{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:31:04Z","timestamp":1775248264838,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030522421","type":"print"},{"value":"9783030522438","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52243-8_28","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T11:03:49Z","timestamp":1593774229000},"page":"391-403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["LightGBM Algorithm for Malware Detection"],"prefix":"10.1007","author":[{"given":"Mouhammd","family":"Al-kasassbeh","sequence":"first","affiliation":[]},{"given":"Mohammad A.","family":"Abbadi","sequence":"additional","affiliation":[]},{"given":"Ahmed M.","family":"Al-Bustanji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Al-Kasassbeh, M., Mohammed, S., Alauthman, M., Almomani, A.: Feature selection using a machine learning to classify a malware. In: Handbook of Computer Networks and Cyber Security, pp. 889\u2013904. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-22277-2_36"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Al-kasassbeh, M., Almseidin, M., Alrfou, K., Kovacs, S.: Detection of IoT-botnet attacks using fuzzy rule interpolation. J. Intell. Fuzzy Syst. 38(1) (2020)","DOI":"10.3233\/JIFS-191432"},{"key":"28_CR3","unstructured":"Su, J., Vargas, D.V., Prasad, S., Sgandurra, D., Feng, Y., Sakurai, K.: Lightweight classification of IoT malware based on image recognition. In: Proceedings - International Computer Software and Applications Conference, vol. 2, pp. 664\u2013669, 11 February 2018"},{"issue":"3","key":"28_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., Elovici, Y.: N-BaIoT-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"issue":"15","key":"28_CR5","doi-asserted-by":"publisher","first-page":"102479","DOI":"10.1016\/j.jnca.2019.102479","volume":"150","author":"M Alauthman","year":"2020","unstructured":"Alauthman, M., Aslam, N., Al-kasassbeh, M., Khan, S., Choo, K.-K.R.: An efficient reinforcement learning-based Botnet detection approach. J. Netw. Comput. Appl. 150(15), 102479 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"28_CR6","first-page":"9","volume":"5","author":"E Gandotra","year":"2014","unstructured":"Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5(2), 9 (2014)","journal-title":"J. Inf. Secur."},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Chawathe, S.S.: Monitoring IoT networks for botnet activity. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (2018)","DOI":"10.1109\/NCA.2018.8548330"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Marzano, A., Alexander, D., Fonseca, O., Fazzion, E., Hoepers, C., Steding-Jessen, K., Chaves, M.H., Cunha, \u00cd., Guedes, D., Meira, W.: The evolution of Bashlite and Mirai IoT botnets. In: 2018 IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil (2018)","DOI":"10.1109\/ISCC.2018.8538636"},{"key":"28_CR9","unstructured":"Angrishi, K.: Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets, vol. 1, 13 February 2017"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Alejandre, F.V., Cort\u00e9s, N.C., Anaya, E.A.: Feature selection to detect botnets using machine learning algorithms. In: International Conference on Electronics, Communications and Computers, Cholula, Mexico (2017)","DOI":"10.1109\/CONIELECOMP.2017.7891834"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1155\/2018\/7178164","volume":"2018","author":"M De Donno","year":"2018","unstructured":"De Donno, M., Dragoni, N., Giaretta, A., Spognardi, A.: DDoS-capable IoT malwares: comparative analysis and Mirai investigation. Security and Communication Networks 2018, 30 (2018)","journal-title":"Security and Communication Networks"},{"key":"28_CR12","unstructured":"Costin, A., Zaddach, J.: IoT malware: comprehensive survey, analysis framework and case studies. In: Black Hat Conference, Las Vegas (2018)"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Leonard, J., Xu, S., Sandhu, R.: A framework for understanding botnets. In: International Conference on Availability, Reliability and Security, Fukuoka, Japan (2009)","DOI":"10.1109\/ARES.2009.65"},{"key":"28_CR14","unstructured":"Fonseca, E., Bogdanov, D., Gong, R., Gomez, E., Slizovskaia, O., Serra, X.: Acoustic scene classification by ensembling gradient boosting machine and convolutional neural networks. In: Workshop on Detection and Classification of Acoustic Scenes and Events, Munich, Germany (2017)"},{"issue":"2","key":"28_CR15","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2), 646\u2013656 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Meng, X., Shan, Z., Liu, F., Zhao, B., Han, J., Wang, H., Wang, J.: MCSMGS: malware classification model based on deep learning. In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China (2018)","DOI":"10.1109\/CyberC.2017.21"},{"key":"28_CR17","unstructured":"VX Heaven: vxheaven.org (2016). \nhttp:\/\/83.133.184.251\/virensimulation.org\/"},{"key":"28_CR18","unstructured":"Read the Docs, Inc. & contributors: LightGBM\u2019s documentation! Read the Docs, Inc. & contributors, 7 February 2019. \nhttps:\/\/media.readthedocs.org\/pdf\/lightgbm\/latest\/lightgbm.pdf"},{"key":"28_CR19","unstructured":"Khandelwal, P.: Which algorithm takes the crown: light GBM vs XGBOOST? Analytics Vidhya, 12 June 2017. \nhttps:\/\/www.analyticsvidhya.com\/blog\/2017\/06\/which-algorithm-takes-the-crown-light-gbm-vs-xgboost\/\n\n. Accessed 2018"},{"key":"28_CR20","unstructured":"Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye, Q., Liu, T.-Y.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"28_CR21","unstructured":"xgboost: Introduction to Boosted Trees. xgboost.readthedocs.io. \nhttps:\/\/xgboost.readthedocs.io\/en\/latest\/tutorials\/model.html"},{"key":"28_CR22","unstructured":"Scikit-learn: Machine Learning in Python, INRIA and others. \nhttps:\/\/scikit-learn.org\/stable\/modules\/cross_validation.html#cross-validation"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52243-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T10:11:15Z","timestamp":1598523075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52243-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030522421","9783030522438"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52243-8_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}