{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:02:46Z","timestamp":1773655366671,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030653835","type":"print"},{"value":"9783030653842","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65384-2_5","type":"book-chapter","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T11:16:10Z","timestamp":1607512570000},"page":"61-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Malware Detection Using Machine Learning"],"prefix":"10.1007","author":[{"given":"Ajay","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Kumar","family":"Abhishek","sequence":"additional","affiliation":[]},{"given":"Kunjal","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Divy","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Yash","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Harsh","family":"Chheda","sequence":"additional","affiliation":[]},{"given":"Pranav","family":"Nerurkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,10]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Abdessadki, I., Lazaar, S.: New classification based model for malicious PE files detection. Int. J. Comput. Netw. Inform. Secur. 11(6) (2019)","DOI":"10.5815\/ijcnis.2019.06.01"},{"key":"5_CR2","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-319-19578-0_34","volume-title":"Computer Science and Its Applications","author":"M Belaoued","year":"2015","unstructured":"Belaoued, M., Mazouzi, S.: A real-time PE-malware detection system based on CHI-square test and PE-file features. In: Amine, A., Bellatreche, L., Elberrichi, Z., Neuhold, E.J., Wrembel, R. (eds.) CIIA 2015. IAICT, vol. 456, pp. 416\u2013425. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19578-0_34"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Cakir, B., Dogdu, E.: Malware classification using deep learning methods. In: Proceedings of the ACMSE 2018 Conference, pp. 1\u20135 (2018)","DOI":"10.1145\/3190645.3190692"},{"issue":"6","key":"5_CR4","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MSEC.2018.2875369","volume":"16","author":"F Ceschin","year":"2018","unstructured":"Ceschin, F., Pinage, F., Castilho, M., Menotti, D., Oliveira, L.S., Gregio, A.: The need for speed: an analysis of Brazilian malware classifers. IEEE Secur. Priv. 16(6), 31\u201341 (2018)","journal-title":"IEEE Secur. Priv."},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.inffus.2019.01.002","volume":"49","author":"S Dey","year":"2019","unstructured":"Dey, S., Ye, Q., Sampalli, S.: A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Inform. Fusion 49, 205\u2013215 (2019)","journal-title":"Inform. Fusion"},{"issue":"13","key":"5_CR6","doi-asserted-by":"publisher","first-page":"9625","DOI":"10.1007\/s00500-019-04473-7","volume":"24","author":"D Gaurav","year":"2020","unstructured":"Gaurav, D., Tiwari, S.M., Goyal, A., Gandhi, N., Abraham, A.: Machine intelligence-based algorithms for spam filtering on document labeling. Soft Comput. 24(13), 9625\u20139638 (2020)","journal-title":"Soft Comput."},{"issue":"18","key":"5_CR7","doi-asserted-by":"publisher","first-page":"4254","DOI":"10.1002\/sec.1340","volume":"8","author":"L Gheorghe","year":"2015","unstructured":"Gheorghe, L., et al.: Smart malware detection on android. Secur. Commun. Netw. 8(18), 4254\u20134272 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jnca.2018.10.022","volume":"125","author":"W Han","year":"2019","unstructured":"Han, W., Xue, J., Wang, Y., Liu, Z., Kong, Z.: MalInsight: a systematic profiling based malware detection framework. J. Netw. Comput. Appl. 125, 236\u2013250 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.A.: Cybersecurity. In: Proceedings of the 25th International Conference on Software Engineering, pp. 705\u2013715. IEEE (2003)","DOI":"10.1109\/ICSE.2003.1201257"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, A., et al.: Multilabel classification of remote sensed satellite imagery. Trans. Emerg. Telecommun. Technol. e3988 (2020)","DOI":"10.1002\/ett.3988"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Lazzeri, F., Bruno, G., Nijhof, J., Giorgetti, A., Castoldi, P.: Efficient label encoding in segment-routing enabled optical networks. In: International Conference on Optical Network Design and Modeling (ONDM), pp. 34\u201338. IEEE (2015)","DOI":"10.1109\/ONDM.2015.7127270"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.inffus.2019.12.001","volume":"57","author":"T Meng","year":"2020","unstructured":"Meng, T., Jing, X., Yan, Z., Pedrycz, W.: A survey on machine learning for data fusion. Inform. Fusion 57, 115\u2013129 (2020)","journal-title":"Inform. Fusion"},{"key":"5_CR13","unstructured":"Mishra, S., Sagban, R., Yakoob, A., Gandhi, N.: Swarm intelligence in anomaly detection systems: an overview. Int. J. Comput. Appl. 1\u201310 (2018)"},{"issue":"6","key":"5_CR14","doi-asserted-by":"publisher","first-page":"4768","DOI":"10.3906\/elk-1807-333","volume":"27","author":"P Nerurkar","year":"2019","unstructured":"Nerurkar, P., Chandane, M., Bhirud, S.: Survey of network embedding techniques for social networks. Turkish J. Electr. Eng. Comput. Sci. 27(6), 4768\u20134782 (2019)","journal-title":"Turkish J. Electr. Eng. Comput. Sci."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Nerurkar, P.A., Chandane, M., Bhirud, S.: Exploring convolutional auto-encoders for representation learning on networks. Comput. Sci. 20(3) (2019)","DOI":"10.7494\/csci.2019.20.3.3167"},{"key":"5_CR16","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"5_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1007\/978-981-15-0029-9_62","volume-title":"First International Conference on Sustainable Technologies for Computational Intelligence","author":"C Raghuraman","year":"2020","unstructured":"Raghuraman, C., Suresh, S., Shivshankar, S., Chapaneri, R.: Static and dynamic malware analysis using machine learning. In: Luhach, A.K., Kosa, J.A., Poonia, R.C., Gao, X.-Z., Singh, D. (eds.) First International Conference on Sustainable Technologies for Computational Intelligence. AISC, vol. 1045, pp. 793\u2013806. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0029-9_62"},{"issue":"5","key":"5_CR18","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1504\/IJGUC.2019.102018","volume":"10","author":"M Rahul","year":"2019","unstructured":"Rahul, M., Kohli, N., Agarwal, R., Mishra, S.: Facial expression recognition using geometric features and modified hidden Markov model. Int. J. Grid Utility Comput. 10(5), 488\u2013496 (2019)","journal-title":"Int. J. Grid Utility Comput."},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Ren, Z., Chen, G.: EntropyVis: malware classification. In: 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/CISP-BMEI.2017.8302000"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.imavis.2018.04.004","volume":"75","author":"P Rodr\u00edguez","year":"2018","unstructured":"Rodr\u00edguez, P., Bautista, M.A., Gonzalez, J., Escalera, S.: Beyond one-hot encoding: lower dimensional target embedding. Image Vision Comput. 75, 21\u201331 (2018)","journal-title":"Image Vision Comput."},{"issue":"2","key":"5_CR21","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/COMST.2016.2636078","volume":"19","author":"EM Rudd","year":"2016","unstructured":"Rudd, E.M., Rozsa, A., G\u00fcnther, M., Boult, T.E.: A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Commun. Surv. Tutor. 19(2), 1145\u20131172 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta, J., Ruj, S., Bit, S.D.: A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J. Netw. Comput. Appl. 149, 102481 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"5_CR23","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/978-981-15-5113-0_79","volume-title":"International Conference on Innovative Computing and Communications","author":"K Shah","year":"2021","unstructured":"Shah, K., Bhandare, D., Bhirud, S.: Face recognition-based automated attendance system. In: Gupta, D., Khanna, A., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds.) International Conference on Innovative Computing and Communications. AISC, vol. 1165, pp. 945\u2013952. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5113-0_79"},{"key":"5_CR24","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-981-13-6861-5_17","volume-title":"Advances in Computer Communication and Computational Sciences","author":"A Sharaff","year":"2019","unstructured":"Sharaff, A., Gupta, H.: Extra-tree classifier with metaheuristics approach for email classification. In: Bhatia, S.K., Tiwari, S., Mishra, K.K., Trivedi, M.C. (eds.) Advances in Computer Communication and Computational Sciences. AISC, vol. 924, pp. 189\u2013197. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-6861-5_17"},{"issue":"5","key":"5_CR25","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TIFS.2015.2398363","volume":"10","author":"X Shu","year":"2015","unstructured":"Shu, X., Yao, D., Bertino, E.: Privacy-preserving detection of sensitive data exposure. IEEE Trans. Inf. Forensics Secur. 10(5), 1092\u20131103 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Udayakumar, N., Saglani, V.J., Cupta, A.V., Subbulakshmi, T.: Malware classification using machine learning algorithms. In: 2nd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1\u20139. IEEE (2018)","DOI":"10.1109\/ICOEI.2018.8553780"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Vyas, R., Luo, X., McFarland, N., Justice, C.: Investigation of malicious portable executable file detection on the network using supervised learning techniques. In: IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 941\u2013946. IEEE (2017)","DOI":"10.23919\/INM.2017.7987416"},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"49418","DOI":"10.1109\/ACCESS.2018.2864871","volume":"6","author":"M Yousefi-Azar","year":"2018","unstructured":"Yousefi-Azar, M., Hamey, L.G., Varadharajan, V., Chen, S.: Malytics: a malware detection scheme. IEEE Access 6, 49418\u201349431 (2018)","journal-title":"IEEE Access"},{"key":"5_CR29","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.patrec.2018.06.029","volume":"132","author":"W Zheng","year":"2020","unstructured":"Zheng, W., Zhu, X., Wen, G., Zhu, Y., Yu, H., Gan, J.: Unsupervised feature selection by self-paced learning regularization. Pattern Recogn. Lett. 132, 4\u201311 (2020)","journal-title":"Pattern Recogn. Lett."},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy, pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Communications in Computer and Information Science","Knowledge Graphs and Semantic Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65384-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T11:31:00Z","timestamp":1619263860000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65384-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030653835","9783030653842"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65384-2_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KGSWC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberoamerican Knowledge Graphs and Semantic Web Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Merida","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexico","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"kgswc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.kgswc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}