work_ayatblpinzaztdzhilw6yqsi6m 424 2 T T NNP work_ayatblpinzaztdzhilw6yqsi6m 424 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 424 4 Tong Tong NNP work_ayatblpinzaztdzhilw6yqsi6m 424 5 H. H. NNP work_ayatblpinzaztdzhilw6yqsi6m 424 6 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 424 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 425 1 Xgboost xgboost NN work_ayatblpinzaztdzhilw6yqsi6m 425 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 425 3 extreme extreme JJ work_ayatblpinzaztdzhilw6yqsi6m 425 4 gradient gradient NN work_ayatblpinzaztdzhilw6yqsi6m 425 5 boosting boosting NN work_ayatblpinzaztdzhilw6yqsi6m 425 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 426 1 R r NN work_ayatblpinzaztdzhilw6yqsi6m 426 2 package package NN work_ayatblpinzaztdzhilw6yqsi6m 426 3 v1.3.2.1 v1.3.2.1 NNS work_ayatblpinzaztdzhilw6yqsi6m 426 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 426 5 1–4 1–4 CD work_ayatblpinzaztdzhilw6yqsi6m 426 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 427 1 Available available JJ work_ayatblpinzaztdzhilw6yqsi6m 427 2 at at IN work_ayatblpinzaztdzhilw6yqsi6m 427 3 http://cran.fhcrc.org/web/packages/xgboost/vignettes/xgboost.pdf http://cran.fhcrc.org/web/packages/xgboost/vignettes/xgboost.pdf ADD work_ayatblpinzaztdzhilw6yqsi6m 427 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 428 1 Chiappetta Chiappetta NNP work_ayatblpinzaztdzhilw6yqsi6m 428 2 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 428 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 428 4 Savas Savas NNP work_ayatblpinzaztdzhilw6yqsi6m 428 5 E E NNP work_ayatblpinzaztdzhilw6yqsi6m 428 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 428 7 Yilmaz Yilmaz NNP work_ayatblpinzaztdzhilw6yqsi6m 428 8 C. C. NNP work_ayatblpinzaztdzhilw6yqsi6m 428 9 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 428 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 429 1 Real real JJ work_ayatblpinzaztdzhilw6yqsi6m 429 2 time time NN work_ayatblpinzaztdzhilw6yqsi6m 429 3 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 429 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 429 5 cache cache NNP work_ayatblpinzaztdzhilw6yqsi6m 429 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 429 7 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 429 8 side side NN work_ayatblpinzaztdzhilw6yqsi6m 429 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 429 10 channel channel NN work_ayatblpinzaztdzhilw6yqsi6m 429 11 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 429 12 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 429 13 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 429 14 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 429 15 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 429 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 430 1 Applied Applied NNP work_ayatblpinzaztdzhilw6yqsi6m 430 2 Soft Soft NNP work_ayatblpinzaztdzhilw6yqsi6m 430 3 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 430 4 49:1162–1174 49:1162–1174 CD work_ayatblpinzaztdzhilw6yqsi6m 430 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 430 6 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 430 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 430 8 j.asoc.2016.09.014 j.asoc.2016.09.014 NN work_ayatblpinzaztdzhilw6yqsi6m 430 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 431 1 Chung Chung NNP work_ayatblpinzaztdzhilw6yqsi6m 431 2 M. M. NNP work_ayatblpinzaztdzhilw6yqsi6m 431 3 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 431 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 432 1 Why why WRB work_ayatblpinzaztdzhilw6yqsi6m 432 2 employees employee NNS work_ayatblpinzaztdzhilw6yqsi6m 432 3 matter matter VBP work_ayatblpinzaztdzhilw6yqsi6m 432 4 in in IN work_ayatblpinzaztdzhilw6yqsi6m 432 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 432 6 fight fight NN work_ayatblpinzaztdzhilw6yqsi6m 432 7 against against IN work_ayatblpinzaztdzhilw6yqsi6m 432 8 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 432 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 433 1 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 433 2 Fraud Fraud NNP work_ayatblpinzaztdzhilw6yqsi6m 433 3 & & CC work_ayatblpinzaztdzhilw6yqsi6m 433 4 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 433 5 2019(8):8–11 2019(8):8–11 CD work_ayatblpinzaztdzhilw6yqsi6m 433 6 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 433 7 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 433 8 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 433 9 S1361 S1361 NNP work_ayatblpinzaztdzhilw6yqsi6m 433 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 433 11 3723(19)30084 3723(19)30084 NNP work_ayatblpinzaztdzhilw6yqsi6m 433 12 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 433 13 3 3 CD work_ayatblpinzaztdzhilw6yqsi6m 433 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 434 1 Das Das NNP work_ayatblpinzaztdzhilw6yqsi6m 434 2 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 434 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 434 4 Werner Werner NNP work_ayatblpinzaztdzhilw6yqsi6m 434 5 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 434 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 434 7 Antonakakis Antonakakis NNP work_ayatblpinzaztdzhilw6yqsi6m 434 8 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 434 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 434 10 Polychronakis Polychronakis NNP work_ayatblpinzaztdzhilw6yqsi6m 434 11 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 434 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 434 13 Monrose Monrose NNP work_ayatblpinzaztdzhilw6yqsi6m 434 14 F. F. NNP work_ayatblpinzaztdzhilw6yqsi6m 434 15 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 434 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 435 1 SoK SoK NNP work_ayatblpinzaztdzhilw6yqsi6m 435 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 435 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 435 4 challenges challenge NNS work_ayatblpinzaztdzhilw6yqsi6m 435 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 435 6 pitfalls pitfall NNS work_ayatblpinzaztdzhilw6yqsi6m 435 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 435 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 435 9 perils peril NNS work_ayatblpinzaztdzhilw6yqsi6m 435 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 435 11 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 435 12 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 435 13 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 435 14 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 435 15 for for IN work_ayatblpinzaztdzhilw6yqsi6m 435 16 security security NN work_ayatblpinzaztdzhilw6yqsi6m 435 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 436 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 436 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 436 3 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 436 4 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 436 5 Symposium Symposium NNP work_ayatblpinzaztdzhilw6yqsi6m 436 6 on on IN work_ayatblpinzaztdzhilw6yqsi6m 436 7 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 436 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 436 9 Privacy Privacy NNP work_ayatblpinzaztdzhilw6yqsi6m 436 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 437 1 Piscataway piscataway NN work_ayatblpinzaztdzhilw6yqsi6m 437 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 437 3 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 437 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 437 5 20–38 20–38 CD work_ayatblpinzaztdzhilw6yqsi6m 437 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 438 1 Davies davy NNS work_ayatblpinzaztdzhilw6yqsi6m 438 2 SR SR NNP work_ayatblpinzaztdzhilw6yqsi6m 438 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 438 4 Macfarlane Macfarlane NNP work_ayatblpinzaztdzhilw6yqsi6m 438 5 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 438 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 438 7 Buchanan Buchanan NNP work_ayatblpinzaztdzhilw6yqsi6m 438 8 WJ WJ NNP work_ayatblpinzaztdzhilw6yqsi6m 438 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 439 1 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 439 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 440 1 Evaluation evaluation NN work_ayatblpinzaztdzhilw6yqsi6m 440 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 440 3 live live JJ work_ayatblpinzaztdzhilw6yqsi6m 440 4 forensic forensic JJ work_ayatblpinzaztdzhilw6yqsi6m 440 5 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 440 6 in in IN work_ayatblpinzaztdzhilw6yqsi6m 440 7 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 440 8 attack attack NN work_ayatblpinzaztdzhilw6yqsi6m 440 9 mitigation mitigation NN work_ayatblpinzaztdzhilw6yqsi6m 440 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 441 1 Forensic Forensic NNP work_ayatblpinzaztdzhilw6yqsi6m 441 2 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 441 3 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 441 4 : : : work_ayatblpinzaztdzhilw6yqsi6m 441 5 Digital Digital NNP work_ayatblpinzaztdzhilw6yqsi6m 441 6 Investigation Investigation NNP work_ayatblpinzaztdzhilw6yqsi6m 441 7 33:300979 33:300979 CD work_ayatblpinzaztdzhilw6yqsi6m 441 8 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 441 9 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 441 10 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 441 11 j.fsidi.2020.300979 j.fsidi.2020.300979 CD work_ayatblpinzaztdzhilw6yqsi6m 441 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 442 1 Demme Demme NNP work_ayatblpinzaztdzhilw6yqsi6m 442 2 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 442 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 442 4 Maycock Maycock NNP work_ayatblpinzaztdzhilw6yqsi6m 442 5 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 442 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 442 7 Schmitz Schmitz NNP work_ayatblpinzaztdzhilw6yqsi6m 442 8 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 442 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 442 10 Tang Tang NNP work_ayatblpinzaztdzhilw6yqsi6m 442 11 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 442 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 442 13 Waksman Waksman NNP work_ayatblpinzaztdzhilw6yqsi6m 442 14 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 442 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 442 16 Sethumadhavan Sethumadhavan NNP work_ayatblpinzaztdzhilw6yqsi6m 442 17 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 442 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 442 19 Stolfo Stolfo NNP work_ayatblpinzaztdzhilw6yqsi6m 442 20 S. S. NNP work_ayatblpinzaztdzhilw6yqsi6m 442 21 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 442 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 443 1 On on IN work_ayatblpinzaztdzhilw6yqsi6m 443 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 443 3 feasibility feasibility NN work_ayatblpinzaztdzhilw6yqsi6m 443 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 443 5 online online JJ work_ayatblpinzaztdzhilw6yqsi6m 443 6 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 443 7 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 443 8 with with IN work_ayatblpinzaztdzhilw6yqsi6m 443 9 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 443 10 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 443 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 444 1 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 444 2 SIGARCH SIGARCH VBZ work_ayatblpinzaztdzhilw6yqsi6m 444 3 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 444 4 Architecture Architecture NNP work_ayatblpinzaztdzhilw6yqsi6m 444 5 News News NNP work_ayatblpinzaztdzhilw6yqsi6m 444 6 41(3):559–570 41(3):559–570 CD work_ayatblpinzaztdzhilw6yqsi6m 444 7 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 444 8 10.1145/2508148.2485970 10.1145/2508148.2485970 CD work_ayatblpinzaztdzhilw6yqsi6m 444 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 445 1 De De NNP work_ayatblpinzaztdzhilw6yqsi6m 445 2 Melo Melo NNP work_ayatblpinzaztdzhilw6yqsi6m 445 3 AC AC NNP work_ayatblpinzaztdzhilw6yqsi6m 445 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 446 1 2010 2010 CD work_ayatblpinzaztdzhilw6yqsi6m 446 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 447 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 447 2 new new JJ work_ayatblpinzaztdzhilw6yqsi6m 447 3 Linux Linux NNP work_ayatblpinzaztdzhilw6yqsi6m 447 4 ‘ ' `` work_ayatblpinzaztdzhilw6yqsi6m 447 5 perf perf NN work_ayatblpinzaztdzhilw6yqsi6m 447 6 ’ ' '' work_ayatblpinzaztdzhilw6yqsi6m 447 7 tools tool NNS work_ayatblpinzaztdzhilw6yqsi6m 447 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 448 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 448 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 448 3 Slides slide NNS work_ayatblpinzaztdzhilw6yqsi6m 448 4 from from IN work_ayatblpinzaztdzhilw6yqsi6m 448 5 Linux Linux NNP work_ayatblpinzaztdzhilw6yqsi6m 448 6 Kongress Kongress NNP work_ayatblpinzaztdzhilw6yqsi6m 448 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 449 1 Vol Vol NNP work_ayatblpinzaztdzhilw6yqsi6m 449 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 450 1 18 18 CD work_ayatblpinzaztdzhilw6yqsi6m 450 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 451 1 Available available JJ work_ayatblpinzaztdzhilw6yqsi6m 451 2 at at IN work_ayatblpinzaztdzhilw6yqsi6m 451 3 http://www.linux-kongress.org/2010/slides/lk2010-perf-acme.pdf http://www.linux-kongress.org/2010/slides/lk2010-perf-acme.pdf ADD work_ayatblpinzaztdzhilw6yqsi6m 451 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 452 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 452 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 452 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 452 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 453 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 453 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 453 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 453 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 453 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 453 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 453 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 454 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 454 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 454 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 454 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 454 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 454 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 454 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 454 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 454 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 10 21/24 21/24 CD work_ayatblpinzaztdzhilw6yqsi6m 454 11 http://dx.doi.org/10.1007/s11227-019-02810-z http://dx.doi.org/10.1007/s11227-019-02810-z NNP work_ayatblpinzaztdzhilw6yqsi6m 454 12 http://dx.doi.org/10.1109/TIFS.2019.2924549 http://dx.doi.org/10.1109/tifs.2019.2924549 PRP work_ayatblpinzaztdzhilw6yqsi6m 454 13 http://dx.doi.org/10.1016/j.procs.2015.10.114 http://dx.doi.org/10.1016/j.procs.2015.10.114 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 14 http://dx.doi.org/10.1016/S0031-3203(96)00142-2 http://dx.doi.org/10.1016/s0031-3203(96)00142-2 UH work_ayatblpinzaztdzhilw6yqsi6m 454 15 http://dx.doi.org/10.1016/S1353-4858(16)30086-1 http://dx.doi.org/10.1016/S1353-4858(16)30086-1 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 16 http://dx.doi.org/10.1145/3129676.3129704 http://dx.doi.org/10.1145/3129676.3129704 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 17 http://arxiv.org/abs/1709.08753 http://arxiv.org/abs/1709.08753 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 18 http://cran.fhcrc.org/web/packages/xgboost/vignettes/xgboost.pdf http://cran.fhcrc.org/web/packages/xgboost/vignettes/xgboost.pdf NNP work_ayatblpinzaztdzhilw6yqsi6m 454 19 http://dx.doi.org/10.1016/j.asoc.2016.09.014 http://dx.doi.org/10.1016/j.asoc.2016.09.014 VBZ work_ayatblpinzaztdzhilw6yqsi6m 454 20 http://dx.doi.org/10.1016/S1361-3723(19)30084-3 http://dx.doi.org/10.1016/S1361-3723(19)30084-3 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 21 http://dx.doi.org/10.1016/j.fsidi.2020.300979 http://dx.doi.org/10.1016/j.fsidi.2020.300979 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 22 http://dx.doi.org/10.1145/2508148.2485970 http://dx.doi.org/10.1145/2508148.2485970 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 23 http://www.linux-kongress.org/2010/slides/lk2010-perf-acme.pdf http://www.linux-kongress.org/2010/slides/lk2010-perf-acme.pdf NNP work_ayatblpinzaztdzhilw6yqsi6m 454 24 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 454 25 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 454 26 Dion Dion NNP work_ayatblpinzaztdzhilw6yqsi6m 454 27 Y Y NNP work_ayatblpinzaztdzhilw6yqsi6m 454 28 , , , work_ayatblpinzaztdzhilw6yqsi6m 454 29 Brohi Brohi NNP work_ayatblpinzaztdzhilw6yqsi6m 454 30 SN SN NNP work_ayatblpinzaztdzhilw6yqsi6m 454 31 . . . work_ayatblpinzaztdzhilw6yqsi6m 455 1 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 455 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 456 1 An an DT work_ayatblpinzaztdzhilw6yqsi6m 456 2 experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 456 3 study study NN work_ayatblpinzaztdzhilw6yqsi6m 456 4 to to TO work_ayatblpinzaztdzhilw6yqsi6m 456 5 evaluate evaluate VB work_ayatblpinzaztdzhilw6yqsi6m 456 6 the the DT work_ayatblpinzaztdzhilw6yqsi6m 456 7 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 456 8 of of IN work_ayatblpinzaztdzhilw6yqsi6m 456 9 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 456 10 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 456 11 alogrithms alogrithms NNP work_ayatblpinzaztdzhilw6yqsi6m 456 12 in in IN work_ayatblpinzaztdzhilw6yqsi6m 456 13 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 456 14 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 456 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 457 1 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 457 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 457 3 Engineering Engineering NNP work_ayatblpinzaztdzhilw6yqsi6m 457 4 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 457 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 457 6 Technology Technology NNP work_ayatblpinzaztdzhilw6yqsi6m 457 7 15(2):967–981 15(2):967–981 CD work_ayatblpinzaztdzhilw6yqsi6m 457 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 458 1 Flater Flater NNP work_ayatblpinzaztdzhilw6yqsi6m 458 2 D. D. NNP work_ayatblpinzaztdzhilw6yqsi6m 458 3 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 458 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 459 1 Screening screen VBG work_ayatblpinzaztdzhilw6yqsi6m 459 2 for for IN work_ayatblpinzaztdzhilw6yqsi6m 459 3 factors factor NNS work_ayatblpinzaztdzhilw6yqsi6m 459 4 affecting affect VBG work_ayatblpinzaztdzhilw6yqsi6m 459 5 application application NN work_ayatblpinzaztdzhilw6yqsi6m 459 6 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 459 7 in in IN work_ayatblpinzaztdzhilw6yqsi6m 459 8 profiling profile VBG work_ayatblpinzaztdzhilw6yqsi6m 459 9 measurements measurement NNS work_ayatblpinzaztdzhilw6yqsi6m 459 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 460 1 US US NNP work_ayatblpinzaztdzhilw6yqsi6m 460 2 Department Department NNP work_ayatblpinzaztdzhilw6yqsi6m 460 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 460 4 Commerce Commerce NNP work_ayatblpinzaztdzhilw6yqsi6m 460 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 460 6 National National NNP work_ayatblpinzaztdzhilw6yqsi6m 460 7 Institute Institute NNP work_ayatblpinzaztdzhilw6yqsi6m 460 8 of of IN work_ayatblpinzaztdzhilw6yqsi6m 460 9 Standards Standards NNPS work_ayatblpinzaztdzhilw6yqsi6m 460 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 460 11 Technology Technology NNP work_ayatblpinzaztdzhilw6yqsi6m 460 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 460 13 Report report NN work_ayatblpinzaztdzhilw6yqsi6m 460 14 number number NN work_ayatblpinzaztdzhilw6yqsi6m 460 15 : : : work_ayatblpinzaztdzhilw6yqsi6m 460 16 NIST NIST NNP work_ayatblpinzaztdzhilw6yqsi6m 460 17 TN TN NNP work_ayatblpinzaztdzhilw6yqsi6m 460 18 1855 1855 CD work_ayatblpinzaztdzhilw6yqsi6m 460 19 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 460 20 10.6028 10.6028 CD work_ayatblpinzaztdzhilw6yqsi6m 460 21 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 460 22 NIST.TN.1855 NIST.TN.1855 NNP work_ayatblpinzaztdzhilw6yqsi6m 460 23 . . . work_ayatblpinzaztdzhilw6yqsi6m 461 1 Foreman Foreman NNP work_ayatblpinzaztdzhilw6yqsi6m 461 2 JC JC NNP work_ayatblpinzaztdzhilw6yqsi6m 461 3 . . . work_ayatblpinzaztdzhilw6yqsi6m 462 1 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 462 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 463 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 463 2 survey survey NN work_ayatblpinzaztdzhilw6yqsi6m 463 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 463 4 cyber cyber NNP work_ayatblpinzaztdzhilw6yqsi6m 463 5 security security NN work_ayatblpinzaztdzhilw6yqsi6m 463 6 countermeasures countermeasure NNS work_ayatblpinzaztdzhilw6yqsi6m 463 7 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 463 8 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 463 9 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 463 10 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 463 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 464 1 ArXiv ArXiv NNP work_ayatblpinzaztdzhilw6yqsi6m 464 2 Available available JJ work_ayatblpinzaztdzhilw6yqsi6m 464 3 at at IN work_ayatblpinzaztdzhilw6yqsi6m 464 4 http://arxiv.org/abs/1807.10868 http://arxiv.org/abs/1807.10868 NNP work_ayatblpinzaztdzhilw6yqsi6m 464 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 465 1 Friedman Friedman NNP work_ayatblpinzaztdzhilw6yqsi6m 465 2 JH JH NNP work_ayatblpinzaztdzhilw6yqsi6m 465 3 . . . work_ayatblpinzaztdzhilw6yqsi6m 466 1 1999 1999 CD work_ayatblpinzaztdzhilw6yqsi6m 466 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 467 1 Reitz reitz JJ work_ayatblpinzaztdzhilw6yqsi6m 467 2 lecture lecture NN work_ayatblpinzaztdzhilw6yqsi6m 467 3 — — : work_ayatblpinzaztdzhilw6yqsi6m 467 4 greedy greedy JJ work_ayatblpinzaztdzhilw6yqsi6m 467 5 function function NN work_ayatblpinzaztdzhilw6yqsi6m 467 6 approximation approximation NN work_ayatblpinzaztdzhilw6yqsi6m 467 7 : : : work_ayatblpinzaztdzhilw6yqsi6m 467 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 467 9 gradient gradient JJ work_ayatblpinzaztdzhilw6yqsi6m 467 10 boosting boost VBG work_ayatblpinzaztdzhilw6yqsi6m 467 11 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 467 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 468 1 Annals annal NNS work_ayatblpinzaztdzhilw6yqsi6m 468 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 468 3 Statistics Statistics NNPS work_ayatblpinzaztdzhilw6yqsi6m 468 4 29(5):1189–1232 29(5):1189–1232 CD work_ayatblpinzaztdzhilw6yqsi6m 468 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 469 1 Gazet Gazet NNP work_ayatblpinzaztdzhilw6yqsi6m 469 2 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 470 1 2010 2010 CD work_ayatblpinzaztdzhilw6yqsi6m 470 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 471 1 Comparative comparative JJ work_ayatblpinzaztdzhilw6yqsi6m 471 2 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 471 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 471 4 various various JJ work_ayatblpinzaztdzhilw6yqsi6m 471 5 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 471 6 virii virii NN work_ayatblpinzaztdzhilw6yqsi6m 471 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 472 1 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 472 2 in in IN work_ayatblpinzaztdzhilw6yqsi6m 472 3 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 472 4 Virology Virology NNP work_ayatblpinzaztdzhilw6yqsi6m 472 5 6(1):77–90 6(1):77–90 CD work_ayatblpinzaztdzhilw6yqsi6m 472 6 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 472 7 10.1007 10.1007 CD work_ayatblpinzaztdzhilw6yqsi6m 472 8 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 472 9 s11416 s11416 NNP work_ayatblpinzaztdzhilw6yqsi6m 472 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 472 11 008 008 CD work_ayatblpinzaztdzhilw6yqsi6m 472 12 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 472 13 0092 0092 CD work_ayatblpinzaztdzhilw6yqsi6m 472 14 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 472 15 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 472 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 473 1 Grant Grant NNP work_ayatblpinzaztdzhilw6yqsi6m 473 2 L L NNP work_ayatblpinzaztdzhilw6yqsi6m 473 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 473 4 Parkinson Parkinson NNP work_ayatblpinzaztdzhilw6yqsi6m 473 5 S. S. NNP work_ayatblpinzaztdzhilw6yqsi6m 473 6 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 473 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 474 1 Identifying identify VBG work_ayatblpinzaztdzhilw6yqsi6m 474 2 file file NN work_ayatblpinzaztdzhilw6yqsi6m 474 3 interaction interaction NN work_ayatblpinzaztdzhilw6yqsi6m 474 4 patterns pattern NNS work_ayatblpinzaztdzhilw6yqsi6m 474 5 in in IN work_ayatblpinzaztdzhilw6yqsi6m 474 6 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 474 7 behaviour behaviour NN work_ayatblpinzaztdzhilw6yqsi6m 474 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 475 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 475 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 475 3 Parkinson Parkinson NNP work_ayatblpinzaztdzhilw6yqsi6m 475 4 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 475 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 475 6 Crampton Crampton NNP work_ayatblpinzaztdzhilw6yqsi6m 475 7 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 475 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 475 9 Hill Hill NNP work_ayatblpinzaztdzhilw6yqsi6m 475 10 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 475 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 475 12 eds eds XX work_ayatblpinzaztdzhilw6yqsi6m 475 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 476 1 Guide guide VB work_ayatblpinzaztdzhilw6yqsi6m 476 2 to to IN work_ayatblpinzaztdzhilw6yqsi6m 476 3 Vulnerability Vulnerability NNP work_ayatblpinzaztdzhilw6yqsi6m 476 4 Analysis Analysis NNP work_ayatblpinzaztdzhilw6yqsi6m 476 5 for for IN work_ayatblpinzaztdzhilw6yqsi6m 476 6 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 476 7 Networks Networks NNPS work_ayatblpinzaztdzhilw6yqsi6m 476 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 476 9 Systems Systems NNPS work_ayatblpinzaztdzhilw6yqsi6m 476 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 477 1 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 477 2 Communications Communications NNPS work_ayatblpinzaztdzhilw6yqsi6m 477 3 and and CC work_ayatblpinzaztdzhilw6yqsi6m 477 4 Networks Networks NNPS work_ayatblpinzaztdzhilw6yqsi6m 477 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 478 1 Cham Cham NNP work_ayatblpinzaztdzhilw6yqsi6m 478 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 478 3 Springer Springer NNP work_ayatblpinzaztdzhilw6yqsi6m 478 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 478 5 317–335 317–335 CD work_ayatblpinzaztdzhilw6yqsi6m 478 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 479 1 Hampton Hampton NNP work_ayatblpinzaztdzhilw6yqsi6m 479 2 N N NNP work_ayatblpinzaztdzhilw6yqsi6m 479 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 479 4 Baig Baig NNP work_ayatblpinzaztdzhilw6yqsi6m 479 5 Z Z NNP work_ayatblpinzaztdzhilw6yqsi6m 479 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 479 7 Zeadall Zeadall NNP work_ayatblpinzaztdzhilw6yqsi6m 479 8 S. S. NNP work_ayatblpinzaztdzhilw6yqsi6m 479 9 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 479 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 480 1 Ransomware ransomware VB work_ayatblpinzaztdzhilw6yqsi6m 480 2 behavioural behavioural JJ work_ayatblpinzaztdzhilw6yqsi6m 480 3 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 480 4 on on IN work_ayatblpinzaztdzhilw6yqsi6m 480 5 windows windows NNP work_ayatblpinzaztdzhilw6yqsi6m 480 6 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 480 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 481 1 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 481 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 481 3 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 481 4 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 481 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 481 6 Applications Applications NNPS work_ayatblpinzaztdzhilw6yqsi6m 481 7 40:44–51 40:44–51 CD work_ayatblpinzaztdzhilw6yqsi6m 481 8 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 481 9 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 481 10 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 481 11 j.jisa.2018.02.008 j.jisa.2018.02.008 NNP work_ayatblpinzaztdzhilw6yqsi6m 481 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 482 1 Jbabdi Jbabdi NNP work_ayatblpinzaztdzhilw6yqsi6m 482 2 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 482 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 482 4 Sotiropoulos Sotiropoulos NNP work_ayatblpinzaztdzhilw6yqsi6m 482 5 SN SN NNP work_ayatblpinzaztdzhilw6yqsi6m 482 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 482 7 Savio Savio NNP work_ayatblpinzaztdzhilw6yqsi6m 482 8 AM am NN work_ayatblpinzaztdzhilw6yqsi6m 482 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 482 10 Graña Graña NNP work_ayatblpinzaztdzhilw6yqsi6m 482 11 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 482 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 482 13 Behrens Behrens NNP work_ayatblpinzaztdzhilw6yqsi6m 482 14 TE TE NNP work_ayatblpinzaztdzhilw6yqsi6m 482 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 483 1 2012 2012 CD work_ayatblpinzaztdzhilw6yqsi6m 483 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 484 1 Model model NN work_ayatblpinzaztdzhilw6yqsi6m 484 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 484 3 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 484 4 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 484 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 484 6 multishell multishell NNP work_ayatblpinzaztdzhilw6yqsi6m 484 7 diffusion diffusion NN work_ayatblpinzaztdzhilw6yqsi6m 484 8 MR MR NNP work_ayatblpinzaztdzhilw6yqsi6m 484 9 data datum NNS work_ayatblpinzaztdzhilw6yqsi6m 484 10 for for IN work_ayatblpinzaztdzhilw6yqsi6m 484 11 tractography tractography NN work_ayatblpinzaztdzhilw6yqsi6m 484 12 : : : work_ayatblpinzaztdzhilw6yqsi6m 484 13 how how WRB work_ayatblpinzaztdzhilw6yqsi6m 484 14 to to TO work_ayatblpinzaztdzhilw6yqsi6m 484 15 get get VB work_ayatblpinzaztdzhilw6yqsi6m 484 16 over over RP work_ayatblpinzaztdzhilw6yqsi6m 484 17 fitting fitting JJ work_ayatblpinzaztdzhilw6yqsi6m 484 18 problems problem NNS work_ayatblpinzaztdzhilw6yqsi6m 484 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 485 1 Magnetic magnetic JJ work_ayatblpinzaztdzhilw6yqsi6m 485 2 Resonance Resonance NNP work_ayatblpinzaztdzhilw6yqsi6m 485 3 in in IN work_ayatblpinzaztdzhilw6yqsi6m 485 4 Medicine Medicine NNP work_ayatblpinzaztdzhilw6yqsi6m 485 5 68(6):1846–1855 68(6):1846–1855 CD work_ayatblpinzaztdzhilw6yqsi6m 485 6 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 485 7 10.1002 10.1002 CD work_ayatblpinzaztdzhilw6yqsi6m 485 8 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 485 9 mrm.24204 mrm.24204 NN work_ayatblpinzaztdzhilw6yqsi6m 485 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 486 1 Jordan Jordan NNP work_ayatblpinzaztdzhilw6yqsi6m 486 2 MI MI NNP work_ayatblpinzaztdzhilw6yqsi6m 486 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 486 4 Mitchell Mitchell NNP work_ayatblpinzaztdzhilw6yqsi6m 486 5 TM TM NNP work_ayatblpinzaztdzhilw6yqsi6m 486 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 487 1 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 487 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 488 1 Machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 488 2 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 488 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 488 4 trends trend NNS work_ayatblpinzaztdzhilw6yqsi6m 488 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 488 6 perspectives perspective NNS work_ayatblpinzaztdzhilw6yqsi6m 488 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 488 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 488 9 prospects prospect NNS work_ayatblpinzaztdzhilw6yqsi6m 488 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 489 1 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 489 2 349(6245):255–260 349(6245):255–260 NNP work_ayatblpinzaztdzhilw6yqsi6m 489 3 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 489 4 10.1126 10.1126 CD work_ayatblpinzaztdzhilw6yqsi6m 489 5 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 489 6 science.aaa8415 science.aaa8415 NNP work_ayatblpinzaztdzhilw6yqsi6m 489 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 490 1 Kadiyala Kadiyala NNP work_ayatblpinzaztdzhilw6yqsi6m 490 2 SP SP NNP work_ayatblpinzaztdzhilw6yqsi6m 490 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 490 4 Jadhav Jadhav NNP work_ayatblpinzaztdzhilw6yqsi6m 490 5 P P NNP work_ayatblpinzaztdzhilw6yqsi6m 490 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 490 7 Lam Lam NNP work_ayatblpinzaztdzhilw6yqsi6m 490 8 SK SK NNP work_ayatblpinzaztdzhilw6yqsi6m 490 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 490 10 Srikanthan Srikanthan NNP work_ayatblpinzaztdzhilw6yqsi6m 490 11 T. T. NNP work_ayatblpinzaztdzhilw6yqsi6m 490 12 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 490 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 491 1 Hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 491 2 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 491 3 counter counter NN work_ayatblpinzaztdzhilw6yqsi6m 491 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 491 5 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 491 6 fine fine RB work_ayatblpinzaztdzhilw6yqsi6m 491 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 491 8 grained grain VBN work_ayatblpinzaztdzhilw6yqsi6m 491 9 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 491 10 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 491 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 492 1 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 492 2 Transactions transaction NNS work_ayatblpinzaztdzhilw6yqsi6m 492 3 on on IN work_ayatblpinzaztdzhilw6yqsi6m 492 4 Embedded Embedded NNP work_ayatblpinzaztdzhilw6yqsi6m 492 5 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 492 6 Systems Systems NNPS work_ayatblpinzaztdzhilw6yqsi6m 492 7 19(5):1–17 19(5):1–17 CD work_ayatblpinzaztdzhilw6yqsi6m 492 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 493 1 Kaur Kaur NNP work_ayatblpinzaztdzhilw6yqsi6m 493 2 G g NN work_ayatblpinzaztdzhilw6yqsi6m 493 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 493 4 Dhir Dhir NNP work_ayatblpinzaztdzhilw6yqsi6m 493 5 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 493 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 493 7 Singh Singh NNP work_ayatblpinzaztdzhilw6yqsi6m 493 8 M. M. NNP work_ayatblpinzaztdzhilw6yqsi6m 493 9 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 493 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 494 1 Anatomy anatomy NN work_ayatblpinzaztdzhilw6yqsi6m 494 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 494 3 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 494 4 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 494 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 494 6 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 494 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 494 8 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 494 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 494 10 reporting reporting NN work_ayatblpinzaztdzhilw6yqsi6m 494 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 495 1 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 495 2 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 495 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 495 4 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 495 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 495 6 Networks Networks NNP work_ayatblpinzaztdzhilw6yqsi6m 495 7 12(3):188–197 12(3):188–197 CD work_ayatblpinzaztdzhilw6yqsi6m 495 8 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 495 9 10.1504 10.1504 CD work_ayatblpinzaztdzhilw6yqsi6m 495 10 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 495 11 IJSN.2017.084399 IJSN.2017.084399 NNP work_ayatblpinzaztdzhilw6yqsi6m 495 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 496 1 Kharraz Kharraz NNP work_ayatblpinzaztdzhilw6yqsi6m 496 2 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 496 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 496 4 Arshad Arshad NNP work_ayatblpinzaztdzhilw6yqsi6m 496 5 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 496 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 496 7 Mulliner Mulliner NNP work_ayatblpinzaztdzhilw6yqsi6m 496 8 C C NNP work_ayatblpinzaztdzhilw6yqsi6m 496 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 496 10 Robertson Robertson NNP work_ayatblpinzaztdzhilw6yqsi6m 496 11 WK WK NNP work_ayatblpinzaztdzhilw6yqsi6m 496 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 497 1 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 497 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 498 1 UNVEIL UNVEIL NNP work_ayatblpinzaztdzhilw6yqsi6m 498 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 498 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 498 4 large large JJ work_ayatblpinzaztdzhilw6yqsi6m 498 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 498 6 scale scale NN work_ayatblpinzaztdzhilw6yqsi6m 498 7 , , , work_ayatblpinzaztdzhilw6yqsi6m 498 8 automated automate VBD work_ayatblpinzaztdzhilw6yqsi6m 498 9 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 498 10 to to IN work_ayatblpinzaztdzhilw6yqsi6m 498 11 detecting detecting NN work_ayatblpinzaztdzhilw6yqsi6m 498 12 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 498 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 499 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 499 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 499 3 USENIX USENIX NNP work_ayatblpinzaztdzhilw6yqsi6m 499 4 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 499 5 Symposium Symposium NNP work_ayatblpinzaztdzhilw6yqsi6m 499 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 500 1 757–772 757–772 CD work_ayatblpinzaztdzhilw6yqsi6m 500 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 501 1 Kharraz Kharraz NNP work_ayatblpinzaztdzhilw6yqsi6m 501 2 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 501 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 501 4 Robertson Robertson NNP work_ayatblpinzaztdzhilw6yqsi6m 501 5 W W NNP work_ayatblpinzaztdzhilw6yqsi6m 501 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 501 7 Balzarotti Balzarotti NNP work_ayatblpinzaztdzhilw6yqsi6m 501 8 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 501 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 501 10 Bilge Bilge NNP work_ayatblpinzaztdzhilw6yqsi6m 501 11 L L NNP work_ayatblpinzaztdzhilw6yqsi6m 501 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 501 13 Kirda Kirda NNP work_ayatblpinzaztdzhilw6yqsi6m 501 14 E. E. NNP work_ayatblpinzaztdzhilw6yqsi6m 501 15 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 501 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 502 1 Cutting cut VBG work_ayatblpinzaztdzhilw6yqsi6m 502 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 502 3 gordian gordian JJ work_ayatblpinzaztdzhilw6yqsi6m 502 4 knot knot NN work_ayatblpinzaztdzhilw6yqsi6m 502 5 : : : work_ayatblpinzaztdzhilw6yqsi6m 502 6 a a DT work_ayatblpinzaztdzhilw6yqsi6m 502 7 look look NN work_ayatblpinzaztdzhilw6yqsi6m 502 8 under under IN work_ayatblpinzaztdzhilw6yqsi6m 502 9 the the DT work_ayatblpinzaztdzhilw6yqsi6m 502 10 hood hood NN work_ayatblpinzaztdzhilw6yqsi6m 502 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 502 12 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 502 13 attacks attack NNS work_ayatblpinzaztdzhilw6yqsi6m 502 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 503 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 503 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 503 3 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 503 4 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 503 5 on on IN work_ayatblpinzaztdzhilw6yqsi6m 503 6 Detection Detection NNP work_ayatblpinzaztdzhilw6yqsi6m 503 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 503 8 Intrusions Intrusions NNPS work_ayatblpinzaztdzhilw6yqsi6m 503 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 503 10 Malware Malware NNP work_ayatblpinzaztdzhilw6yqsi6m 503 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 503 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 503 13 Vulnerability Vulnerability NNP work_ayatblpinzaztdzhilw6yqsi6m 503 14 Assessment Assessment NNP work_ayatblpinzaztdzhilw6yqsi6m 503 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 504 1 Cham Cham NNP work_ayatblpinzaztdzhilw6yqsi6m 504 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 504 3 Springer Springer NNP work_ayatblpinzaztdzhilw6yqsi6m 504 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 504 5 3–24 3–24 NNP work_ayatblpinzaztdzhilw6yqsi6m 504 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 505 1 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 505 2 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 505 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 505 4 Soh Soh NNP work_ayatblpinzaztdzhilw6yqsi6m 505 5 W W NNP work_ayatblpinzaztdzhilw6yqsi6m 505 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 505 7 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 505 8 S. S. NNP work_ayatblpinzaztdzhilw6yqsi6m 505 9 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 505 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 506 1 Design design NN work_ayatblpinzaztdzhilw6yqsi6m 506 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 506 3 quantification quantification NN work_ayatblpinzaztdzhilw6yqsi6m 506 4 model model NN work_ayatblpinzaztdzhilw6yqsi6m 506 5 for for IN work_ayatblpinzaztdzhilw6yqsi6m 506 6 prevent prevent NN work_ayatblpinzaztdzhilw6yqsi6m 506 7 of of IN work_ayatblpinzaztdzhilw6yqsi6m 506 8 cryptolocker cryptolocker NN work_ayatblpinzaztdzhilw6yqsi6m 506 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 507 1 Indian Indian NNP work_ayatblpinzaztdzhilw6yqsi6m 507 2 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 507 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 507 4 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 507 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 507 6 Technology Technology NNP work_ayatblpinzaztdzhilw6yqsi6m 507 7 8(19):e80196 8(19):e80196 . work_ayatblpinzaztdzhilw6yqsi6m 507 8 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 507 9 10.17485 10.17485 CD work_ayatblpinzaztdzhilw6yqsi6m 507 10 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 507 11 ijst/2015 ijst/2015 CD work_ayatblpinzaztdzhilw6yqsi6m 507 12 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 507 13 v8i19/80196 v8i19/80196 CD work_ayatblpinzaztdzhilw6yqsi6m 507 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 508 1 Kimberly Kimberly NNP work_ayatblpinzaztdzhilw6yqsi6m 508 2 T T NNP work_ayatblpinzaztdzhilw6yqsi6m 508 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 508 4 Salahuddin Salahuddin NNP work_ayatblpinzaztdzhilw6yqsi6m 508 5 JK JK NNP work_ayatblpinzaztdzhilw6yqsi6m 508 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 508 7 Aristide Aristide NNP work_ayatblpinzaztdzhilw6yqsi6m 508 8 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 508 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 508 10 Lorenzo Lorenzo NNP work_ayatblpinzaztdzhilw6yqsi6m 508 11 C. C. NNP work_ayatblpinzaztdzhilw6yqsi6m 508 12 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 508 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 509 1 CopperDroid CopperDroid NNP work_ayatblpinzaztdzhilw6yqsi6m 509 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 509 3 automatic automatic JJ work_ayatblpinzaztdzhilw6yqsi6m 509 4 reconstruction reconstruction NN work_ayatblpinzaztdzhilw6yqsi6m 509 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 509 6 android android NNP work_ayatblpinzaztdzhilw6yqsi6m 509 7 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 509 8 behaviors behavior NNS work_ayatblpinzaztdzhilw6yqsi6m 509 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 510 1 NDSS NDSS NNP work_ayatblpinzaztdzhilw6yqsi6m 510 2 Symposium Symposium NNP work_ayatblpinzaztdzhilw6yqsi6m 510 3 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 510 4 2015:1–15 2015:1–15 CD work_ayatblpinzaztdzhilw6yqsi6m 510 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 511 1 Kohavi Kohavi NNP work_ayatblpinzaztdzhilw6yqsi6m 511 2 R. R. NNP work_ayatblpinzaztdzhilw6yqsi6m 511 3 1996 1996 CD work_ayatblpinzaztdzhilw6yqsi6m 511 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 512 1 Scaling scale VBG work_ayatblpinzaztdzhilw6yqsi6m 512 2 up up RP work_ayatblpinzaztdzhilw6yqsi6m 512 3 the the DT work_ayatblpinzaztdzhilw6yqsi6m 512 4 accuracy accuracy NN work_ayatblpinzaztdzhilw6yqsi6m 512 5 of of IN work_ayatblpinzaztdzhilw6yqsi6m 512 6 Naive Naive NNP work_ayatblpinzaztdzhilw6yqsi6m 512 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 512 8 Bayes Bayes NNP work_ayatblpinzaztdzhilw6yqsi6m 512 9 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 512 10 : : : work_ayatblpinzaztdzhilw6yqsi6m 512 11 a a DT work_ayatblpinzaztdzhilw6yqsi6m 512 12 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 512 13 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 512 14 tree tree NN work_ayatblpinzaztdzhilw6yqsi6m 512 15 hybrid hybrid NN work_ayatblpinzaztdzhilw6yqsi6m 512 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 513 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 513 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 513 3 KDD KDD NNP work_ayatblpinzaztdzhilw6yqsi6m 513 4 Proceedings Proceedings NNPS work_ayatblpinzaztdzhilw6yqsi6m 513 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 514 1 Citeseer Citeseer NNP work_ayatblpinzaztdzhilw6yqsi6m 514 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 514 3 96 96 CD work_ayatblpinzaztdzhilw6yqsi6m 514 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 515 1 Kok Kok NNP work_ayatblpinzaztdzhilw6yqsi6m 515 2 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 515 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 515 4 Abdullah Abdullah NNP work_ayatblpinzaztdzhilw6yqsi6m 515 5 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 515 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 515 7 Jhanjhi Jhanjhi NNP work_ayatblpinzaztdzhilw6yqsi6m 515 8 N N NNP work_ayatblpinzaztdzhilw6yqsi6m 515 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 515 10 Supramaniam Supramaniam NNP work_ayatblpinzaztdzhilw6yqsi6m 515 11 M. M. NNP work_ayatblpinzaztdzhilw6yqsi6m 515 12 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 515 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 516 1 Ransomware Ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 516 2 , , , work_ayatblpinzaztdzhilw6yqsi6m 516 3 threat threat NN work_ayatblpinzaztdzhilw6yqsi6m 516 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 516 5 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 516 6 techniques technique NNS work_ayatblpinzaztdzhilw6yqsi6m 516 7 : : : work_ayatblpinzaztdzhilw6yqsi6m 516 8 a a DT work_ayatblpinzaztdzhilw6yqsi6m 516 9 review review NN work_ayatblpinzaztdzhilw6yqsi6m 516 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 517 1 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 517 2 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 517 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 517 4 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 517 5 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 517 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 517 7 Network Network NNP work_ayatblpinzaztdzhilw6yqsi6m 517 8 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 517 9 19(2):136 19(2):136 CD work_ayatblpinzaztdzhilw6yqsi6m 517 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 518 1 Kouliaridis kouliaridis NN work_ayatblpinzaztdzhilw6yqsi6m 518 2 V V NNP work_ayatblpinzaztdzhilw6yqsi6m 518 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 518 4 Kambourakis Kambourakis NNP work_ayatblpinzaztdzhilw6yqsi6m 518 5 G. G. NNP work_ayatblpinzaztdzhilw6yqsi6m 518 6 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 518 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 519 1 Feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 519 2 importance importance NN work_ayatblpinzaztdzhilw6yqsi6m 519 3 in in IN work_ayatblpinzaztdzhilw6yqsi6m 519 4 mobile mobile JJ work_ayatblpinzaztdzhilw6yqsi6m 519 5 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 519 6 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 519 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 520 1 ArXiv ArXiv NNP work_ayatblpinzaztdzhilw6yqsi6m 520 2 preprint preprint NN work_ayatblpinzaztdzhilw6yqsi6m 520 3 arXiv:2008.05299 arXiv:2008.05299 NNP work_ayatblpinzaztdzhilw6yqsi6m 520 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 521 1 Kuruvila Kuruvila NNP work_ayatblpinzaztdzhilw6yqsi6m 521 2 AP AP NNP work_ayatblpinzaztdzhilw6yqsi6m 521 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 521 4 Kundu Kundu NNP work_ayatblpinzaztdzhilw6yqsi6m 521 5 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 521 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 521 7 Basu Basu NNP work_ayatblpinzaztdzhilw6yqsi6m 521 8 K. K. NNP work_ayatblpinzaztdzhilw6yqsi6m 521 9 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 521 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 522 1 Analyzing analyze VBG work_ayatblpinzaztdzhilw6yqsi6m 522 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 522 3 efficiency efficiency NN work_ayatblpinzaztdzhilw6yqsi6m 522 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 522 5 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 522 6 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 522 7 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 522 8 in in IN work_ayatblpinzaztdzhilw6yqsi6m 522 9 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 522 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 522 11 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 522 12 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 522 13 detectors detector NNS work_ayatblpinzaztdzhilw6yqsi6m 522 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 523 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 523 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 523 3 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 523 4 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 523 5 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 523 6 Society Society NNP work_ayatblpinzaztdzhilw6yqsi6m 523 7 Annual Annual NNP work_ayatblpinzaztdzhilw6yqsi6m 523 8 Symposium Symposium NNP work_ayatblpinzaztdzhilw6yqsi6m 523 9 on on IN work_ayatblpinzaztdzhilw6yqsi6m 523 10 VLSI VLSI NNP work_ayatblpinzaztdzhilw6yqsi6m 523 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 523 12 ISVLSI ISVLSI NNP work_ayatblpinzaztdzhilw6yqsi6m 523 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 523 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 524 1 Piscataway piscataway NN work_ayatblpinzaztdzhilw6yqsi6m 524 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 524 3 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 524 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 524 5 452–457 452–457 CD work_ayatblpinzaztdzhilw6yqsi6m 524 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 525 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 525 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 525 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 525 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 526 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 526 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 526 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 526 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 526 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 526 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 526 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 527 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 527 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 527 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 527 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 527 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 527 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 527 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 527 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 527 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 10 22/24 22/24 CD work_ayatblpinzaztdzhilw6yqsi6m 527 11 http://dx.doi.org/10.6028/NIST.TN.1855 http://dx.doi.org/10.6028/NIST.TN.1855 : work_ayatblpinzaztdzhilw6yqsi6m 527 12 http://arxiv.org/abs/1807.10868 http://arxiv.org/abs/1807.10868 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 13 http://dx.doi.org/10.1007/s11416-008-0092-2 http://dx.doi.org/10.1007/s11416-008-0092-2 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 14 http://dx.doi.org/10.1016/j.jisa.2018.02.008 http://dx.doi.org/10.1016/j.jisa.2018.02.008 NN work_ayatblpinzaztdzhilw6yqsi6m 527 15 http://dx.doi.org/10.1002/mrm.24204 http://dx.doi.org/10.1002/mrm.24204 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 16 http://dx.doi.org/10.1126/science.aaa8415 http://dx.doi.org/10.1126/science.aaa8415 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 17 http://dx.doi.org/10.1504/IJSN.2017.084399 http://dx.doi.org/10.1504/IJSN.2017.084399 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 18 http://dx.doi.org/10.17485/ijst/2015/v8i19/80196 http://dx.doi.org/10.17485/ijst/2015/v8i19/80196 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 19 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 527 20 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_ayatblpinzaztdzhilw6yqsi6m 527 21 Kuznetsova Kuznetsova NNP work_ayatblpinzaztdzhilw6yqsi6m 527 22 I -PRON- PRP work_ayatblpinzaztdzhilw6yqsi6m 527 23 , , , work_ayatblpinzaztdzhilw6yqsi6m 527 24 Karpievitch Karpievitch NNP work_ayatblpinzaztdzhilw6yqsi6m 527 25 YV YV NNP work_ayatblpinzaztdzhilw6yqsi6m 527 26 , , , work_ayatblpinzaztdzhilw6yqsi6m 527 27 Filipovska Filipovska NNP work_ayatblpinzaztdzhilw6yqsi6m 527 28 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 527 29 , , , work_ayatblpinzaztdzhilw6yqsi6m 527 30 Lugmayr Lugmayr NNP work_ayatblpinzaztdzhilw6yqsi6m 527 31 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 527 32 , , , work_ayatblpinzaztdzhilw6yqsi6m 527 33 Holzinger Holzinger NNP work_ayatblpinzaztdzhilw6yqsi6m 527 34 A. a. NN work_ayatblpinzaztdzhilw6yqsi6m 528 1 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 528 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 528 3 Review review NN work_ayatblpinzaztdzhilw6yqsi6m 528 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 528 5 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 528 6 learning learn VBG work_ayatblpinzaztdzhilw6yqsi6m 528 7 algorithms algorithm NNS work_ayatblpinzaztdzhilw6yqsi6m 528 8 in in IN work_ayatblpinzaztdzhilw6yqsi6m 528 9 differential differential JJ work_ayatblpinzaztdzhilw6yqsi6m 528 10 expression expression NN work_ayatblpinzaztdzhilw6yqsi6m 528 11 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 528 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 529 1 ArXiv ArXiv NNP work_ayatblpinzaztdzhilw6yqsi6m 529 2 preprint preprint NN work_ayatblpinzaztdzhilw6yqsi6m 529 3 arXiv:1707.09837 arxiv:1707.09837 NN work_ayatblpinzaztdzhilw6yqsi6m 529 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 530 1 Lee Lee NNP work_ayatblpinzaztdzhilw6yqsi6m 530 2 JK JK NNP work_ayatblpinzaztdzhilw6yqsi6m 530 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 530 4 Moon Moon NNP work_ayatblpinzaztdzhilw6yqsi6m 530 5 SY SY NNP work_ayatblpinzaztdzhilw6yqsi6m 530 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 530 7 Park Park NNP work_ayatblpinzaztdzhilw6yqsi6m 530 8 JH JH NNP work_ayatblpinzaztdzhilw6yqsi6m 530 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 531 1 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 531 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 532 1 CloudRPS CloudRPS NNP work_ayatblpinzaztdzhilw6yqsi6m 532 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 532 3 a a DT work_ayatblpinzaztdzhilw6yqsi6m 532 4 cloud cloud NN work_ayatblpinzaztdzhilw6yqsi6m 532 5 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 532 6 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 532 7 enhanced enhanced NNP work_ayatblpinzaztdzhilw6yqsi6m 532 8 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 532 9 prevention prevention NN work_ayatblpinzaztdzhilw6yqsi6m 532 10 system system NN work_ayatblpinzaztdzhilw6yqsi6m 532 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 533 1 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 533 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 533 3 Supercomputing Supercomputing NNP work_ayatblpinzaztdzhilw6yqsi6m 533 4 73(7):3065–3084 73(7):3065–3084 CD work_ayatblpinzaztdzhilw6yqsi6m 533 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 533 6 10.1007 10.1007 CD work_ayatblpinzaztdzhilw6yqsi6m 533 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 533 8 s11227 s11227 CD work_ayatblpinzaztdzhilw6yqsi6m 533 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 533 10 016 016 CD work_ayatblpinzaztdzhilw6yqsi6m 533 11 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 533 12 1825 1825 CD work_ayatblpinzaztdzhilw6yqsi6m 533 13 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 533 14 5 5 CD work_ayatblpinzaztdzhilw6yqsi6m 533 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 534 1 Li Li NNP work_ayatblpinzaztdzhilw6yqsi6m 534 2 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 534 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 534 4 Cheng Cheng NNP work_ayatblpinzaztdzhilw6yqsi6m 534 5 K K NNP work_ayatblpinzaztdzhilw6yqsi6m 534 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 534 7 Wang Wang NNP work_ayatblpinzaztdzhilw6yqsi6m 534 8 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 534 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 534 10 Morstatter Morstatter NNP work_ayatblpinzaztdzhilw6yqsi6m 534 11 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 534 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 534 13 Trevino Trevino NNP work_ayatblpinzaztdzhilw6yqsi6m 534 14 RP RP NNP work_ayatblpinzaztdzhilw6yqsi6m 534 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 534 16 Tang Tang NNP work_ayatblpinzaztdzhilw6yqsi6m 534 17 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 534 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 534 19 Liu Liu NNP work_ayatblpinzaztdzhilw6yqsi6m 534 20 H. H. NNP work_ayatblpinzaztdzhilw6yqsi6m 534 21 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 534 22 . . . work_ayatblpinzaztdzhilw6yqsi6m 535 1 Feature feature NN work_ayatblpinzaztdzhilw6yqsi6m 535 2 selection selection NN work_ayatblpinzaztdzhilw6yqsi6m 535 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 535 4 a a DT work_ayatblpinzaztdzhilw6yqsi6m 535 5 data data NN work_ayatblpinzaztdzhilw6yqsi6m 535 6 perspective perspective NN work_ayatblpinzaztdzhilw6yqsi6m 535 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 536 1 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 536 2 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 536 3 Surveys Surveys NNP work_ayatblpinzaztdzhilw6yqsi6m 536 4 50(6):1–45 50(6):1–45 CD work_ayatblpinzaztdzhilw6yqsi6m 536 5 . . . work_ayatblpinzaztdzhilw6yqsi6m 537 1 Liaw Liaw NNP work_ayatblpinzaztdzhilw6yqsi6m 537 2 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 537 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 537 4 Wiener Wiener NNP work_ayatblpinzaztdzhilw6yqsi6m 537 5 M. M. NNP work_ayatblpinzaztdzhilw6yqsi6m 537 6 2002 2002 CD work_ayatblpinzaztdzhilw6yqsi6m 537 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 538 1 Classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 538 2 and and CC work_ayatblpinzaztdzhilw6yqsi6m 538 3 regression regression NN work_ayatblpinzaztdzhilw6yqsi6m 538 4 by by IN work_ayatblpinzaztdzhilw6yqsi6m 538 5 randomForest randomforest NN work_ayatblpinzaztdzhilw6yqsi6m 538 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 539 1 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 539 2 News News NNP work_ayatblpinzaztdzhilw6yqsi6m 539 3 2(3):18–22 2(3):18–22 CD work_ayatblpinzaztdzhilw6yqsi6m 539 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 540 1 Liu Liu NNP work_ayatblpinzaztdzhilw6yqsi6m 540 2 X X NNP work_ayatblpinzaztdzhilw6yqsi6m 540 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 540 4 Liu Liu NNP work_ayatblpinzaztdzhilw6yqsi6m 540 5 J. J. NNP work_ayatblpinzaztdzhilw6yqsi6m 541 1 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 541 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 542 1 A a DT work_ayatblpinzaztdzhilw6yqsi6m 542 2 two two CD work_ayatblpinzaztdzhilw6yqsi6m 542 3 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 542 4 layered layered JJ work_ayatblpinzaztdzhilw6yqsi6m 542 5 permission permission NN work_ayatblpinzaztdzhilw6yqsi6m 542 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 542 7 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 542 8 android android NN work_ayatblpinzaztdzhilw6yqsi6m 542 9 malware malware NNP work_ayatblpinzaztdzhilw6yqsi6m 542 10 detection detection NNP work_ayatblpinzaztdzhilw6yqsi6m 542 11 scheme scheme NNP work_ayatblpinzaztdzhilw6yqsi6m 542 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 543 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 543 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 543 3 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 543 4 2nd 2nd JJ work_ayatblpinzaztdzhilw6yqsi6m 543 5 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 543 6 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 543 7 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 543 8 on on IN work_ayatblpinzaztdzhilw6yqsi6m 543 9 Mobile Mobile NNP work_ayatblpinzaztdzhilw6yqsi6m 543 10 Cloud Cloud NNP work_ayatblpinzaztdzhilw6yqsi6m 543 11 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 543 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 543 13 Services Services NNPS work_ayatblpinzaztdzhilw6yqsi6m 543 14 , , , work_ayatblpinzaztdzhilw6yqsi6m 543 15 and and CC work_ayatblpinzaztdzhilw6yqsi6m 543 16 Engineering Engineering NNP work_ayatblpinzaztdzhilw6yqsi6m 543 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 544 1 Piscataway piscataway NN work_ayatblpinzaztdzhilw6yqsi6m 544 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 544 3 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 544 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 544 5 142–148 142–148 CD work_ayatblpinzaztdzhilw6yqsi6m 544 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 545 1 Maiorca Maiorca NNP work_ayatblpinzaztdzhilw6yqsi6m 545 2 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 545 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 545 4 Mercaldo Mercaldo NNP work_ayatblpinzaztdzhilw6yqsi6m 545 5 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 545 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 545 7 Giacinto Giacinto NNP work_ayatblpinzaztdzhilw6yqsi6m 545 8 G G NNP work_ayatblpinzaztdzhilw6yqsi6m 545 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 545 10 Visaggio Visaggio NNP work_ayatblpinzaztdzhilw6yqsi6m 545 11 CA CA NNP work_ayatblpinzaztdzhilw6yqsi6m 545 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 545 13 Martinelli Martinelli NNP work_ayatblpinzaztdzhilw6yqsi6m 545 14 F. F. NNP work_ayatblpinzaztdzhilw6yqsi6m 545 15 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 545 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 546 1 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 546 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 546 3 PackDroid PackDroid NNP work_ayatblpinzaztdzhilw6yqsi6m 546 4 : : : work_ayatblpinzaztdzhilw6yqsi6m 546 5 API API NNP work_ayatblpinzaztdzhilw6yqsi6m 546 6 package package NN work_ayatblpinzaztdzhilw6yqsi6m 546 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 546 8 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 546 9 characterization characterization NN work_ayatblpinzaztdzhilw6yqsi6m 546 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 546 11 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 546 12 of of IN work_ayatblpinzaztdzhilw6yqsi6m 546 13 mobile mobile JJ work_ayatblpinzaztdzhilw6yqsi6m 546 14 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 546 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 547 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 547 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 547 3 Proceedings proceeding NNS work_ayatblpinzaztdzhilw6yqsi6m 547 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 547 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 547 6 Symposium Symposium NNP work_ayatblpinzaztdzhilw6yqsi6m 547 7 on on IN work_ayatblpinzaztdzhilw6yqsi6m 547 8 Applied Applied NNP work_ayatblpinzaztdzhilw6yqsi6m 547 9 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 547 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 548 1 1718–1723 1718–1723 CD work_ayatblpinzaztdzhilw6yqsi6m 548 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 549 1 Malone Malone NNP work_ayatblpinzaztdzhilw6yqsi6m 549 2 C C NNP work_ayatblpinzaztdzhilw6yqsi6m 549 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 549 4 Zahran Zahran NNP work_ayatblpinzaztdzhilw6yqsi6m 549 5 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 549 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 549 7 Karri Karri NNP work_ayatblpinzaztdzhilw6yqsi6m 549 8 R. R. NNP work_ayatblpinzaztdzhilw6yqsi6m 549 9 2011 2011 CD work_ayatblpinzaztdzhilw6yqsi6m 549 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 550 1 Are be VBP work_ayatblpinzaztdzhilw6yqsi6m 550 2 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 550 3 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 550 4 counters counter VBZ work_ayatblpinzaztdzhilw6yqsi6m 550 5 a a DT work_ayatblpinzaztdzhilw6yqsi6m 550 6 cost cost NN work_ayatblpinzaztdzhilw6yqsi6m 550 7 effective effective JJ work_ayatblpinzaztdzhilw6yqsi6m 550 8 way way NN work_ayatblpinzaztdzhilw6yqsi6m 550 9 for for IN work_ayatblpinzaztdzhilw6yqsi6m 550 10 integrity integrity NN work_ayatblpinzaztdzhilw6yqsi6m 550 11 checking checking NN work_ayatblpinzaztdzhilw6yqsi6m 550 12 of of IN work_ayatblpinzaztdzhilw6yqsi6m 550 13 programs program NNS work_ayatblpinzaztdzhilw6yqsi6m 550 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 551 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 551 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 551 3 Proceedings proceeding NNS work_ayatblpinzaztdzhilw6yqsi6m 551 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 551 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 551 6 Sixth sixth JJ work_ayatblpinzaztdzhilw6yqsi6m 551 7 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 551 8 Workshop Workshop NNP work_ayatblpinzaztdzhilw6yqsi6m 551 9 on on IN work_ayatblpinzaztdzhilw6yqsi6m 551 10 Scalable Scalable NNP work_ayatblpinzaztdzhilw6yqsi6m 551 11 Trusted Trusted NNP work_ayatblpinzaztdzhilw6yqsi6m 551 12 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 551 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 552 1 New New NNP work_ayatblpinzaztdzhilw6yqsi6m 552 2 York York NNP work_ayatblpinzaztdzhilw6yqsi6m 552 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 552 4 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 552 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 552 6 71–76 71–76 CD work_ayatblpinzaztdzhilw6yqsi6m 552 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 553 1 Maurya Maurya NNP work_ayatblpinzaztdzhilw6yqsi6m 553 2 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 553 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 553 4 Kumar Kumar NNP work_ayatblpinzaztdzhilw6yqsi6m 553 5 N N NNP work_ayatblpinzaztdzhilw6yqsi6m 553 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 553 7 Agrawal Agrawal NNP work_ayatblpinzaztdzhilw6yqsi6m 553 8 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 553 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 553 10 Khan Khan NNP work_ayatblpinzaztdzhilw6yqsi6m 553 11 R. R. NNP work_ayatblpinzaztdzhilw6yqsi6m 553 12 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 553 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 554 1 Ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 554 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 554 3 evolution evolution NN work_ayatblpinzaztdzhilw6yqsi6m 554 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 554 5 target target NN work_ayatblpinzaztdzhilw6yqsi6m 554 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 554 7 safety safety NN work_ayatblpinzaztdzhilw6yqsi6m 554 8 measures measure NNS work_ayatblpinzaztdzhilw6yqsi6m 554 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 555 1 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 555 2 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 555 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 555 4 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 555 5 Sciences Sciences NNPS work_ayatblpinzaztdzhilw6yqsi6m 555 6 and and CC work_ayatblpinzaztdzhilw6yqsi6m 555 7 Engineering Engineering NNP work_ayatblpinzaztdzhilw6yqsi6m 555 8 6(1):80–85 6(1):80–85 CD work_ayatblpinzaztdzhilw6yqsi6m 555 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 556 1 Metz Metz NNP work_ayatblpinzaztdzhilw6yqsi6m 556 2 CE CE NNP work_ayatblpinzaztdzhilw6yqsi6m 556 3 . . . work_ayatblpinzaztdzhilw6yqsi6m 557 1 1978 1978 CD work_ayatblpinzaztdzhilw6yqsi6m 557 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 558 1 Basic basic JJ work_ayatblpinzaztdzhilw6yqsi6m 558 2 principles principle NNS work_ayatblpinzaztdzhilw6yqsi6m 558 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 558 4 ROC ROC NNP work_ayatblpinzaztdzhilw6yqsi6m 558 5 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 558 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 559 1 Seminars seminar NNS work_ayatblpinzaztdzhilw6yqsi6m 559 2 in in IN work_ayatblpinzaztdzhilw6yqsi6m 559 3 Nuclear Nuclear NNP work_ayatblpinzaztdzhilw6yqsi6m 559 4 Medicine Medicine NNP work_ayatblpinzaztdzhilw6yqsi6m 559 5 8(4):283–298 8(4):283–298 CD work_ayatblpinzaztdzhilw6yqsi6m 559 6 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 559 7 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 559 8 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 559 9 S0001 S0001 NNP work_ayatblpinzaztdzhilw6yqsi6m 559 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 559 11 2998(78)80014 2998(78)80014 CD work_ayatblpinzaztdzhilw6yqsi6m 559 12 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 559 13 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 559 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 560 1 Mucci Mucci NNP work_ayatblpinzaztdzhilw6yqsi6m 560 2 PJ PJ NNP work_ayatblpinzaztdzhilw6yqsi6m 560 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 560 4 Browne Browne NNP work_ayatblpinzaztdzhilw6yqsi6m 560 5 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 560 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 560 7 Deane Deane NNP work_ayatblpinzaztdzhilw6yqsi6m 560 8 C C NNP work_ayatblpinzaztdzhilw6yqsi6m 560 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 560 10 Ho Ho NNP work_ayatblpinzaztdzhilw6yqsi6m 560 11 G. G. NNP work_ayatblpinzaztdzhilw6yqsi6m 560 12 1999 1999 CD work_ayatblpinzaztdzhilw6yqsi6m 560 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 561 1 PAPI papi NN work_ayatblpinzaztdzhilw6yqsi6m 561 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 561 3 A a DT work_ayatblpinzaztdzhilw6yqsi6m 561 4 portable portable JJ work_ayatblpinzaztdzhilw6yqsi6m 561 5 interface interface NN work_ayatblpinzaztdzhilw6yqsi6m 561 6 to to IN work_ayatblpinzaztdzhilw6yqsi6m 561 7 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 561 8 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 561 9 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 561 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 562 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 562 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 562 3 Proceedings Proceedings NNP work_ayatblpinzaztdzhilw6yqsi6m 562 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 562 5 Department Department NNP work_ayatblpinzaztdzhilw6yqsi6m 562 6 of of IN work_ayatblpinzaztdzhilw6yqsi6m 562 7 Defense Defense NNP work_ayatblpinzaztdzhilw6yqsi6m 562 8 HPCMP HPCMP NNP work_ayatblpinzaztdzhilw6yqsi6m 562 9 Users Users NNP work_ayatblpinzaztdzhilw6yqsi6m 562 10 Group Group NNP work_ayatblpinzaztdzhilw6yqsi6m 562 11 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 562 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 563 1 Narudin Narudin NNP work_ayatblpinzaztdzhilw6yqsi6m 563 2 FA FA NNP work_ayatblpinzaztdzhilw6yqsi6m 563 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 563 4 Feizollah Feizollah NNP work_ayatblpinzaztdzhilw6yqsi6m 563 5 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 563 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 563 7 Anuar Anuar NNP work_ayatblpinzaztdzhilw6yqsi6m 563 8 NB NB NNP work_ayatblpinzaztdzhilw6yqsi6m 563 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 563 10 Gani Gani NNP work_ayatblpinzaztdzhilw6yqsi6m 563 11 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 564 1 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 564 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 565 1 Evaluation evaluation NN work_ayatblpinzaztdzhilw6yqsi6m 565 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 565 3 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 565 4 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 565 5 classifiers classifier NNS work_ayatblpinzaztdzhilw6yqsi6m 565 6 for for IN work_ayatblpinzaztdzhilw6yqsi6m 565 7 mobile mobile NNP work_ayatblpinzaztdzhilw6yqsi6m 565 8 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 565 9 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 565 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 566 1 Soft soft JJ work_ayatblpinzaztdzhilw6yqsi6m 566 2 Computing computing NN work_ayatblpinzaztdzhilw6yqsi6m 566 3 20(1):343–357 20(1):343–357 CD work_ayatblpinzaztdzhilw6yqsi6m 566 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 566 5 10.1007 10.1007 CD work_ayatblpinzaztdzhilw6yqsi6m 566 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 566 7 s00500 s00500 CD work_ayatblpinzaztdzhilw6yqsi6m 566 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 566 9 014 014 CD work_ayatblpinzaztdzhilw6yqsi6m 566 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 566 11 1511 1511 CD work_ayatblpinzaztdzhilw6yqsi6m 566 12 - - SYM work_ayatblpinzaztdzhilw6yqsi6m 566 13 6 6 CD work_ayatblpinzaztdzhilw6yqsi6m 566 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 567 1 Or or CC work_ayatblpinzaztdzhilw6yqsi6m 567 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 567 3 Meir Meir NNP work_ayatblpinzaztdzhilw6yqsi6m 567 4 O O NNP work_ayatblpinzaztdzhilw6yqsi6m 567 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 567 6 Nissim Nissim NNP work_ayatblpinzaztdzhilw6yqsi6m 567 7 N N NNP work_ayatblpinzaztdzhilw6yqsi6m 567 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 567 9 Elovici Elovici NNP work_ayatblpinzaztdzhilw6yqsi6m 567 10 Y Y NNP work_ayatblpinzaztdzhilw6yqsi6m 567 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 567 12 Rokach Rokach NNP work_ayatblpinzaztdzhilw6yqsi6m 567 13 L. L. NNP work_ayatblpinzaztdzhilw6yqsi6m 567 14 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 567 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 568 1 Dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 568 2 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 568 3 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 568 4 in in IN work_ayatblpinzaztdzhilw6yqsi6m 568 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 568 6 modern modern JJ work_ayatblpinzaztdzhilw6yqsi6m 568 7 era era NN work_ayatblpinzaztdzhilw6yqsi6m 568 8 — — : work_ayatblpinzaztdzhilw6yqsi6m 568 9 a a DT work_ayatblpinzaztdzhilw6yqsi6m 568 10 state state NN work_ayatblpinzaztdzhilw6yqsi6m 568 11 of of IN work_ayatblpinzaztdzhilw6yqsi6m 568 12 the the DT work_ayatblpinzaztdzhilw6yqsi6m 568 13 art art NN work_ayatblpinzaztdzhilw6yqsi6m 568 14 survey survey NN work_ayatblpinzaztdzhilw6yqsi6m 568 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 569 1 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 569 2 Computing Computing NNP work_ayatblpinzaztdzhilw6yqsi6m 569 3 Surveys Surveys NNP work_ayatblpinzaztdzhilw6yqsi6m 569 4 52(5):1–48 52(5):1–48 NNP work_ayatblpinzaztdzhilw6yqsi6m 569 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 569 6 10.1145/3329786 10.1145/3329786 CD work_ayatblpinzaztdzhilw6yqsi6m 569 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 570 1 Pedregosa Pedregosa NNP work_ayatblpinzaztdzhilw6yqsi6m 570 2 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 570 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 4 Varoquaux Varoquaux NNP work_ayatblpinzaztdzhilw6yqsi6m 570 5 G G NNP work_ayatblpinzaztdzhilw6yqsi6m 570 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 7 Gramfort Gramfort NNP work_ayatblpinzaztdzhilw6yqsi6m 570 8 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 570 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 10 Michel Michel NNP work_ayatblpinzaztdzhilw6yqsi6m 570 11 V V NNP work_ayatblpinzaztdzhilw6yqsi6m 570 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 13 Thirion Thirion NNP work_ayatblpinzaztdzhilw6yqsi6m 570 14 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 570 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 16 Grisel Grisel NNP work_ayatblpinzaztdzhilw6yqsi6m 570 17 O O NNP work_ayatblpinzaztdzhilw6yqsi6m 570 18 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 19 Blondel Blondel NNP work_ayatblpinzaztdzhilw6yqsi6m 570 20 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 570 21 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 22 Prettenhofer Prettenhofer NNP work_ayatblpinzaztdzhilw6yqsi6m 570 23 P P NNP work_ayatblpinzaztdzhilw6yqsi6m 570 24 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 25 Weiss Weiss NNP work_ayatblpinzaztdzhilw6yqsi6m 570 26 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 570 27 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 28 Dubourg Dubourg NNP work_ayatblpinzaztdzhilw6yqsi6m 570 29 V V NNP work_ayatblpinzaztdzhilw6yqsi6m 570 30 , , , work_ayatblpinzaztdzhilw6yqsi6m 570 31 Vanderplas Vanderplas NNP work_ayatblpinzaztdzhilw6yqsi6m 570 32 J. J. NNP work_ayatblpinzaztdzhilw6yqsi6m 571 1 2011 2011 CD work_ayatblpinzaztdzhilw6yqsi6m 571 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 572 1 Scikit Scikit NNS work_ayatblpinzaztdzhilw6yqsi6m 572 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 572 3 learn learn VB work_ayatblpinzaztdzhilw6yqsi6m 572 4 : : : work_ayatblpinzaztdzhilw6yqsi6m 572 5 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 572 6 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 572 7 in in IN work_ayatblpinzaztdzhilw6yqsi6m 572 8 Python Python NNP work_ayatblpinzaztdzhilw6yqsi6m 572 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 573 1 Journal Journal NNP work_ayatblpinzaztdzhilw6yqsi6m 573 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 573 3 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 573 4 Learning Learning NNP work_ayatblpinzaztdzhilw6yqsi6m 573 5 research research NN work_ayatblpinzaztdzhilw6yqsi6m 573 6 12:2825–2830 12:2825–2830 NNP work_ayatblpinzaztdzhilw6yqsi6m 573 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 574 1 Ramesh Ramesh NNP work_ayatblpinzaztdzhilw6yqsi6m 574 2 G G NNP work_ayatblpinzaztdzhilw6yqsi6m 574 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 574 4 Menen Menen NNP work_ayatblpinzaztdzhilw6yqsi6m 574 5 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 575 1 2020 2020 CD work_ayatblpinzaztdzhilw6yqsi6m 575 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 576 1 Automated automated JJ work_ayatblpinzaztdzhilw6yqsi6m 576 2 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 576 3 approach approach NN work_ayatblpinzaztdzhilw6yqsi6m 576 4 for for IN work_ayatblpinzaztdzhilw6yqsi6m 576 5 detecting detect VBG work_ayatblpinzaztdzhilw6yqsi6m 576 6 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 576 7 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 576 8 finite finite JJ work_ayatblpinzaztdzhilw6yqsi6m 576 9 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 576 10 state state NN work_ayatblpinzaztdzhilw6yqsi6m 576 11 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 576 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 577 1 Decision Decision NNP work_ayatblpinzaztdzhilw6yqsi6m 577 2 Support Support NNP work_ayatblpinzaztdzhilw6yqsi6m 577 3 Systems Systems NNP work_ayatblpinzaztdzhilw6yqsi6m 577 4 138:113400 138:113400 NN work_ayatblpinzaztdzhilw6yqsi6m 577 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 577 6 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 577 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 577 8 j.dss.2020.113400 j.dss.2020.113400 NNP work_ayatblpinzaztdzhilw6yqsi6m 577 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 578 1 Scalas Scalas NNP work_ayatblpinzaztdzhilw6yqsi6m 578 2 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 578 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 578 4 Maiorca Maiorca NNP work_ayatblpinzaztdzhilw6yqsi6m 578 5 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 578 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 578 7 Mercaldo Mercaldo NNP work_ayatblpinzaztdzhilw6yqsi6m 578 8 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 578 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 578 10 Visaggio Visaggio NNP work_ayatblpinzaztdzhilw6yqsi6m 578 11 CA CA NNP work_ayatblpinzaztdzhilw6yqsi6m 578 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 578 13 Martinelli Martinelli NNP work_ayatblpinzaztdzhilw6yqsi6m 578 14 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 578 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 578 16 Giacinto Giacinto NNP work_ayatblpinzaztdzhilw6yqsi6m 578 17 G. G. NNP work_ayatblpinzaztdzhilw6yqsi6m 578 18 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 578 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 579 1 On on IN work_ayatblpinzaztdzhilw6yqsi6m 579 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 579 3 effectiveness effectiveness NN work_ayatblpinzaztdzhilw6yqsi6m 579 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 579 5 system system NN work_ayatblpinzaztdzhilw6yqsi6m 579 6 API api NN work_ayatblpinzaztdzhilw6yqsi6m 579 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 579 8 related relate VBN work_ayatblpinzaztdzhilw6yqsi6m 579 9 information information NN work_ayatblpinzaztdzhilw6yqsi6m 579 10 for for IN work_ayatblpinzaztdzhilw6yqsi6m 579 11 Android Android NNP work_ayatblpinzaztdzhilw6yqsi6m 579 12 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 579 13 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 579 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 580 1 Computers Computers NNP work_ayatblpinzaztdzhilw6yqsi6m 580 2 & & CC work_ayatblpinzaztdzhilw6yqsi6m 580 3 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 580 4 86:168–182 86:168–182 CD work_ayatblpinzaztdzhilw6yqsi6m 580 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 580 6 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 580 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 580 8 j.cose.2019.06.004 j.cose.2019.06.004 NN work_ayatblpinzaztdzhilw6yqsi6m 580 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 581 1 Sgandurra Sgandurra NNP work_ayatblpinzaztdzhilw6yqsi6m 581 2 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 581 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 581 4 Muñoz Muñoz NNP work_ayatblpinzaztdzhilw6yqsi6m 581 5 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 581 6 González González NNP work_ayatblpinzaztdzhilw6yqsi6m 581 7 L L NNP work_ayatblpinzaztdzhilw6yqsi6m 581 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 581 9 Mohsen Mohsen NNP work_ayatblpinzaztdzhilw6yqsi6m 581 10 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 581 11 , , , work_ayatblpinzaztdzhilw6yqsi6m 581 12 Lupu Lupu NNP work_ayatblpinzaztdzhilw6yqsi6m 581 13 EC EC NNP work_ayatblpinzaztdzhilw6yqsi6m 581 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 582 1 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 582 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 583 1 Automated automated JJ work_ayatblpinzaztdzhilw6yqsi6m 583 2 dynamic dynamic JJ work_ayatblpinzaztdzhilw6yqsi6m 583 3 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 583 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 583 5 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 583 6 : : : work_ayatblpinzaztdzhilw6yqsi6m 583 7 benefits benefit NNS work_ayatblpinzaztdzhilw6yqsi6m 583 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 583 9 limitations limitation NNS work_ayatblpinzaztdzhilw6yqsi6m 583 10 and and CC work_ayatblpinzaztdzhilw6yqsi6m 583 11 use use NN work_ayatblpinzaztdzhilw6yqsi6m 583 12 for for IN work_ayatblpinzaztdzhilw6yqsi6m 583 13 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 583 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 584 1 ArXiv ArXiv NNP work_ayatblpinzaztdzhilw6yqsi6m 584 2 preprint preprint NN work_ayatblpinzaztdzhilw6yqsi6m 584 3 arXiv:1609.03020v1 arxiv:1609.03020v1 XX work_ayatblpinzaztdzhilw6yqsi6m 584 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 585 1 Simonyan Simonyan NNP work_ayatblpinzaztdzhilw6yqsi6m 585 2 K K NNP work_ayatblpinzaztdzhilw6yqsi6m 585 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 585 4 Zisserman Zisserman NNP work_ayatblpinzaztdzhilw6yqsi6m 585 5 A. a. NN work_ayatblpinzaztdzhilw6yqsi6m 586 1 2014 2014 CD work_ayatblpinzaztdzhilw6yqsi6m 586 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 587 1 Very very RB work_ayatblpinzaztdzhilw6yqsi6m 587 2 deep deep JJ work_ayatblpinzaztdzhilw6yqsi6m 587 3 convolutional convolutional JJ work_ayatblpinzaztdzhilw6yqsi6m 587 4 networks network NNS work_ayatblpinzaztdzhilw6yqsi6m 587 5 for for IN work_ayatblpinzaztdzhilw6yqsi6m 587 6 large large JJ work_ayatblpinzaztdzhilw6yqsi6m 587 7 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 587 8 scale scale NN work_ayatblpinzaztdzhilw6yqsi6m 587 9 image image NN work_ayatblpinzaztdzhilw6yqsi6m 587 10 recognition recognition NN work_ayatblpinzaztdzhilw6yqsi6m 587 11 . . . work_ayatblpinzaztdzhilw6yqsi6m 588 1 ArXiv ArXiv NNP work_ayatblpinzaztdzhilw6yqsi6m 588 2 preprint preprint NN work_ayatblpinzaztdzhilw6yqsi6m 588 3 arXiv:1409.1556 arXiv:1409.1556 NNP work_ayatblpinzaztdzhilw6yqsi6m 588 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 589 1 Singh Singh NNP work_ayatblpinzaztdzhilw6yqsi6m 589 2 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 589 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 589 4 Evtyushkin Evtyushkin NNP work_ayatblpinzaztdzhilw6yqsi6m 589 5 D D NNP work_ayatblpinzaztdzhilw6yqsi6m 589 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 589 7 Elwell Elwell NNP work_ayatblpinzaztdzhilw6yqsi6m 589 8 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 589 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 589 10 Riley Riley NNP work_ayatblpinzaztdzhilw6yqsi6m 589 11 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 589 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 589 13 Cervesato Cervesato NNP work_ayatblpinzaztdzhilw6yqsi6m 589 14 I. I. NNP work_ayatblpinzaztdzhilw6yqsi6m 590 1 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 590 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 591 1 On on IN work_ayatblpinzaztdzhilw6yqsi6m 591 2 the the DT work_ayatblpinzaztdzhilw6yqsi6m 591 3 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 591 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 591 5 kernel kernel NN work_ayatblpinzaztdzhilw6yqsi6m 591 6 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 591 7 level level NN work_ayatblpinzaztdzhilw6yqsi6m 591 8 rootkits rootkit NNS work_ayatblpinzaztdzhilw6yqsi6m 591 9 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 591 10 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 591 11 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 591 12 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 591 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 592 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 592 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 592 3 Proceedings proceeding NNS work_ayatblpinzaztdzhilw6yqsi6m 592 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 592 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 592 6 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 592 7 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 592 8 on on IN work_ayatblpinzaztdzhilw6yqsi6m 592 9 Asia Asia NNP work_ayatblpinzaztdzhilw6yqsi6m 592 10 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 592 11 on on IN work_ayatblpinzaztdzhilw6yqsi6m 592 12 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 592 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 592 14 Communications Communications NNPS work_ayatblpinzaztdzhilw6yqsi6m 592 15 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 592 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 593 1 483–493 483–493 CD work_ayatblpinzaztdzhilw6yqsi6m 593 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 594 1 Song Song NNP work_ayatblpinzaztdzhilw6yqsi6m 594 2 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 594 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 594 4 Kim Kim NNP work_ayatblpinzaztdzhilw6yqsi6m 594 5 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 594 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 594 7 Lee Lee NNP work_ayatblpinzaztdzhilw6yqsi6m 594 8 S. S. NNP work_ayatblpinzaztdzhilw6yqsi6m 594 9 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 594 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 595 1 The the DT work_ayatblpinzaztdzhilw6yqsi6m 595 2 effective effective JJ work_ayatblpinzaztdzhilw6yqsi6m 595 3 ransomware ransomware NNP work_ayatblpinzaztdzhilw6yqsi6m 595 4 prevention prevention NN work_ayatblpinzaztdzhilw6yqsi6m 595 5 technique technique NN work_ayatblpinzaztdzhilw6yqsi6m 595 6 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 595 7 process process NN work_ayatblpinzaztdzhilw6yqsi6m 595 8 monitoring monitor VBG work_ayatblpinzaztdzhilw6yqsi6m 595 9 on on IN work_ayatblpinzaztdzhilw6yqsi6m 595 10 android android NN work_ayatblpinzaztdzhilw6yqsi6m 595 11 platform platform NN work_ayatblpinzaztdzhilw6yqsi6m 595 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 596 1 Advances advance NNS work_ayatblpinzaztdzhilw6yqsi6m 596 2 in in IN work_ayatblpinzaztdzhilw6yqsi6m 596 3 Mobile Mobile NNP work_ayatblpinzaztdzhilw6yqsi6m 596 4 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 596 5 Technologies Technologies NNP work_ayatblpinzaztdzhilw6yqsi6m 596 6 2016(1):1–9 2016(1):1–9 NNP work_ayatblpinzaztdzhilw6yqsi6m 596 7 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 596 8 10.1155/2016/2946735 10.1155/2016/2946735 CD work_ayatblpinzaztdzhilw6yqsi6m 596 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 597 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 597 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 597 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 597 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 598 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 598 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 598 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 598 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 598 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 598 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 598 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 599 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 599 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 599 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 599 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 599 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 599 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 599 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 599 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 599 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 599 10 23/24 23/24 CD work_ayatblpinzaztdzhilw6yqsi6m 599 11 http://dx.doi.org/10.1007/s11227-016-1825-5 http://dx.doi.org/10.1007/s11227-016-1825-5 NNP work_ayatblpinzaztdzhilw6yqsi6m 599 12 http://dx.doi.org/10.1016/S0001-2998(78)80014-2 http://dx.doi.org/10.1016/S0001-2998(78)80014-2 NNP work_ayatblpinzaztdzhilw6yqsi6m 599 13 http://dx.doi.org/10.1007/s00500-014-1511-6 http://dx.doi.org/10.1007/s00500-014-1511-6 NNP work_ayatblpinzaztdzhilw6yqsi6m 599 14 http://dx.doi.org/10.1145/3329786 http://dx.doi.org/10.1145/3329786 NNP work_ayatblpinzaztdzhilw6yqsi6m 599 15 http://dx.doi.org/10.1016/j.dss.2020.113400 http://dx.doi.org/10.1016/j.dss.2020.113400 FW work_ayatblpinzaztdzhilw6yqsi6m 599 16 http://dx.doi.org/10.1016/j.cose.2019.06.004 http://dx.doi.org/10.1016/j.cose.2019.06.004 NNP work_ayatblpinzaztdzhilw6yqsi6m 599 17 http://dx.doi.org/10.1155/2016/2946735 http://dx.doi.org/10.1155/2016/2946735 ADD work_ayatblpinzaztdzhilw6yqsi6m 599 18 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 599 19 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 599 20 Tan Tan NNP work_ayatblpinzaztdzhilw6yqsi6m 599 21 PN PN NNP work_ayatblpinzaztdzhilw6yqsi6m 599 22 , , , work_ayatblpinzaztdzhilw6yqsi6m 599 23 Steinbach Steinbach NNP work_ayatblpinzaztdzhilw6yqsi6m 599 24 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 599 25 , , , work_ayatblpinzaztdzhilw6yqsi6m 599 26 Kumar Kumar NNP work_ayatblpinzaztdzhilw6yqsi6m 599 27 V. V. NNP work_ayatblpinzaztdzhilw6yqsi6m 599 28 2006 2006 CD work_ayatblpinzaztdzhilw6yqsi6m 599 29 . . . work_ayatblpinzaztdzhilw6yqsi6m 600 1 Classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 600 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 600 3 basic basic JJ work_ayatblpinzaztdzhilw6yqsi6m 600 4 concepts concept NNS work_ayatblpinzaztdzhilw6yqsi6m 600 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 600 6 decision decision NN work_ayatblpinzaztdzhilw6yqsi6m 600 7 trees tree NNS work_ayatblpinzaztdzhilw6yqsi6m 600 8 , , , work_ayatblpinzaztdzhilw6yqsi6m 600 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 600 10 model model NN work_ayatblpinzaztdzhilw6yqsi6m 600 11 evaluation evaluation NN work_ayatblpinzaztdzhilw6yqsi6m 600 12 . . . work_ayatblpinzaztdzhilw6yqsi6m 601 1 Introduction introduction NN work_ayatblpinzaztdzhilw6yqsi6m 601 2 to to IN work_ayatblpinzaztdzhilw6yqsi6m 601 3 Data Data NNP work_ayatblpinzaztdzhilw6yqsi6m 601 4 Mining Mining NNP work_ayatblpinzaztdzhilw6yqsi6m 601 5 1:145–205 1:145–205 CD work_ayatblpinzaztdzhilw6yqsi6m 601 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 602 1 Victoriano Victoriano NNP work_ayatblpinzaztdzhilw6yqsi6m 602 2 OB OB NNP work_ayatblpinzaztdzhilw6yqsi6m 602 3 . . . work_ayatblpinzaztdzhilw6yqsi6m 603 1 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 603 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 604 1 Exposing expose VBG work_ayatblpinzaztdzhilw6yqsi6m 604 2 android android NN work_ayatblpinzaztdzhilw6yqsi6m 604 3 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 604 4 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 604 5 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 604 6 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 604 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 605 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 605 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 605 3 Proceedings Proceedings NNP work_ayatblpinzaztdzhilw6yqsi6m 605 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 605 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 605 6 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 605 7 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 605 8 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 605 9 on on IN work_ayatblpinzaztdzhilw6yqsi6m 605 10 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 605 11 System System NNP work_ayatblpinzaztdzhilw6yqsi6m 605 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 605 13 System System NNP work_ayatblpinzaztdzhilw6yqsi6m 605 14 Management Management NNP work_ayatblpinzaztdzhilw6yqsi6m 605 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 606 1 32–37 32–37 NNP work_ayatblpinzaztdzhilw6yqsi6m 606 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 607 1 Wang Wang NNP work_ayatblpinzaztdzhilw6yqsi6m 607 2 X X NNP work_ayatblpinzaztdzhilw6yqsi6m 607 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 607 4 Chai Chai NNP work_ayatblpinzaztdzhilw6yqsi6m 607 5 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 607 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 607 7 Isnardi Isnardi NNP work_ayatblpinzaztdzhilw6yqsi6m 607 8 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 607 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 607 10 Lim Lim NNP work_ayatblpinzaztdzhilw6yqsi6m 607 11 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 607 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 607 13 Karri Karri NNP work_ayatblpinzaztdzhilw6yqsi6m 607 14 R. R. NNP work_ayatblpinzaztdzhilw6yqsi6m 607 15 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 607 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 608 1 Hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 608 2 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 608 3 counter counter NN work_ayatblpinzaztdzhilw6yqsi6m 608 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 608 5 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 608 6 malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 608 7 identification identification NN work_ayatblpinzaztdzhilw6yqsi6m 608 8 and and CC work_ayatblpinzaztdzhilw6yqsi6m 608 9 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 608 10 with with IN work_ayatblpinzaztdzhilw6yqsi6m 608 11 adaptive adaptive JJ work_ayatblpinzaztdzhilw6yqsi6m 608 12 compressive compressive JJ work_ayatblpinzaztdzhilw6yqsi6m 608 13 sensing sensing NN work_ayatblpinzaztdzhilw6yqsi6m 608 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 609 1 ACM ACM NNP work_ayatblpinzaztdzhilw6yqsi6m 609 2 Transactions Transactions NNPS work_ayatblpinzaztdzhilw6yqsi6m 609 3 on on IN work_ayatblpinzaztdzhilw6yqsi6m 609 4 Architecture Architecture NNP work_ayatblpinzaztdzhilw6yqsi6m 609 5 and and CC work_ayatblpinzaztdzhilw6yqsi6m 609 6 Code Code NNP work_ayatblpinzaztdzhilw6yqsi6m 609 7 Optimization Optimization NNP work_ayatblpinzaztdzhilw6yqsi6m 609 8 13(1):1–23 13(1):1–23 CD work_ayatblpinzaztdzhilw6yqsi6m 609 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 610 1 Weaver Weaver NNP work_ayatblpinzaztdzhilw6yqsi6m 610 2 VM VM NNP work_ayatblpinzaztdzhilw6yqsi6m 610 3 . . . work_ayatblpinzaztdzhilw6yqsi6m 611 1 2013 2013 CD work_ayatblpinzaztdzhilw6yqsi6m 611 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 612 1 Linux Linux NNP work_ayatblpinzaztdzhilw6yqsi6m 612 2 perf_event perf_event NNP work_ayatblpinzaztdzhilw6yqsi6m 612 3 features feature VBZ work_ayatblpinzaztdzhilw6yqsi6m 612 4 and and CC work_ayatblpinzaztdzhilw6yqsi6m 612 5 overhead overhead RB work_ayatblpinzaztdzhilw6yqsi6m 612 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 613 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 613 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 613 3 The the DT work_ayatblpinzaztdzhilw6yqsi6m 613 4 2nd 2nd JJ work_ayatblpinzaztdzhilw6yqsi6m 613 5 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 613 6 Workshop Workshop NNP work_ayatblpinzaztdzhilw6yqsi6m 613 7 on on IN work_ayatblpinzaztdzhilw6yqsi6m 613 8 Performance Performance NNP work_ayatblpinzaztdzhilw6yqsi6m 613 9 Analysis Analysis NNP work_ayatblpinzaztdzhilw6yqsi6m 613 10 of of IN work_ayatblpinzaztdzhilw6yqsi6m 613 11 Workload Workload NNP work_ayatblpinzaztdzhilw6yqsi6m 613 12 Optimized Optimized NNP work_ayatblpinzaztdzhilw6yqsi6m 613 13 Systems Systems NNPS work_ayatblpinzaztdzhilw6yqsi6m 613 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 614 1 Vol Vol NNP work_ayatblpinzaztdzhilw6yqsi6m 614 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 615 1 13 13 CD work_ayatblpinzaztdzhilw6yqsi6m 615 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 616 1 Urbandale urbandale JJ work_ayatblpinzaztdzhilw6yqsi6m 616 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 616 3 FastPath FastPath NNP work_ayatblpinzaztdzhilw6yqsi6m 616 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 617 1 Xu Xu NNP work_ayatblpinzaztdzhilw6yqsi6m 617 2 Z Z NNP work_ayatblpinzaztdzhilw6yqsi6m 617 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 617 4 Ray Ray NNP work_ayatblpinzaztdzhilw6yqsi6m 617 5 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 617 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 617 7 Subramanyan Subramanyan NNP work_ayatblpinzaztdzhilw6yqsi6m 617 8 P P NNP work_ayatblpinzaztdzhilw6yqsi6m 617 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 617 10 Malik Malik NNP work_ayatblpinzaztdzhilw6yqsi6m 617 11 S. S. NNP work_ayatblpinzaztdzhilw6yqsi6m 617 12 2017 2017 CD work_ayatblpinzaztdzhilw6yqsi6m 617 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 618 1 Malware malware JJ work_ayatblpinzaztdzhilw6yqsi6m 618 2 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 618 3 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 618 4 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 618 5 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 618 6 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 618 7 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 618 8 of of IN work_ayatblpinzaztdzhilw6yqsi6m 618 9 virtual virtual JJ work_ayatblpinzaztdzhilw6yqsi6m 618 10 memory memory NN work_ayatblpinzaztdzhilw6yqsi6m 618 11 access access NN work_ayatblpinzaztdzhilw6yqsi6m 618 12 patterns pattern NNS work_ayatblpinzaztdzhilw6yqsi6m 618 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 619 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 619 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 619 3 Proceedings proceeding NNS work_ayatblpinzaztdzhilw6yqsi6m 619 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 619 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 619 6 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 619 7 on on IN work_ayatblpinzaztdzhilw6yqsi6m 619 8 Design Design NNP work_ayatblpinzaztdzhilw6yqsi6m 619 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 619 10 Automation Automation NNP work_ayatblpinzaztdzhilw6yqsi6m 619 11 & & CC work_ayatblpinzaztdzhilw6yqsi6m 619 12 Test Test NNP work_ayatblpinzaztdzhilw6yqsi6m 619 13 in in IN work_ayatblpinzaztdzhilw6yqsi6m 619 14 Europe Europe NNP work_ayatblpinzaztdzhilw6yqsi6m 619 15 European European NNP work_ayatblpinzaztdzhilw6yqsi6m 619 16 Design Design NNP work_ayatblpinzaztdzhilw6yqsi6m 619 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 620 1 169–174 169–174 CD work_ayatblpinzaztdzhilw6yqsi6m 620 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 621 1 Xuan Xuan NNP work_ayatblpinzaztdzhilw6yqsi6m 621 2 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 621 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 621 4 Liu Liu NNP work_ayatblpinzaztdzhilw6yqsi6m 621 5 G G NNP work_ayatblpinzaztdzhilw6yqsi6m 621 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 621 7 Li Li NNP work_ayatblpinzaztdzhilw6yqsi6m 621 8 Z Z NNP work_ayatblpinzaztdzhilw6yqsi6m 621 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 621 10 Zheng Zheng NNP work_ayatblpinzaztdzhilw6yqsi6m 621 11 L L NNP work_ayatblpinzaztdzhilw6yqsi6m 621 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 621 13 Wang Wang NNP work_ayatblpinzaztdzhilw6yqsi6m 621 14 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 621 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 621 16 Jiang Jiang NNP work_ayatblpinzaztdzhilw6yqsi6m 621 17 C. C. NNP work_ayatblpinzaztdzhilw6yqsi6m 621 18 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 621 19 . . . work_ayatblpinzaztdzhilw6yqsi6m 622 1 Random random JJ work_ayatblpinzaztdzhilw6yqsi6m 622 2 forest forest NN work_ayatblpinzaztdzhilw6yqsi6m 622 3 for for IN work_ayatblpinzaztdzhilw6yqsi6m 622 4 credit credit NN work_ayatblpinzaztdzhilw6yqsi6m 622 5 card card NN work_ayatblpinzaztdzhilw6yqsi6m 622 6 fraud fraud NN work_ayatblpinzaztdzhilw6yqsi6m 622 7 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 622 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 623 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 623 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 623 3 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 623 4 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 623 5 15th 15th NN work_ayatblpinzaztdzhilw6yqsi6m 623 6 International International NNP work_ayatblpinzaztdzhilw6yqsi6m 623 7 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 623 8 on on IN work_ayatblpinzaztdzhilw6yqsi6m 623 9 Networking Networking NNP work_ayatblpinzaztdzhilw6yqsi6m 623 10 , , , work_ayatblpinzaztdzhilw6yqsi6m 623 11 Sensing Sensing NNP work_ayatblpinzaztdzhilw6yqsi6m 623 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 623 13 Control Control NNP work_ayatblpinzaztdzhilw6yqsi6m 623 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 624 1 Piscataway piscataway NN work_ayatblpinzaztdzhilw6yqsi6m 624 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 624 3 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 624 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 624 5 1–6 1–6 CD work_ayatblpinzaztdzhilw6yqsi6m 624 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 625 1 Yang Yang NNP work_ayatblpinzaztdzhilw6yqsi6m 625 2 T T NNP work_ayatblpinzaztdzhilw6yqsi6m 625 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 625 4 Yang Yang NNP work_ayatblpinzaztdzhilw6yqsi6m 625 5 Y Y NNP work_ayatblpinzaztdzhilw6yqsi6m 625 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 625 7 Qian Qian NNP work_ayatblpinzaztdzhilw6yqsi6m 625 8 K K NNP work_ayatblpinzaztdzhilw6yqsi6m 625 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 625 10 Tao Tao NNP work_ayatblpinzaztdzhilw6yqsi6m 625 11 L. L. NNP work_ayatblpinzaztdzhilw6yqsi6m 625 12 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 625 13 . . . work_ayatblpinzaztdzhilw6yqsi6m 626 1 Automated automate VBN work_ayatblpinzaztdzhilw6yqsi6m 626 2 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 626 3 and and CC work_ayatblpinzaztdzhilw6yqsi6m 626 4 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 626 5 for for IN work_ayatblpinzaztdzhilw6yqsi6m 626 6 android android NN work_ayatblpinzaztdzhilw6yqsi6m 626 7 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 626 8 . . . work_ayatblpinzaztdzhilw6yqsi6m 627 1 New New NNP work_ayatblpinzaztdzhilw6yqsi6m 627 2 York York NNP work_ayatblpinzaztdzhilw6yqsi6m 627 3 : : : work_ayatblpinzaztdzhilw6yqsi6m 627 4 IEEE IEEE NNP work_ayatblpinzaztdzhilw6yqsi6m 627 5 , , , work_ayatblpinzaztdzhilw6yqsi6m 627 6 1338–1343 1338–1343 CD work_ayatblpinzaztdzhilw6yqsi6m 627 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 628 1 Zavarsky Zavarsky NNP work_ayatblpinzaztdzhilw6yqsi6m 628 2 P P NNP work_ayatblpinzaztdzhilw6yqsi6m 628 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 628 4 Lindskog Lindskog NNP work_ayatblpinzaztdzhilw6yqsi6m 628 5 D. D. NNP work_ayatblpinzaztdzhilw6yqsi6m 628 6 2016 2016 CD work_ayatblpinzaztdzhilw6yqsi6m 628 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 629 1 Experimental experimental JJ work_ayatblpinzaztdzhilw6yqsi6m 629 2 analysis analysis NN work_ayatblpinzaztdzhilw6yqsi6m 629 3 of of IN work_ayatblpinzaztdzhilw6yqsi6m 629 4 ransomware ransomware NN work_ayatblpinzaztdzhilw6yqsi6m 629 5 on on IN work_ayatblpinzaztdzhilw6yqsi6m 629 6 windows window NNS work_ayatblpinzaztdzhilw6yqsi6m 629 7 and and CC work_ayatblpinzaztdzhilw6yqsi6m 629 8 android android NN work_ayatblpinzaztdzhilw6yqsi6m 629 9 platforms platform NNS work_ayatblpinzaztdzhilw6yqsi6m 629 10 : : : work_ayatblpinzaztdzhilw6yqsi6m 629 11 evolution evolution NN work_ayatblpinzaztdzhilw6yqsi6m 629 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 629 13 characterization characterization NN work_ayatblpinzaztdzhilw6yqsi6m 629 14 . . . work_ayatblpinzaztdzhilw6yqsi6m 630 1 Procedia Procedia NNP work_ayatblpinzaztdzhilw6yqsi6m 630 2 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 630 3 Science Science NNP work_ayatblpinzaztdzhilw6yqsi6m 630 4 94:465–472 94:465–472 CD work_ayatblpinzaztdzhilw6yqsi6m 630 5 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 630 6 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 630 7 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 630 8 j.procs.2016.08.072 j.procs.2016.08.072 CD work_ayatblpinzaztdzhilw6yqsi6m 630 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 631 1 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 631 2 H H NNP work_ayatblpinzaztdzhilw6yqsi6m 631 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 631 4 Xiao Xiao NNP work_ayatblpinzaztdzhilw6yqsi6m 631 5 X X NNP work_ayatblpinzaztdzhilw6yqsi6m 631 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 631 7 Mercaldo Mercaldo NNP work_ayatblpinzaztdzhilw6yqsi6m 631 8 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 631 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 631 10 Ni Ni NNP work_ayatblpinzaztdzhilw6yqsi6m 631 11 S S NNP work_ayatblpinzaztdzhilw6yqsi6m 631 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 631 13 Martinelli Martinelli NNP work_ayatblpinzaztdzhilw6yqsi6m 631 14 F F NNP work_ayatblpinzaztdzhilw6yqsi6m 631 15 , , , work_ayatblpinzaztdzhilw6yqsi6m 631 16 Sangaiah Sangaiah NNP work_ayatblpinzaztdzhilw6yqsi6m 631 17 AK AK NNP work_ayatblpinzaztdzhilw6yqsi6m 631 18 . . . work_ayatblpinzaztdzhilw6yqsi6m 632 1 2019 2019 CD work_ayatblpinzaztdzhilw6yqsi6m 632 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 633 1 Classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 633 2 of of IN work_ayatblpinzaztdzhilw6yqsi6m 633 3 ransomware ransomware JJ work_ayatblpinzaztdzhilw6yqsi6m 633 4 families family NNS work_ayatblpinzaztdzhilw6yqsi6m 633 5 with with IN work_ayatblpinzaztdzhilw6yqsi6m 633 6 machine machine NN work_ayatblpinzaztdzhilw6yqsi6m 633 7 learning learning NN work_ayatblpinzaztdzhilw6yqsi6m 633 8 based base VBN work_ayatblpinzaztdzhilw6yqsi6m 633 9 on on IN work_ayatblpinzaztdzhilw6yqsi6m 633 10 N N NNP work_ayatblpinzaztdzhilw6yqsi6m 633 11 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 633 12 gram gram NN work_ayatblpinzaztdzhilw6yqsi6m 633 13 of of IN work_ayatblpinzaztdzhilw6yqsi6m 633 14 opcodes opcode NNS work_ayatblpinzaztdzhilw6yqsi6m 633 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 634 1 Future Future NNP work_ayatblpinzaztdzhilw6yqsi6m 634 2 Generation Generation NNP work_ayatblpinzaztdzhilw6yqsi6m 634 3 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 634 4 Systems Systems NNPS work_ayatblpinzaztdzhilw6yqsi6m 634 5 90:211–221 90:211–221 CD work_ayatblpinzaztdzhilw6yqsi6m 634 6 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 634 7 10.1016 10.1016 CD work_ayatblpinzaztdzhilw6yqsi6m 634 8 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 634 9 j.future.2018.07.052 j.future.2018.07.052 CD work_ayatblpinzaztdzhilw6yqsi6m 634 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 635 1 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 635 2 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 635 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 635 4 Xu Xu NNP work_ayatblpinzaztdzhilw6yqsi6m 635 5 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 635 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 635 7 Wang Wang NNP work_ayatblpinzaztdzhilw6yqsi6m 635 8 D. D. NNP work_ayatblpinzaztdzhilw6yqsi6m 635 9 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 635 10 . . . work_ayatblpinzaztdzhilw6yqsi6m 636 1 An an DT work_ayatblpinzaztdzhilw6yqsi6m 636 2 anomaly anomaly JJ work_ayatblpinzaztdzhilw6yqsi6m 636 3 detection detection NN work_ayatblpinzaztdzhilw6yqsi6m 636 4 model model NN work_ayatblpinzaztdzhilw6yqsi6m 636 5 for for IN work_ayatblpinzaztdzhilw6yqsi6m 636 6 network network NN work_ayatblpinzaztdzhilw6yqsi6m 636 7 intrusions intrusion NNS work_ayatblpinzaztdzhilw6yqsi6m 636 8 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 636 9 one one CD work_ayatblpinzaztdzhilw6yqsi6m 636 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 636 11 class class NN work_ayatblpinzaztdzhilw6yqsi6m 636 12 SVM svm NN work_ayatblpinzaztdzhilw6yqsi6m 636 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 636 14 scaling scale VBG work_ayatblpinzaztdzhilw6yqsi6m 636 15 strategy strategy NN work_ayatblpinzaztdzhilw6yqsi6m 636 16 . . . work_ayatblpinzaztdzhilw6yqsi6m 637 1 Cham Cham NNP work_ayatblpinzaztdzhilw6yqsi6m 637 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 637 3 Springer Springer NNP work_ayatblpinzaztdzhilw6yqsi6m 637 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 637 5 267–278 267–278 CD work_ayatblpinzaztdzhilw6yqsi6m 637 6 . . . work_ayatblpinzaztdzhilw6yqsi6m 638 1 Zhang Zhang NNP work_ayatblpinzaztdzhilw6yqsi6m 638 2 X X NNP work_ayatblpinzaztdzhilw6yqsi6m 638 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 638 4 Zhao Zhao NNP work_ayatblpinzaztdzhilw6yqsi6m 638 5 J J NNP work_ayatblpinzaztdzhilw6yqsi6m 638 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 638 7 LeCun LeCun NNP work_ayatblpinzaztdzhilw6yqsi6m 638 8 Y. Y. NNP work_ayatblpinzaztdzhilw6yqsi6m 639 1 2015 2015 CD work_ayatblpinzaztdzhilw6yqsi6m 639 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 640 1 Character character NN work_ayatblpinzaztdzhilw6yqsi6m 640 2 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 640 3 level level NN work_ayatblpinzaztdzhilw6yqsi6m 640 4 convolutional convolutional JJ work_ayatblpinzaztdzhilw6yqsi6m 640 5 networks network NNS work_ayatblpinzaztdzhilw6yqsi6m 640 6 for for IN work_ayatblpinzaztdzhilw6yqsi6m 640 7 text text NN work_ayatblpinzaztdzhilw6yqsi6m 640 8 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 640 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 641 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 641 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 641 3 Advances advance NNS work_ayatblpinzaztdzhilw6yqsi6m 641 4 in in IN work_ayatblpinzaztdzhilw6yqsi6m 641 5 Neural Neural NNP work_ayatblpinzaztdzhilw6yqsi6m 641 6 Information Information NNP work_ayatblpinzaztdzhilw6yqsi6m 641 7 Processing Processing NNP work_ayatblpinzaztdzhilw6yqsi6m 641 8 Systems Systems NNPS work_ayatblpinzaztdzhilw6yqsi6m 641 9 . . . work_ayatblpinzaztdzhilw6yqsi6m 642 1 649–657 649–657 CD work_ayatblpinzaztdzhilw6yqsi6m 642 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 643 1 Zhou Zhou NNP work_ayatblpinzaztdzhilw6yqsi6m 643 2 B B NNP work_ayatblpinzaztdzhilw6yqsi6m 643 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 643 4 Gupta Gupta NNP work_ayatblpinzaztdzhilw6yqsi6m 643 5 A A NNP work_ayatblpinzaztdzhilw6yqsi6m 643 6 , , , work_ayatblpinzaztdzhilw6yqsi6m 643 7 Jahanshahi Jahanshahi NNP work_ayatblpinzaztdzhilw6yqsi6m 643 8 R R NNP work_ayatblpinzaztdzhilw6yqsi6m 643 9 , , , work_ayatblpinzaztdzhilw6yqsi6m 643 10 Egele Egele NNP work_ayatblpinzaztdzhilw6yqsi6m 643 11 M M NNP work_ayatblpinzaztdzhilw6yqsi6m 643 12 , , , work_ayatblpinzaztdzhilw6yqsi6m 643 13 Joshi Joshi NNP work_ayatblpinzaztdzhilw6yqsi6m 643 14 A. A. NNP work_ayatblpinzaztdzhilw6yqsi6m 644 1 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 644 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 645 1 Hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 645 2 performance performance NN work_ayatblpinzaztdzhilw6yqsi6m 645 3 counters counter NNS work_ayatblpinzaztdzhilw6yqsi6m 645 4 can can MD work_ayatblpinzaztdzhilw6yqsi6m 645 5 detect detect VB work_ayatblpinzaztdzhilw6yqsi6m 645 6 malware malware NN work_ayatblpinzaztdzhilw6yqsi6m 645 7 : : : work_ayatblpinzaztdzhilw6yqsi6m 645 8 Myth myth NN work_ayatblpinzaztdzhilw6yqsi6m 645 9 or or CC work_ayatblpinzaztdzhilw6yqsi6m 645 10 fact fact NN work_ayatblpinzaztdzhilw6yqsi6m 645 11 ? ? . work_ayatblpinzaztdzhilw6yqsi6m 646 1 In in IN work_ayatblpinzaztdzhilw6yqsi6m 646 2 : : : work_ayatblpinzaztdzhilw6yqsi6m 646 3 Proceedings proceeding NNS work_ayatblpinzaztdzhilw6yqsi6m 646 4 of of IN work_ayatblpinzaztdzhilw6yqsi6m 646 5 the the DT work_ayatblpinzaztdzhilw6yqsi6m 646 6 2018 2018 CD work_ayatblpinzaztdzhilw6yqsi6m 646 7 on on IN work_ayatblpinzaztdzhilw6yqsi6m 646 8 Asia Asia NNP work_ayatblpinzaztdzhilw6yqsi6m 646 9 Conference Conference NNP work_ayatblpinzaztdzhilw6yqsi6m 646 10 on on IN work_ayatblpinzaztdzhilw6yqsi6m 646 11 Computer Computer NNP work_ayatblpinzaztdzhilw6yqsi6m 646 12 and and CC work_ayatblpinzaztdzhilw6yqsi6m 646 13 Communications Communications NNPS work_ayatblpinzaztdzhilw6yqsi6m 646 14 Security Security NNP work_ayatblpinzaztdzhilw6yqsi6m 646 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 647 1 457–468 457–468 CD work_ayatblpinzaztdzhilw6yqsi6m 647 2 . . . work_ayatblpinzaztdzhilw6yqsi6m 648 1 Aurangzeb Aurangzeb NNP work_ayatblpinzaztdzhilw6yqsi6m 648 2 et et NNP work_ayatblpinzaztdzhilw6yqsi6m 648 3 al al NNP work_ayatblpinzaztdzhilw6yqsi6m 648 4 . . . work_ayatblpinzaztdzhilw6yqsi6m 649 1 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 649 2 2021 2021 CD work_ayatblpinzaztdzhilw6yqsi6m 649 3 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 649 4 , , , work_ayatblpinzaztdzhilw6yqsi6m 649 5 PeerJ PeerJ NNP work_ayatblpinzaztdzhilw6yqsi6m 649 6 Comput Comput NNP work_ayatblpinzaztdzhilw6yqsi6m 649 7 . . . work_ayatblpinzaztdzhilw6yqsi6m 650 1 Sci Sci NNP work_ayatblpinzaztdzhilw6yqsi6m 650 2 . . NNP work_ayatblpinzaztdzhilw6yqsi6m 650 3 , , , work_ayatblpinzaztdzhilw6yqsi6m 650 4 DOI DOI NNP work_ayatblpinzaztdzhilw6yqsi6m 650 5 10.7717 10.7717 CD work_ayatblpinzaztdzhilw6yqsi6m 650 6 / / SYM work_ayatblpinzaztdzhilw6yqsi6m 650 7 peerj peerj NNP work_ayatblpinzaztdzhilw6yqsi6m 650 8 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 650 9 cs.361 cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 650 10 24/24 24/24 CD work_ayatblpinzaztdzhilw6yqsi6m 650 11 http://dx.doi.org/10.1016/j.procs.2016.08.072 http://dx.doi.org/10.1016/j.procs.2016.08.072 NNP work_ayatblpinzaztdzhilw6yqsi6m 650 12 http://dx.doi.org/10.1016/j.future.2018.07.052 http://dx.doi.org/10.1016/j.future.2018.07.052 NN work_ayatblpinzaztdzhilw6yqsi6m 650 13 http://dx.doi.org/10.7717/peerj-cs.361 http://dx.doi.org/10.7717/peerj-cs.361 NNP work_ayatblpinzaztdzhilw6yqsi6m 650 14 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_ayatblpinzaztdzhilw6yqsi6m 650 15 On on IN work_ayatblpinzaztdzhilw6yqsi6m 650 16 the the DT work_ayatblpinzaztdzhilw6yqsi6m 650 17 classification classification NN work_ayatblpinzaztdzhilw6yqsi6m 650 18 of of IN work_ayatblpinzaztdzhilw6yqsi6m 650 19 Microsoft Microsoft NNP work_ayatblpinzaztdzhilw6yqsi6m 650 20 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 650 21 Windows Windows NNP work_ayatblpinzaztdzhilw6yqsi6m 650 22 ransomware ransomware VBP work_ayatblpinzaztdzhilw6yqsi6m 650 23 using use VBG work_ayatblpinzaztdzhilw6yqsi6m 650 24 hardware hardware NN work_ayatblpinzaztdzhilw6yqsi6m 650 25 profile profile NN work_ayatblpinzaztdzhilw6yqsi6m 650 26 Introduction Introduction NNP work_ayatblpinzaztdzhilw6yqsi6m 650 27 Related related JJ work_ayatblpinzaztdzhilw6yqsi6m 650 28 work work NN work_ayatblpinzaztdzhilw6yqsi6m 650 29 Motivation Motivation NNP work_ayatblpinzaztdzhilw6yqsi6m 650 30 and and CC work_ayatblpinzaztdzhilw6yqsi6m 650 31 methodology methodology NN work_ayatblpinzaztdzhilw6yqsi6m 650 32 Results result NNS work_ayatblpinzaztdzhilw6yqsi6m 650 33 and and CC work_ayatblpinzaztdzhilw6yqsi6m 650 34 discussion discussion NN work_ayatblpinzaztdzhilw6yqsi6m 650 35 Conclusions conclusion NNS work_ayatblpinzaztdzhilw6yqsi6m 650 36 References References NNPS work_ayatblpinzaztdzhilw6yqsi6m 650 37 < < XX work_ayatblpinzaztdzhilw6yqsi6m 650 38 < < XX work_ayatblpinzaztdzhilw6yqsi6m 650 39 /ASCII85EncodePages /ASCII85EncodePages , work_ayatblpinzaztdzhilw6yqsi6m 650 40 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 650 41 /AllowTransparency /allowtransparency NN work_ayatblpinzaztdzhilw6yqsi6m 650 42 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 650 43 /AutoPositionEPSFiles /AutoPositionEPSFiles . work_ayatblpinzaztdzhilw6yqsi6m 650 44 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 650 45 /AutoRotatePages /AutoRotatePages . work_ayatblpinzaztdzhilw6yqsi6m 650 46 /None /None NFP work_ayatblpinzaztdzhilw6yqsi6m 650 47 /Binding /Binding . work_ayatblpinzaztdzhilw6yqsi6m 650 48 /Left /Left . work_ayatblpinzaztdzhilw6yqsi6m 650 49 /CalGrayProfile /CalGrayProfile . work_ayatblpinzaztdzhilw6yqsi6m 650 50 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 650 51 Dot dot NN work_ayatblpinzaztdzhilw6yqsi6m 650 52 Gain Gain NNP work_ayatblpinzaztdzhilw6yqsi6m 650 53 20 20 CD work_ayatblpinzaztdzhilw6yqsi6m 650 54 % % NN work_ayatblpinzaztdzhilw6yqsi6m 650 55 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 650 56 /CalRGBProfile /CalRGBProfile . work_ayatblpinzaztdzhilw6yqsi6m 650 57 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 650 58 sRGB srgb NN work_ayatblpinzaztdzhilw6yqsi6m 650 59 IEC61966 IEC61966 NNP work_ayatblpinzaztdzhilw6yqsi6m 650 60 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 650 61 2.1 2.1 CD work_ayatblpinzaztdzhilw6yqsi6m 650 62 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 650 63 /CalCMYKProfile /CalCMYKProfile . work_ayatblpinzaztdzhilw6yqsi6m 650 64 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 650 65 U.S. U.S. NNP work_ayatblpinzaztdzhilw6yqsi6m 651 1 Web web NN work_ayatblpinzaztdzhilw6yqsi6m 651 2 Coated Coated NNP work_ayatblpinzaztdzhilw6yqsi6m 651 3 \050SWOP\051 \050SWOP\051 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 4 v2 v2 NN work_ayatblpinzaztdzhilw6yqsi6m 651 5 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 6 /sRGBProfile /sRGBProfile . work_ayatblpinzaztdzhilw6yqsi6m 651 7 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 8 sRGB srgb NN work_ayatblpinzaztdzhilw6yqsi6m 651 9 IEC61966 IEC61966 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 10 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 651 11 2.1 2.1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 12 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 13 /CannotEmbedFontPolicy /CannotEmbedFontPolicy . work_ayatblpinzaztdzhilw6yqsi6m 651 14 /Warning /Warning NFP work_ayatblpinzaztdzhilw6yqsi6m 651 15 /CompatibilityLevel /compatibilitylevel NN work_ayatblpinzaztdzhilw6yqsi6m 651 16 1.4 1.4 CD work_ayatblpinzaztdzhilw6yqsi6m 651 17 /CompressObjects /CompressObjects . work_ayatblpinzaztdzhilw6yqsi6m 651 18 /Off /Off . work_ayatblpinzaztdzhilw6yqsi6m 651 19 /CompressPages /CompressPages . work_ayatblpinzaztdzhilw6yqsi6m 651 20 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 21 /ConvertImagesToIndexed /ConvertImagesToIndexed . work_ayatblpinzaztdzhilw6yqsi6m 651 22 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 23 /PassThroughJPEGImages /PassThroughJPEGImages . work_ayatblpinzaztdzhilw6yqsi6m 651 24 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 25 /CreateJobTicket /createjobticket NN work_ayatblpinzaztdzhilw6yqsi6m 651 26 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 27 /DefaultRenderingIntent /DefaultRenderingIntent NFP work_ayatblpinzaztdzhilw6yqsi6m 651 28 /Default /Default . work_ayatblpinzaztdzhilw6yqsi6m 651 29 /DetectBlends /DetectBlends NFP work_ayatblpinzaztdzhilw6yqsi6m 651 30 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 31 /DetectCurves /DetectCurves . work_ayatblpinzaztdzhilw6yqsi6m 651 32 0.0000 0.0000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 33 /ColorConversionStrategy /ColorConversionStrategy . work_ayatblpinzaztdzhilw6yqsi6m 651 34 /LeaveColorUnchanged /LeaveColorUnchanged . work_ayatblpinzaztdzhilw6yqsi6m 651 35 /DoThumbnails /DoThumbnails NNP work_ayatblpinzaztdzhilw6yqsi6m 651 36 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 37 /EmbedAllFonts /embedallfont NNS work_ayatblpinzaztdzhilw6yqsi6m 651 38 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 39 /EmbedOpenType /EmbedOpenType . work_ayatblpinzaztdzhilw6yqsi6m 651 40 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 41 /ParseICCProfilesInComments /ParseICCProfilesInComments . work_ayatblpinzaztdzhilw6yqsi6m 651 42 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 43 /EmbedJobOptions /embedjoboption NNS work_ayatblpinzaztdzhilw6yqsi6m 651 44 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 45 /DSCReportingLevel /DSCReportingLevel . work_ayatblpinzaztdzhilw6yqsi6m 651 46 0 0 NFP work_ayatblpinzaztdzhilw6yqsi6m 651 47 /EmitDSCWarnings /EmitDSCWarnings . work_ayatblpinzaztdzhilw6yqsi6m 651 48 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 49 /EndPage /endpage NN work_ayatblpinzaztdzhilw6yqsi6m 651 50 -1 -1 . work_ayatblpinzaztdzhilw6yqsi6m 651 51 /ImageMemory /imagememory NN work_ayatblpinzaztdzhilw6yqsi6m 651 52 1048576 1048576 CD work_ayatblpinzaztdzhilw6yqsi6m 651 53 /LockDistillerParams /lockdistillerparams CD work_ayatblpinzaztdzhilw6yqsi6m 651 54 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 55 /MaxSubsetPct /MaxSubsetPct NNP work_ayatblpinzaztdzhilw6yqsi6m 651 56 100 100 CD work_ayatblpinzaztdzhilw6yqsi6m 651 57 /Optimize /optimize VBP work_ayatblpinzaztdzhilw6yqsi6m 651 58 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 59 /OPM /OPM . work_ayatblpinzaztdzhilw6yqsi6m 651 60 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 61 /ParseDSCComments /ParseDSCComments . work_ayatblpinzaztdzhilw6yqsi6m 651 62 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 63 /ParseDSCCommentsForDocInfo /ParseDSCCommentsForDocInfo . work_ayatblpinzaztdzhilw6yqsi6m 651 64 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 65 /PreserveCopyPage /PreserveCopyPage . work_ayatblpinzaztdzhilw6yqsi6m 651 66 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 67 /PreserveDICMYKValues /PreserveDICMYKValues . work_ayatblpinzaztdzhilw6yqsi6m 651 68 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 69 /PreserveEPSInfo /PreserveEPSInfo . work_ayatblpinzaztdzhilw6yqsi6m 651 70 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 71 /PreserveFlatness /PreserveFlatness . work_ayatblpinzaztdzhilw6yqsi6m 651 72 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 73 /PreserveHalftoneInfo /preservehalftoneinfo CD work_ayatblpinzaztdzhilw6yqsi6m 651 74 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 75 /PreserveOPIComments /PreserveOPIComments , work_ayatblpinzaztdzhilw6yqsi6m 651 76 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 77 /PreserveOverprintSettings /PreserveOverprintSettings . work_ayatblpinzaztdzhilw6yqsi6m 651 78 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 79 /StartPage /StartPage : work_ayatblpinzaztdzhilw6yqsi6m 651 80 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 81 /SubsetFonts /subsetfonts CD work_ayatblpinzaztdzhilw6yqsi6m 651 82 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 83 /TransferFunctionInfo /TransferFunctionInfo . work_ayatblpinzaztdzhilw6yqsi6m 651 84 /Apply /apply JJ work_ayatblpinzaztdzhilw6yqsi6m 651 85 /UCRandBGInfo /UCRandBGInfo . work_ayatblpinzaztdzhilw6yqsi6m 651 86 /Preserve /Preserve : work_ayatblpinzaztdzhilw6yqsi6m 651 87 /UsePrologue /UsePrologue NFP work_ayatblpinzaztdzhilw6yqsi6m 651 88 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 89 /ColorSettingsFile /ColorSettingsFile . work_ayatblpinzaztdzhilw6yqsi6m 651 90 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 91 None none NN work_ayatblpinzaztdzhilw6yqsi6m 651 92 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 93 /AlwaysEmbed /alwaysembed VB work_ayatblpinzaztdzhilw6yqsi6m 651 94 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 95 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 96 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 97 /NeverEmbed /neverembe VBN work_ayatblpinzaztdzhilw6yqsi6m 651 98 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 99 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 100 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 101 /AntiAliasColorImages /AntiAliasColorImages NFP work_ayatblpinzaztdzhilw6yqsi6m 651 102 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 103 /CropColorImages /cropcolorimage NNS work_ayatblpinzaztdzhilw6yqsi6m 651 104 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 105 /ColorImageMinResolution /colorimageminresolution NN work_ayatblpinzaztdzhilw6yqsi6m 651 106 300 300 CD work_ayatblpinzaztdzhilw6yqsi6m 651 107 /ColorImageMinResolutionPolicy /colorimageminresolutionpolicy SYM work_ayatblpinzaztdzhilw6yqsi6m 651 108 /OK /OK . work_ayatblpinzaztdzhilw6yqsi6m 651 109 /DownsampleColorImages /DownsampleColorImages NFP work_ayatblpinzaztdzhilw6yqsi6m 651 110 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 111 /ColorImageDownsampleType /ColorImageDownsampleType NNS work_ayatblpinzaztdzhilw6yqsi6m 651 112 /Average /Average . work_ayatblpinzaztdzhilw6yqsi6m 651 113 /ColorImageResolution /ColorImageResolution NFP work_ayatblpinzaztdzhilw6yqsi6m 651 114 300 300 CD work_ayatblpinzaztdzhilw6yqsi6m 651 115 /ColorImageDepth /colorimagedepth SYM work_ayatblpinzaztdzhilw6yqsi6m 651 116 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 651 117 /ColorImageMinDownsampleDepth /colorimagemindownsampledepth SYM work_ayatblpinzaztdzhilw6yqsi6m 651 118 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 119 /ColorImageDownsampleThreshold /colorimagedownsamplethreshold SYM work_ayatblpinzaztdzhilw6yqsi6m 651 120 1.50000 1.50000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 121 /EncodeColorImages /EncodeColorImages . work_ayatblpinzaztdzhilw6yqsi6m 651 122 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 123 /ColorImageFilter /ColorImageFilter . work_ayatblpinzaztdzhilw6yqsi6m 651 124 /FlateEncode /FlateEncode NFP work_ayatblpinzaztdzhilw6yqsi6m 651 125 /AutoFilterColorImages /AutoFilterColorImages NFP work_ayatblpinzaztdzhilw6yqsi6m 651 126 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 127 /ColorImageAutoFilterStrategy /ColorImageAutoFilterStrategy NNP work_ayatblpinzaztdzhilw6yqsi6m 651 128 /JPEG /JPEG . work_ayatblpinzaztdzhilw6yqsi6m 651 129 /ColorACSImageDict /ColorACSImageDict NNP work_ayatblpinzaztdzhilw6yqsi6m 651 130 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 131 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 132 /QFactor /qfactor XX work_ayatblpinzaztdzhilw6yqsi6m 651 133 0.15 0.15 CD work_ayatblpinzaztdzhilw6yqsi6m 651 134 /HSamples /HSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 135 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 136 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 137 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 138 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 139 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 140 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 141 /VSamples /VSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 142 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 143 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 144 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 145 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 146 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 147 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 148 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 149 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 150 /ColorImageDict /ColorImageDict . work_ayatblpinzaztdzhilw6yqsi6m 651 151 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 152 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 153 /QFactor /qfactor XX work_ayatblpinzaztdzhilw6yqsi6m 651 154 0.15 0.15 CD work_ayatblpinzaztdzhilw6yqsi6m 651 155 /HSamples /HSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 156 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 157 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 158 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 159 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 160 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 161 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 162 /VSamples /VSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 163 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 164 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 165 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 166 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 167 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 168 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 169 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 170 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 171 /JPEG2000ColorACSImageDict /JPEG2000ColorACSImageDict NFP work_ayatblpinzaztdzhilw6yqsi6m 651 172 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 173 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 174 /TileWidth /TileWidth NFP work_ayatblpinzaztdzhilw6yqsi6m 651 175 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 176 /TileHeight /tileheight SYM work_ayatblpinzaztdzhilw6yqsi6m 651 177 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 178 /Quality /quality SYM work_ayatblpinzaztdzhilw6yqsi6m 651 179 30 30 CD work_ayatblpinzaztdzhilw6yqsi6m 651 180 > > NN work_ayatblpinzaztdzhilw6yqsi6m 651 181 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 182 /JPEG2000ColorImageDict /JPEG2000ColorImageDict NFP work_ayatblpinzaztdzhilw6yqsi6m 651 183 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 184 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 185 /TileWidth /TileWidth NFP work_ayatblpinzaztdzhilw6yqsi6m 651 186 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 187 /TileHeight /tileheight SYM work_ayatblpinzaztdzhilw6yqsi6m 651 188 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 189 /Quality /quality SYM work_ayatblpinzaztdzhilw6yqsi6m 651 190 30 30 CD work_ayatblpinzaztdzhilw6yqsi6m 651 191 > > NN work_ayatblpinzaztdzhilw6yqsi6m 651 192 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 193 /AntiAliasGrayImages /AntiAliasGrayImages : work_ayatblpinzaztdzhilw6yqsi6m 651 194 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 195 /CropGrayImages /CropGrayImages . work_ayatblpinzaztdzhilw6yqsi6m 651 196 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 197 /GrayImageMinResolution /GrayImageMinResolution : work_ayatblpinzaztdzhilw6yqsi6m 651 198 300 300 CD work_ayatblpinzaztdzhilw6yqsi6m 651 199 /GrayImageMinResolutionPolicy /grayimageminresolutionpolicy CD work_ayatblpinzaztdzhilw6yqsi6m 651 200 /OK /OK . work_ayatblpinzaztdzhilw6yqsi6m 651 201 /DownsampleGrayImages /DownsampleGrayImages , work_ayatblpinzaztdzhilw6yqsi6m 651 202 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 203 /GrayImageDownsampleType /GrayImageDownsampleType . work_ayatblpinzaztdzhilw6yqsi6m 651 204 /Average /average NN work_ayatblpinzaztdzhilw6yqsi6m 651 205 /GrayImageResolution /GrayImageResolution NFP work_ayatblpinzaztdzhilw6yqsi6m 651 206 300 300 CD work_ayatblpinzaztdzhilw6yqsi6m 651 207 /GrayImageDepth /grayimagedepth SYM work_ayatblpinzaztdzhilw6yqsi6m 651 208 8 8 CD work_ayatblpinzaztdzhilw6yqsi6m 651 209 /GrayImageMinDownsampleDepth /grayimagemindownsampledepth SYM work_ayatblpinzaztdzhilw6yqsi6m 651 210 2 2 CD work_ayatblpinzaztdzhilw6yqsi6m 651 211 /GrayImageDownsampleThreshold /grayimagedownsamplethreshold SYM work_ayatblpinzaztdzhilw6yqsi6m 651 212 1.50000 1.50000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 213 /EncodeGrayImages /encodegrayimages CD work_ayatblpinzaztdzhilw6yqsi6m 651 214 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 215 /GrayImageFilter /GrayImageFilter NFP work_ayatblpinzaztdzhilw6yqsi6m 651 216 /FlateEncode /flateencode NN work_ayatblpinzaztdzhilw6yqsi6m 651 217 /AutoFilterGrayImages /AutoFilterGrayImages , work_ayatblpinzaztdzhilw6yqsi6m 651 218 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 219 /GrayImageAutoFilterStrategy /grayimageautofilterstrategy CD work_ayatblpinzaztdzhilw6yqsi6m 651 220 /JPEG /JPEG NFP work_ayatblpinzaztdzhilw6yqsi6m 651 221 /GrayACSImageDict /GrayACSImageDict NFP work_ayatblpinzaztdzhilw6yqsi6m 651 222 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 223 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 224 /QFactor /qfactor XX work_ayatblpinzaztdzhilw6yqsi6m 651 225 0.15 0.15 CD work_ayatblpinzaztdzhilw6yqsi6m 651 226 /HSamples /HSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 227 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 228 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 229 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 230 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 231 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 232 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 233 /VSamples /VSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 234 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 235 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 236 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 237 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 238 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 239 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 240 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 241 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 242 /GrayImageDict /GrayImageDict NFP work_ayatblpinzaztdzhilw6yqsi6m 651 243 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 244 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 245 /QFactor /qfactor XX work_ayatblpinzaztdzhilw6yqsi6m 651 246 0.15 0.15 CD work_ayatblpinzaztdzhilw6yqsi6m 651 247 /HSamples /HSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 248 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 249 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 250 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 251 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 252 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 253 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 254 /VSamples /VSamples . work_ayatblpinzaztdzhilw6yqsi6m 651 255 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 256 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 257 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 258 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 259 1 1 CD work_ayatblpinzaztdzhilw6yqsi6m 651 260 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 261 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 262 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 263 /JPEG2000GrayACSImageDict /JPEG2000GrayACSImageDict NFP work_ayatblpinzaztdzhilw6yqsi6m 651 264 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 265 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 266 /TileWidth /TileWidth NFP work_ayatblpinzaztdzhilw6yqsi6m 651 267 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 268 /TileHeight /tileheight SYM work_ayatblpinzaztdzhilw6yqsi6m 651 269 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 270 /Quality /quality SYM work_ayatblpinzaztdzhilw6yqsi6m 651 271 30 30 CD work_ayatblpinzaztdzhilw6yqsi6m 651 272 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 273 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 274 /JPEG2000GrayImageDict /JPEG2000GrayImageDict NNP work_ayatblpinzaztdzhilw6yqsi6m 651 275 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 276 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 277 /TileWidth /TileWidth NFP work_ayatblpinzaztdzhilw6yqsi6m 651 278 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 279 /TileHeight /tileheight SYM work_ayatblpinzaztdzhilw6yqsi6m 651 280 256 256 CD work_ayatblpinzaztdzhilw6yqsi6m 651 281 /Quality /quality SYM work_ayatblpinzaztdzhilw6yqsi6m 651 282 30 30 CD work_ayatblpinzaztdzhilw6yqsi6m 651 283 > > NN work_ayatblpinzaztdzhilw6yqsi6m 651 284 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 285 /AntiAliasMonoImages /AntiAliasMonoImages : work_ayatblpinzaztdzhilw6yqsi6m 651 286 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 287 /CropMonoImages /CropMonoImages . work_ayatblpinzaztdzhilw6yqsi6m 651 288 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 289 /MonoImageMinResolution /MonoImageMinResolution NFP work_ayatblpinzaztdzhilw6yqsi6m 651 290 1200 1200 CD work_ayatblpinzaztdzhilw6yqsi6m 651 291 /MonoImageMinResolutionPolicy /MonoImageMinResolutionPolicy NFP work_ayatblpinzaztdzhilw6yqsi6m 651 292 /OK /OK , work_ayatblpinzaztdzhilw6yqsi6m 651 293 /DownsampleMonoImages /DownsampleMonoImages NFP work_ayatblpinzaztdzhilw6yqsi6m 651 294 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 295 /MonoImageDownsampleType /MonoImageDownsampleType , work_ayatblpinzaztdzhilw6yqsi6m 651 296 /Average /average NN work_ayatblpinzaztdzhilw6yqsi6m 651 297 /MonoImageResolution /MonoImageResolution NFP work_ayatblpinzaztdzhilw6yqsi6m 651 298 1200 1200 CD work_ayatblpinzaztdzhilw6yqsi6m 651 299 /MonoImageDepth /monoimagedepth SYM work_ayatblpinzaztdzhilw6yqsi6m 651 300 -1 -1 . work_ayatblpinzaztdzhilw6yqsi6m 651 301 /MonoImageDownsampleThreshold /MonoImageDownsampleThreshold NFP work_ayatblpinzaztdzhilw6yqsi6m 651 302 1.50000 1.50000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 303 /EncodeMonoImages /EncodeMonoImages . work_ayatblpinzaztdzhilw6yqsi6m 651 304 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 305 /MonoImageFilter /MonoImageFilter NFP work_ayatblpinzaztdzhilw6yqsi6m 651 306 /CCITTFaxEncode /CCITTFaxEncode . work_ayatblpinzaztdzhilw6yqsi6m 651 307 /MonoImageDict /MonoImageDict NFP work_ayatblpinzaztdzhilw6yqsi6m 651 308 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 309 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 310 /K /K . work_ayatblpinzaztdzhilw6yqsi6m 651 311 -1 -1 . work_ayatblpinzaztdzhilw6yqsi6m 651 312 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 313 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 314 /AllowPSXObjects /AllowPSXObjects : work_ayatblpinzaztdzhilw6yqsi6m 651 315 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 316 /CheckCompliance /CheckCompliance NFP work_ayatblpinzaztdzhilw6yqsi6m 651 317 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 318 /None /None NFP work_ayatblpinzaztdzhilw6yqsi6m 651 319 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 320 /PDFX1aCheck /PDFX1aCheck NFP work_ayatblpinzaztdzhilw6yqsi6m 651 321 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 322 /PDFX3Check /PDFX3Check NNP work_ayatblpinzaztdzhilw6yqsi6m 651 323 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 324 /PDFXCompliantPDFOnly /PDFXCompliantPDFOnly , work_ayatblpinzaztdzhilw6yqsi6m 651 325 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 326 /PDFXNoTrimBoxError /PDFXNoTrimBoxError . work_ayatblpinzaztdzhilw6yqsi6m 651 327 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 328 /PDFXTrimBoxToMediaBoxOffset /PDFXTrimBoxToMediaBoxOffset . work_ayatblpinzaztdzhilw6yqsi6m 651 329 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 330 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 331 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 332 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 333 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 334 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 335 /PDFXSetBleedBoxToMediaBox /PDFXSetBleedBoxToMediaBox . work_ayatblpinzaztdzhilw6yqsi6m 651 336 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 651 337 /PDFXBleedBoxToTrimBoxOffset /PDFXBleedBoxToTrimBoxOffset . work_ayatblpinzaztdzhilw6yqsi6m 651 338 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 339 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 340 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 341 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 342 0.00000 0.00000 CD work_ayatblpinzaztdzhilw6yqsi6m 651 343 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 344 /PDFXOutputIntentProfile /PDFXOutputIntentProfile . work_ayatblpinzaztdzhilw6yqsi6m 651 345 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 346 None none NN work_ayatblpinzaztdzhilw6yqsi6m 651 347 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 348 /PDFXOutputConditionIdentifier /PDFXOutputConditionIdentifier NFP work_ayatblpinzaztdzhilw6yqsi6m 651 349 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 350 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 351 /PDFXOutputCondition /PDFXOutputCondition . work_ayatblpinzaztdzhilw6yqsi6m 651 352 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 353 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 354 /PDFXRegistryName /PDFXRegistryName NFP work_ayatblpinzaztdzhilw6yqsi6m 651 355 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 356 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 651 357 /PDFXTrapped /PDFXTrapped NFP work_ayatblpinzaztdzhilw6yqsi6m 651 358 /False /False : work_ayatblpinzaztdzhilw6yqsi6m 651 359 /CreateJDFFile /CreateJDFFile , work_ayatblpinzaztdzhilw6yqsi6m 651 360 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 651 361 /Description /description NN work_ayatblpinzaztdzhilw6yqsi6m 651 362 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 363 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 364 /CHS /CHS . work_ayatblpinzaztdzhilw6yqsi6m 651 365 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 366 FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000500044004600206587686353ef901a8fc7684c976262535370673a548c002000700072006f006f00660065007200208fdb884c9ad88d2891cf62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002 FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000500044004600206587686353ef901a8fc7684c976262535370673a548c002000700072006f006f00660065007200208fdb884c9ad88d2891cf62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 367 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 368 /CHT /CHT . work_ayatblpinzaztdzhilw6yqsi6m 651 369 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 370 FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef653ef5728684c9762537088686a5f548c002000700072006f006f00660065007200204e0a73725f979ad854c18cea7684521753706548679c300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002 FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef653ef5728684c9762537088686a5f548c002000700072006f006f00660065007200204e0a73725f979ad854c18cea7684521753706548679c300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 371 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 372 /DAN /DAN . work_ayatblpinzaztdzhilw6yqsi6m 651 373 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 374 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 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 375 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 376 /DEU /DEU . work_ayatblpinzaztdzhilw6yqsi6m 651 377 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 378 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 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 379 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 380 /ESP /ESP . work_ayatblpinzaztdzhilw6yqsi6m 651 381 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 382 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 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 383 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 384 /FRA /FRA . work_ayatblpinzaztdzhilw6yqsi6m 651 385 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 386 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 FEFF005500740069006c006900730065007a00200063006500730020006f007000740069006f006e00730020006100660069006e00200064006500200063007200e900650072002000640065007300200064006f00630075006d0065006e00740073002000410064006f00620065002000500044004600200070006f007500720020006400650073002000e90070007200650075007600650073002000650074002000640065007300200069006d007000720065007300730069006f006e00730020006400650020006800610075007400650020007100750061006c0069007400e90020007300750072002000640065007300200069006d007000720069006d0061006e0074006500730020006400650020006200750072006500610075002e0020004c0065007300200064006f00630075006d0065006e00740073002000500044004600200063007200e900e90073002000700065007500760065006e0074002000ea0074007200650020006f007500760065007200740073002000640061006e00730020004100630072006f006200610074002c002000610069006e00730069002000710075002700410064006f00620065002000520065006100640065007200200035002e0030002000650074002000760065007200730069006f006e007300200075006c007400e90072006900650075007200650073002e NNP work_ayatblpinzaztdzhilw6yqsi6m 651 387 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 388 /ITA /ITA . work_ayatblpinzaztdzhilw6yqsi6m 651 389 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 390 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 feff005500740069006c0069007a007a006100720065002000710075006500730074006500200069006d0070006f007300740061007a0069006f006e00690020007000650072002000630072006500610072006500200064006f00630075006d0065006e00740069002000410064006f006200650020005000440046002000700065007200200075006e00610020007300740061006d007000610020006400690020007100750061006c0069007400e00020007300750020007300740061006d00700061006e0074006900200065002000700072006f006f0066006500720020006400650073006b0074006f0070002e0020004900200064006f00630075006d0065006e007400690020005000440046002000630072006500610074006900200070006f00730073006f006e006f0020006500730073006500720065002000610070006500720074006900200063006f006e0020004100630072006f00620061007400200065002000410064006f00620065002000520065006100640065007200200035002e003000200065002000760065007200730069006f006e006900200073007500630063006500730073006900760065002e IN work_ayatblpinzaztdzhilw6yqsi6m 651 391 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 392 /JPN /JPN . work_ayatblpinzaztdzhilw6yqsi6m 651 393 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 394 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 NNP work_ayatblpinzaztdzhilw6yqsi6m 651 395 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 396 /KOR /KOR . work_ayatblpinzaztdzhilw6yqsi6m 651 397 < < XX work_ayatblpinzaztdzhilw6yqsi6m 651 398 FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020b370c2a4d06cd0d10020d504b9b0d1300020bc0f0020ad50c815ae30c5d0c11c0020ace0d488c9c8b85c0020c778c1c4d560002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020b370c2a4d06cd0d10020d504b9b0d1300020bc0f0020ad50c815ae30c5d0c11c0020ace0d488c9c8b85c0020c778c1c4d560002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e NNP work_ayatblpinzaztdzhilw6yqsi6m 651 399 > > XX work_ayatblpinzaztdzhilw6yqsi6m 651 400 /NLD /NLD . work_ayatblpinzaztdzhilw6yqsi6m 651 401 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 651 402 Gebruik Gebruik NNP work_ayatblpinzaztdzhilw6yqsi6m 651 403 deze deze JJ work_ayatblpinzaztdzhilw6yqsi6m 651 404 instellingen instellingen NN work_ayatblpinzaztdzhilw6yqsi6m 651 405 om om NNP work_ayatblpinzaztdzhilw6yqsi6m 651 406 Adobe Adobe NNP work_ayatblpinzaztdzhilw6yqsi6m 651 407 PDF PDF NNP work_ayatblpinzaztdzhilw6yqsi6m 651 408 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 651 409 documenten documenten VBN work_ayatblpinzaztdzhilw6yqsi6m 651 410 te te NNP work_ayatblpinzaztdzhilw6yqsi6m 651 411 maken maken NNP work_ayatblpinzaztdzhilw6yqsi6m 651 412 voor voor NNP work_ayatblpinzaztdzhilw6yqsi6m 651 413 kwaliteitsafdrukken kwaliteitsafdrukken NNP work_ayatblpinzaztdzhilw6yqsi6m 651 414 op op NN work_ayatblpinzaztdzhilw6yqsi6m 651 415 desktopprinters desktopprinter NNS work_ayatblpinzaztdzhilw6yqsi6m 651 416 en en IN work_ayatblpinzaztdzhilw6yqsi6m 651 417 proofers proofer NNS work_ayatblpinzaztdzhilw6yqsi6m 651 418 . . . work_ayatblpinzaztdzhilw6yqsi6m 652 1 De De NNP work_ayatblpinzaztdzhilw6yqsi6m 652 2 gemaakte gemaakte NNP work_ayatblpinzaztdzhilw6yqsi6m 652 3 PDF PDF NNP work_ayatblpinzaztdzhilw6yqsi6m 652 4 - - HYPH work_ayatblpinzaztdzhilw6yqsi6m 652 5 documenten documenten VBN work_ayatblpinzaztdzhilw6yqsi6m 652 6 kunnen kunnen NNP work_ayatblpinzaztdzhilw6yqsi6m 652 7 worden worden JJ work_ayatblpinzaztdzhilw6yqsi6m 652 8 geopend geopend NN work_ayatblpinzaztdzhilw6yqsi6m 652 9 met meet VBD work_ayatblpinzaztdzhilw6yqsi6m 652 10 Acrobat Acrobat NNP work_ayatblpinzaztdzhilw6yqsi6m 652 11 en en IN work_ayatblpinzaztdzhilw6yqsi6m 652 12 Adobe Adobe NNP work_ayatblpinzaztdzhilw6yqsi6m 652 13 Reader Reader NNP work_ayatblpinzaztdzhilw6yqsi6m 652 14 5.0 5.0 CD work_ayatblpinzaztdzhilw6yqsi6m 652 15 en en NN work_ayatblpinzaztdzhilw6yqsi6m 652 16 hoger hoger NN work_ayatblpinzaztdzhilw6yqsi6m 652 17 . . . work_ayatblpinzaztdzhilw6yqsi6m 652 18 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 653 1 /NOR /NOR NFP work_ayatblpinzaztdzhilw6yqsi6m 653 2 < < XX work_ayatblpinzaztdzhilw6yqsi6m 653 3 FEFF004200720075006b00200064006900730073006500200069006e006e007300740069006c006c0069006e00670065006e0065002000740069006c002000e50020006f0070007000720065007400740065002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e00740065007200200066006f00720020007500740073006b00720069006600740020006100760020006800f800790020006b00760061006c00690074006500740020007000e500200062006f007200640073006b0072006900760065007200200065006c006c00650072002000700072006f006f006600650072002e0020005000440046002d0064006f006b0075006d0065006e00740065006e00650020006b0061006e002000e50070006e00650073002000690020004100630072006f00620061007400200065006c006c00650072002000410064006f00620065002000520065006100640065007200200035002e003000200065006c006c00650072002000730065006e006500720065002e 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 JJ work_ayatblpinzaztdzhilw6yqsi6m 653 4 > > NN work_ayatblpinzaztdzhilw6yqsi6m 653 5 /PTB /PTB . work_ayatblpinzaztdzhilw6yqsi6m 653 6 < < XX work_ayatblpinzaztdzhilw6yqsi6m 653 7 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 NNP work_ayatblpinzaztdzhilw6yqsi6m 653 8 > > XX work_ayatblpinzaztdzhilw6yqsi6m 653 9 /SUO /suo FW work_ayatblpinzaztdzhilw6yqsi6m 653 10 < < XX work_ayatblpinzaztdzhilw6yqsi6m 653 11 FEFF004b00e40079007400e40020006e00e40069007400e4002000610073006500740075006b007300690061002c0020006b0075006e0020006c0075006f0074002000410064006f0062006500200050004400460020002d0064006f006b0075006d0065006e007400740065006a00610020006c0061006100640075006b006100730074006100200074007900f6007000f60079007400e400740075006c006f0073007400750073007400610020006a00610020007600650064006f007300740075007300740061002000760061007200740065006e002e00200020004c0075006f0064007500740020005000440046002d0064006f006b0075006d0065006e00740069007400200076006f0069006400610061006e0020006100760061007400610020004100630072006f0062006100740069006c006c00610020006a0061002000410064006f00620065002000520065006100640065007200200035002e0030003a006c006c00610020006a006100200075007500640065006d006d0069006c006c0061002e FEFF004b00e40079007400e40020006e00e40069007400e4002000610073006500740075006b007300690061002c0020006b0075006e0020006c0075006f0074002000410064006f0062006500200050004400460020002d0064006f006b0075006d0065006e007400740065006a00610020006c0061006100640075006b006100730074006100200074007900f6007000f60079007400e400740075006c006f0073007400750073007400610020006a00610020007600650064006f007300740075007300740061002000760061007200740065006e002e00200020004c0075006f0064007500740020005000440046002d0064006f006b0075006d0065006e00740069007400200076006f0069006400610061006e0020006100760061007400610020004100630072006f0062006100740069006c006c00610020006a0061002000410064006f00620065002000520065006100640065007200200035002e0030003a006c006c00610020006a006100200075007500640065006d006d0069006c006c0061002e NNP work_ayatblpinzaztdzhilw6yqsi6m 653 12 > > XX work_ayatblpinzaztdzhilw6yqsi6m 653 13 /SVE /SVE . work_ayatblpinzaztdzhilw6yqsi6m 653 14 < < XX work_ayatblpinzaztdzhilw6yqsi6m 653 15 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 NNP work_ayatblpinzaztdzhilw6yqsi6m 653 16 > > XX work_ayatblpinzaztdzhilw6yqsi6m 653 17 /ENU /ENU . work_ayatblpinzaztdzhilw6yqsi6m 653 18 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 653 19 Use use VB work_ayatblpinzaztdzhilw6yqsi6m 653 20 these these DT work_ayatblpinzaztdzhilw6yqsi6m 653 21 settings setting NNS work_ayatblpinzaztdzhilw6yqsi6m 653 22 to to TO work_ayatblpinzaztdzhilw6yqsi6m 653 23 create create VB work_ayatblpinzaztdzhilw6yqsi6m 653 24 Adobe Adobe NNP work_ayatblpinzaztdzhilw6yqsi6m 653 25 PDF PDF NNP work_ayatblpinzaztdzhilw6yqsi6m 653 26 documents document NNS work_ayatblpinzaztdzhilw6yqsi6m 653 27 for for IN work_ayatblpinzaztdzhilw6yqsi6m 653 28 quality quality NN work_ayatblpinzaztdzhilw6yqsi6m 653 29 printing print VBG work_ayatblpinzaztdzhilw6yqsi6m 653 30 on on IN work_ayatblpinzaztdzhilw6yqsi6m 653 31 desktop desktop NN work_ayatblpinzaztdzhilw6yqsi6m 653 32 printers printer NNS work_ayatblpinzaztdzhilw6yqsi6m 653 33 and and CC work_ayatblpinzaztdzhilw6yqsi6m 653 34 proofers proofer NNS work_ayatblpinzaztdzhilw6yqsi6m 653 35 . . . work_ayatblpinzaztdzhilw6yqsi6m 654 1 Created create VBN work_ayatblpinzaztdzhilw6yqsi6m 654 2 PDF PDF NNP work_ayatblpinzaztdzhilw6yqsi6m 654 3 documents document NNS work_ayatblpinzaztdzhilw6yqsi6m 654 4 can can MD work_ayatblpinzaztdzhilw6yqsi6m 654 5 be be VB work_ayatblpinzaztdzhilw6yqsi6m 654 6 opened open VBN work_ayatblpinzaztdzhilw6yqsi6m 654 7 with with IN work_ayatblpinzaztdzhilw6yqsi6m 654 8 Acrobat Acrobat NNP work_ayatblpinzaztdzhilw6yqsi6m 654 9 and and CC work_ayatblpinzaztdzhilw6yqsi6m 654 10 Adobe Adobe NNP work_ayatblpinzaztdzhilw6yqsi6m 654 11 Reader Reader NNP work_ayatblpinzaztdzhilw6yqsi6m 654 12 5.0 5.0 CD work_ayatblpinzaztdzhilw6yqsi6m 654 13 and and CC work_ayatblpinzaztdzhilw6yqsi6m 654 14 later later RB work_ayatblpinzaztdzhilw6yqsi6m 654 15 . . . work_ayatblpinzaztdzhilw6yqsi6m 654 16 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 1 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 2 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 3 /Namespace /namespace XX work_ayatblpinzaztdzhilw6yqsi6m 655 4 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 5 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 6 Adobe Adobe NNP work_ayatblpinzaztdzhilw6yqsi6m 655 7 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 8 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 9 Common Common NNP work_ayatblpinzaztdzhilw6yqsi6m 655 10 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 11 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 12 1.0 1.0 CD work_ayatblpinzaztdzhilw6yqsi6m 655 13 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 14 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 15 /OtherNamespaces /OtherNamespaces NFP work_ayatblpinzaztdzhilw6yqsi6m 655 16 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 17 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 18 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 19 /AsReaderSpreads /AsReaderSpreads , work_ayatblpinzaztdzhilw6yqsi6m 655 20 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 21 /CropImagesToFrames /CropImagesToFrames NNP work_ayatblpinzaztdzhilw6yqsi6m 655 22 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 655 23 /ErrorControl /ErrorControl . work_ayatblpinzaztdzhilw6yqsi6m 655 24 /WarnAndContinue /WarnAndContinue . work_ayatblpinzaztdzhilw6yqsi6m 655 25 /FlattenerIgnoreSpreadOverrides /FlattenerIgnoreSpreadOverrides NFP work_ayatblpinzaztdzhilw6yqsi6m 655 26 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 27 /IncludeGuidesGrids /IncludeGuidesGrids , work_ayatblpinzaztdzhilw6yqsi6m 655 28 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 29 /IncludeNonPrinting /includenonprinte VBG work_ayatblpinzaztdzhilw6yqsi6m 655 30 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 31 /IncludeSlug /IncludeSlug , work_ayatblpinzaztdzhilw6yqsi6m 655 32 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 33 /Namespace /namespace NN work_ayatblpinzaztdzhilw6yqsi6m 655 34 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 35 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 36 Adobe Adobe NNP work_ayatblpinzaztdzhilw6yqsi6m 655 37 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 38 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 39 InDesign InDesign NNP work_ayatblpinzaztdzhilw6yqsi6m 655 40 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 41 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 42 4.0 4.0 CD work_ayatblpinzaztdzhilw6yqsi6m 655 43 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 44 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 45 /OmitPlacedBitmaps /OmitPlacedBitmaps NFP work_ayatblpinzaztdzhilw6yqsi6m 655 46 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 47 /OmitPlacedEPS /OmitPlacedEPS NFP work_ayatblpinzaztdzhilw6yqsi6m 655 48 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 49 /OmitPlacedPDF /OmitPlacedPDF NFP work_ayatblpinzaztdzhilw6yqsi6m 655 50 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 51 /SimulateOverprint /SimulateOverprint NFP work_ayatblpinzaztdzhilw6yqsi6m 655 52 /Legacy /Legacy . work_ayatblpinzaztdzhilw6yqsi6m 655 53 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 54 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 55 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 56 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 57 /AddBleedMarks /AddBleedMarks , work_ayatblpinzaztdzhilw6yqsi6m 655 58 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 59 /AddColorBars /AddColorBars : work_ayatblpinzaztdzhilw6yqsi6m 655 60 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 61 /AddCropMarks /AddCropMarks , work_ayatblpinzaztdzhilw6yqsi6m 655 62 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 63 /AddPageInfo /AddPageInfo , work_ayatblpinzaztdzhilw6yqsi6m 655 64 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 65 /AddRegMarks /AddRegMarks , work_ayatblpinzaztdzhilw6yqsi6m 655 66 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 67 /ConvertColors /convertcolors NN work_ayatblpinzaztdzhilw6yqsi6m 655 68 /NoConversion /NoConversion , work_ayatblpinzaztdzhilw6yqsi6m 655 69 /DestinationProfileName /DestinationProfileName . work_ayatblpinzaztdzhilw6yqsi6m 655 70 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 71 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 72 /DestinationProfileSelector /DestinationProfileSelector NFP work_ayatblpinzaztdzhilw6yqsi6m 655 73 /NA /NA . work_ayatblpinzaztdzhilw6yqsi6m 655 74 /Downsample16BitImages /Downsample16BitImages , work_ayatblpinzaztdzhilw6yqsi6m 655 75 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 655 76 /FlattenerPreset /FlattenerPreset . work_ayatblpinzaztdzhilw6yqsi6m 655 77 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 78 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 79 /PresetSelector /presetselector NN work_ayatblpinzaztdzhilw6yqsi6m 655 80 /MediumResolution /MediumResolution . work_ayatblpinzaztdzhilw6yqsi6m 655 81 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 82 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 83 /FormElements /formelement NNS work_ayatblpinzaztdzhilw6yqsi6m 655 84 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 85 /GenerateStructure /generatestructure NN work_ayatblpinzaztdzhilw6yqsi6m 655 86 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 655 87 /IncludeBookmarks /IncludeBookmarks . work_ayatblpinzaztdzhilw6yqsi6m 655 88 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 89 /IncludeHyperlinks /includehyperlinks NN work_ayatblpinzaztdzhilw6yqsi6m 655 90 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 91 /IncludeInteractive /includeinteractive JJ work_ayatblpinzaztdzhilw6yqsi6m 655 92 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 93 /IncludeLayers /IncludeLayers , work_ayatblpinzaztdzhilw6yqsi6m 655 94 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 95 /IncludeProfiles /IncludeProfiles . work_ayatblpinzaztdzhilw6yqsi6m 655 96 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 655 97 /MultimediaHandling /multimediahandling NN work_ayatblpinzaztdzhilw6yqsi6m 655 98 /UseObjectSettings /UseObjectSettings . work_ayatblpinzaztdzhilw6yqsi6m 655 99 /Namespace /Namespace . work_ayatblpinzaztdzhilw6yqsi6m 655 100 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 101 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 102 Adobe Adobe NNP work_ayatblpinzaztdzhilw6yqsi6m 655 103 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 104 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 105 CreativeSuite CreativeSuite NNP work_ayatblpinzaztdzhilw6yqsi6m 655 106 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 107 ( ( -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 108 2.0 2.0 CD work_ayatblpinzaztdzhilw6yqsi6m 655 109 ) ) -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 110 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 111 /PDFXOutputIntentProfileSelector /pdfxoutputintentprofileselector NN work_ayatblpinzaztdzhilw6yqsi6m 655 112 /NA /NA . work_ayatblpinzaztdzhilw6yqsi6m 655 113 /PreserveEditing /preserveedite VBG work_ayatblpinzaztdzhilw6yqsi6m 655 114 true true JJ work_ayatblpinzaztdzhilw6yqsi6m 655 115 /UntaggedCMYKHandling /untaggedcmykhandling JJ work_ayatblpinzaztdzhilw6yqsi6m 655 116 /LeaveUntagged /leaveuntagged PRP$ work_ayatblpinzaztdzhilw6yqsi6m 655 117 /UntaggedRGBHandling /untaggedrgbhandle VBG work_ayatblpinzaztdzhilw6yqsi6m 655 118 /LeaveUntagged /leaveuntagged UH work_ayatblpinzaztdzhilw6yqsi6m 655 119 /UseDocumentBleed /UseDocumentBleed , work_ayatblpinzaztdzhilw6yqsi6m 655 120 false false JJ work_ayatblpinzaztdzhilw6yqsi6m 655 121 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 122 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 123 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 124 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 125 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 126 setdistillerparams setdistillerparam NNS work_ayatblpinzaztdzhilw6yqsi6m 655 127 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 128 < < XX work_ayatblpinzaztdzhilw6yqsi6m 655 129 /HWResolution /HWResolution NNP work_ayatblpinzaztdzhilw6yqsi6m 655 130 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 131 2400 2400 CD work_ayatblpinzaztdzhilw6yqsi6m 655 132 2400 2400 CD work_ayatblpinzaztdzhilw6yqsi6m 655 133 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 134 /PageSize /PageSize . work_ayatblpinzaztdzhilw6yqsi6m 655 135 [ [ -LRB- work_ayatblpinzaztdzhilw6yqsi6m 655 136 612.000 612.000 CD work_ayatblpinzaztdzhilw6yqsi6m 655 137 792.000 792.000 CD work_ayatblpinzaztdzhilw6yqsi6m 655 138 ] ] -RRB- work_ayatblpinzaztdzhilw6yqsi6m 655 139 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 140 > > XX work_ayatblpinzaztdzhilw6yqsi6m 655 141 setpagedevice setpagedevice NN