{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:52:35Z","timestamp":1764784355975},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_36","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"889-904","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Feature Selection Using a Machine Learning to Classify a Malware"],"prefix":"10.1007","author":[{"given":"Mouhammd","family":"Al-Kasassbeh","sequence":"first","affiliation":[]},{"given":"Safaa","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Alauthman","sequence":"additional","affiliation":[]},{"given":"Ammar","family":"Almomani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Khammas, B. M., Monemi, A., Bassi, J. S., Ismail, I., Nor, S. M., & Marsono, M. N. (2015). Feature selection and machine learning classification for malware detection. Jurnal Teknologi, 77. \nhttps:\/\/doi.org\/10.11113\/jt.v77.3558\n\n.","DOI":"10.11113\/jt.v77.3558"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Gavrilu\u0163, D., Cimpoe\u015fu, M., Anton, D., & Ciortuz, L. (2009). Malware detection using machine learning. In International Multiconference on Computer Science and Information Technology, 2009. IMCSIT\u201909 (pp. 735\u2013741). IEEE.","DOI":"10.1109\/IMCSIT.2009.5352759"},{"key":"36_CR3","unstructured":"Chumachenko, K. (2017). Machine learning methods for malware detection and classification. XAMK University of Applied Science."},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1631\/FITEE.1601325","volume":"18","author":"L Liu","year":"2017","unstructured":"Liu, L., Wang, B.-S., Yu, B., & Zhong, Q.-X. (2017). Automatic malware classification and new malware detection using machine learning. Frontiers of Information Technology & Electronic Engineering, 18, 1336\u20131347.","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"36_CR5","unstructured":"Raman, K. (2012). Selecting features to classify malware. In InfoSec Southwest 2012."},{"key":"36_CR6","unstructured":"Vinod, P., Laxmi, V., & Gaur, M. S. (2012). Reform: Relevant features for malware analysis. In 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2012 (pp. 738\u2013744). IEEE."},{"key":"36_CR7","volume-title":"Naive Bayes classification with domain knowledge for new malware variants and stateless packet level detection","author":"I Ismail","year":"2013","unstructured":"Ismail, I., & Elektrik, F. K. (2013). Naive Bayes classification with domain knowledge for new malware variants and stateless packet level detection. Skudai, Malaysia: Universiti Teknologi Malaysia."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Elovici, Y. (2008). Unknown malcode detection via text categorization and the imbalance problem. In IEEE International Conference on Intelligence and Security Informatics, 2008. ISI 2008 (pp. 156\u2013161). IEEE.","DOI":"10.1109\/ISI.2008.4565046"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11416-009-0122-8","volume":"5","author":"R Moskovitch","year":"2009","unstructured":"Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Japkowicz, N., & Elovici, Y. (2009). Unknown malcode detection and the imbalance problem. Journal in Computer Virology, 5, 295.","journal-title":"Journal in Computer Virology"},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11416-006-0027-8","volume":"2","author":"DKS Reddy","year":"2006","unstructured":"Reddy, D. K. S., & Pujari, A. K. (2006). N-gram analysis for computer virus detection. Journal in Computer Virology, 2, 231\u2013239.","journal-title":"Journal in Computer Virology"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Liangboonprakong, C., & Sornil, O. (2013). Classification of malware families based on n-grams sequential pattern features. In 8th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2013 (pp. 777\u2013782). IEEE.","DOI":"10.1109\/ICIEA.2013.6566472"},{"key":"36_CR12","first-page":"965","volume":"31","author":"C-T Lin","year":"2015","unstructured":"Lin, C.-T., Wang, N.-J., Xiao, H., & Eckert, C. (2015). Feature selection and extraction for malware classification. Journal of Information Science and Engineering, 31, 965\u2013992.","journal-title":"Journal of Information Science and Engineering"},{"key":"36_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.5121\/ijnsa.2012.4106","volume":"4","author":"P Singhal","year":"2012","unstructured":"Singhal, P., & Raul, N. (2012). Malware detection module using machine learning algorithms to assist in centralized security in enterprise networks. International Journal of Network Security & Its Applications, 4, 61.","journal-title":"International Journal of Network Security & Its Applications"},{"key":"36_CR14","unstructured":"Baldangombo, U., Jambaljav, N., Horng, S.-J. (2013). A static malware detection system using data mining methods. arXiv preprint arXiv:13082831."},{"key":"36_CR15","unstructured":"Alazab, M., Venkatraman, S., Watters, P., & Alazab, M. (2011). Zero-day malware detection based on supervised learning algorithms of API call signatures. In Proceedings of the Ninth Australasian Data Mining Conference (Vol. 121, pp. 171\u2013182). Australian Computer Society, Inc.."},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Siddiqui, M., Wang, M. C., & Lee, J. (2008). Detecting Trojans using data mining techniques. In International Multi Topic Conference (pp. 400\u2013411). Springer.","DOI":"10.1007\/978-3-540-89853-5_43"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Schultz, M. G., Eskin, E., Zadok, F., & Stolfo, S. J. (2001). Data mining methods for detection of new malicious executables. In 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings (pp. 38\u201349). IEEE.","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"36_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-04342-0_7","volume-title":"Recent advances in intrusion detection","author":"MZ Shafiq","year":"2009","unstructured":"Shafiq, M. Z., Tabish, S. M., Mirza, F., & Farooq, M. (2009). PE-Miner: Mining structural information to detect malicious executables in realtime. In Recent advances in intrusion detection (pp. 121\u2013141). Berlin: Springer."},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Yan, G., Brown, N., & Kong, D. (2013). Exploring discriminatory features for automated malware classification. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 41\u201361). Springer.","DOI":"10.1007\/978-3-642-39235-1_3"},{"key":"36_CR20","first-page":"95","volume":"22","author":"M Alkasassbeh","year":"2017","unstructured":"Alkasassbeh, M. (2017). An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods. Journal of Theoretical and Applied Information Technology, 22, 95.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"36_CR21","doi-asserted-by":"publisher","first-page":"000277","DOI":"10.1109\/SISY.2017.8080566","volume-title":"2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 14-16 September 2017","author":"M Almseidin","year":"2017","unstructured":"Almseidin, M., Alzubi, M., Kovacs, S., & Alkasassbeh, M. (2017). Evaluation of machine learning algorithms for intrusion detection system. In 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 14-16 September 2017 (pp. 000277\u2013000282). \nhttps:\/\/doi.org\/10.1109\/SISY.2017.8080566\n\n."},{"key":"36_CR22","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s00521-016-2564-5","volume":"29","author":"M Alauthaman","year":"2018","unstructured":"Alauthaman, M., Aslam, N., Zhang, L., Alasem, R., & Hossain, M. (2018). A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Computing and Applications, 29, 991\u20131004.","journal-title":"Neural Computing and Applications"},{"key":"36_CR23","first-page":"2031","volume":"7","author":"A Altaher","year":"2012","unstructured":"Altaher, A., ALmomani, A., Anbar, M., & Ramadass, S. (2012). Malware detection based on evolving clustering method for classification. Scientific Research and Essays, 7, 2031\u20132036.","journal-title":"Scientific Research and Essays"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:07:45Z","timestamp":1577776065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_36","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}