{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:39Z","timestamp":1742913879822,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030656096"},{"type":"electronic","value":"9783030656102"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65610-2_16","type":"book-chapter","created":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T09:03:39Z","timestamp":1607159019000},"page":"253-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Malign and Benign PE Files Using Texture Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1318-8041","authenticated-orcid":false,"given":"Vinita","family":"Verma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6450-9592","authenticated-orcid":false,"given":"Sunil K.","family":"Muttoo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6678-4977","authenticated-orcid":false,"given":"V. B.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,6]]},"reference":[{"key":"16_CR1","unstructured":"Global Stats. https:\/\/gs.statcounter.com\/. Accessed 18 June 2020"},{"key":"16_CR2","doi-asserted-by":"publisher","unstructured":"Manavi, F., Hamzeh, A.: A new method for malware detection using opcode visualization. In: 2017 Artificial Intelligence and Signal Processing Conference (AISP), pp. 96\u2013102. IEEE (2017). https:\/\/doi.org\/10.1109\/aisp.2017.8324117","DOI":"10.1109\/aisp.2017.8324117"},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.cose.2018.02.006","volume":"76","author":"MH Nguyen","year":"2018","unstructured":"Nguyen, M.H., Nguyen, D.Le., Nguyen, X.M., Quan, T.T.: Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning. Comput. Secur. 76, 128\u2013155 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.02.006","journal-title":"Comput. Secur."},{"key":"16_CR4","doi-asserted-by":"publisher","unstructured":"Saini, A., Gandotra, E., Bansal, D., Sofat, S.: Classification of PE files using static analysis. In: Proceedings of the 7th International Conference on Security of Information and Networks, pp. 429\u2013433. ACM (2014). https:\/\/doi.org\/10.1145\/2659651.2659679","DOI":"10.1145\/2659651.2659679"},{"key":"16_CR5","doi-asserted-by":"publisher","unstructured":"Hou, S., Chen, L., Tas, E., Demihovskiy, I., Ye, Y.: Cluster-oriented ensemble classifiers for intelligent malware detection. In: Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015), pp. 189\u2013196. IEEE (2015). https:\/\/doi.org\/10.1109\/icosc.2015.7050805","DOI":"10.1109\/icosc.2015.7050805"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Uppal, D., Sinha, R., Mehra, V., Jain, V.: Exploring behavioral aspects of API calls for Malware identification and categorization. In: 2014 International Conference on Computational Intelligence and Communication Networks, pp. 824\u2013828. IEEE (2014). https:\/\/doi.org\/10.1109\/cicn.2014.176","DOI":"10.1109\/cicn.2014.176"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Jiang, Q., Liu, N., Zhang, W.: A feature representation method of social graph for malware detection. In: 2013 Fourth Global Congress on Intelligent Systems, pp. 139\u2013143. IEEE (2013). https:\/\/doi.org\/10.1109\/gcis.2013.28","DOI":"10.1109\/gcis.2013.28"},{"key":"16_CR8","doi-asserted-by":"publisher","unstructured":"Khorsand, Z., Hamzeh, A.: A novel compression-based approach for malware detection using PE header. In: The 5th Conference on Information and Knowledge Technology, pp. 127\u2013133. IEEE (2013). https:\/\/doi.org\/10.1109\/ikt.2013.6620051","DOI":"10.1109\/ikt.2013.6620051"},{"issue":"1","key":"16_CR9","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s10586-017-1110-2","volume":"22","author":"H Kim","year":"2019","unstructured":"Kim, H., Kim, J., Kim, Y., Kim, I., Kim, K.J., Kim, H.: Improvement of malware detection and classification using API call sequence alignment and visualization. Cluster Comput. 22(1), 921\u2013929 (2019). https:\/\/doi.org\/10.1007\/s10586-017-1110-2","journal-title":"Cluster Comput."},{"key":"16_CR10","doi-asserted-by":"publisher","unstructured":"Ki, Y., Kim, E., Kim, H.K.: A novel approach to detect malware based on API call sequence analysis. Int. J. Distrib. Sens. Networks 11 (2015). https:\/\/doi.org\/10.1155\/2015\/659101","DOI":"10.1155\/2015\/659101"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11416-013-0186-3","volume":"9","author":"Y Cao","year":"2013","unstructured":"Cao, Y., Miao, Q., Liu, J., Gao, L.: Abstracting minimal security-relevant behaviors for malware analysis. J. Comput. Virol. Hacking Techniq. 9(4), 193\u2013204 (2013). https:\/\/doi.org\/10.1007\/s11416-013-0186-3","journal-title":"J. Comput. Virol. Hacking Techniq."},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11416-015-0244-0","volume":"12","author":"HS Galal","year":"2016","unstructured":"Galal, H.S., Mahdy, Y.B., Atiea, M.A.: Behavior-based features model for malware detection. J. Comput. Virol. Hacking Techniq. 12(2), 59\u201367 (2016). https:\/\/doi.org\/10.1007\/s11416-015-0244-0","journal-title":"J. Comput. Virol. Hacking Techniq."},{"key":"16_CR13","doi-asserted-by":"publisher","unstructured":"Tian, R., Islam, R., Batten, L., Versteeg, S.: Differentiating malware from cleanware using behavioural analysis. In: 2010 5th International Conference on Malicious and Unwanted Software. pp. 23\u201330. IEEE (2010). https:\/\/doi.org\/10.1109\/malware.2010.5665796","DOI":"10.1109\/malware.2010.5665796"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11416-016-0267-1","volume":"13","author":"SD Nikolopoulos","year":"2017","unstructured":"Nikolopoulos, S.D., Polenakis, I.: A graph-based model for malware detection and classification using system-call groups. J. Comput. Virol. Hacking Techniq. 13(1), 29\u201346 (2017). https:\/\/doi.org\/10.1007\/s11416-016-0267-1","journal-title":"J. Comput. Virol. Hacking Techniq."},{"key":"16_CR15","doi-asserted-by":"publisher","unstructured":"Park, Y., Reeves, D., Mulukutla, V., Sundaravel, B.: Fast malware classification by automated behavioral graph matching. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1\u20134. ACM (2010). https:\/\/doi.org\/10.1145\/1852666.1852716","DOI":"10.1145\/1852666.1852716"},{"key":"16_CR16","doi-asserted-by":"publisher","unstructured":"Imran, M., Afzal, M.T., Qadir, M.A.: Using hidden markov model for dynamic malware analysis: first impressions. In: 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 816\u2013821. IEEE (2015). https:\/\/doi.org\/10.1109\/fskd.2015.7382048","DOI":"10.1109\/fskd.2015.7382048"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-014-0242-0","volume":"14","author":"KS Han","year":"2015","unstructured":"Han, K.S., Lim, J.H., Kang, B., Im, E.G.: Malware analysis using visualized images and entropy graphs. Int. J. Inf. Secur. 14(1), 1\u201314 (2015). https:\/\/doi.org\/10.1007\/s10207-014-0242-0","journal-title":"Int. J. Inf. Secur."},{"key":"16_CR18","doi-asserted-by":"publisher","unstructured":"Han, K., Lim, J.H., Im, E.G.: Malware analysis method using visualization of binary files. In: Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013. pp. 317\u2013321. ACM (2013). https:\/\/doi.org\/10.1145\/2513228.2513294","DOI":"10.1145\/2513228.2513294"},{"issue":"1","key":"16_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-018-0314-1","volume":"15","author":"H Hashemi","year":"2019","unstructured":"Hashemi, H., Hamzeh, A.: Visual malware detection using local malicious pattern. J. Comput. Virol. Hacking Techniq. 15(1), 1\u201314 (2019). https:\/\/doi.org\/10.1007\/s11416-018-0314-1","journal-title":"J. Comput. Virol. Hacking Techniq."},{"key":"16_CR20","doi-asserted-by":"publisher","unstructured":"Kancherla, K., Mukkamala, S.: Image visualization based malware detection. In: 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 40\u201344. IEEE (2013). https:\/\/doi.org\/10.1109\/cicybs.2013.6597204","DOI":"10.1109\/cicybs.2013.6597204"},{"key":"16_CR21","doi-asserted-by":"publisher","unstructured":"Zhou, X., Pang, J., Liang, G.: Image classification for malware detection using extremely randomized trees. In: 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), pp. 54\u201359. IEEE (2017). https:\/\/doi.org\/10.1109\/icasid.2017.8285743","DOI":"10.1109\/icasid.2017.8285743"},{"key":"16_CR22","doi-asserted-by":"publisher","unstructured":"Verma, V., Muttoo, S.K., Singh, V.B.: Multiclass malware classification via first- and second-order texture statistics. Comput. Secur. 97 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101895","DOI":"10.1016\/j.cose.2020.101895"},{"key":"16_CR23","doi-asserted-by":"publisher","unstructured":"Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man. Cybern. SMC-3, 610\u2013621 (1973). https:\/\/doi.org\/10.1109\/tsmc.1973.4309314","DOI":"10.1109\/tsmc.1973.4309314"},{"key":"16_CR24","unstructured":"Malware Repository. https:\/\/virusshare.com\/. Accessed 22 Jan 2020"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Rezaei, T., Hamze, A.: An efficient approach for malware detection using PE header specifications. In: 2020 6th International Conference on Web Research (ICWR), pp. 234\u2013239. IEEE (2020). https:\/\/doi.org\/10.1109\/icwr49608.2020.9122312","DOI":"10.1109\/icwr49608.2020.9122312"},{"key":"16_CR26","doi-asserted-by":"publisher","unstructured":"Belaoued, M., Mazouzi, S.: A real-time PE-malware detection system based on CHI-square test and PE-file features. In: Computer Science and Its Applications, CIIA 2015. IFIP AICT, pp. 416\u2013425 (2015). https:\/\/doi.org\/10.1007\/978-3-319-19578-0_34","DOI":"10.1007\/978-3-319-19578-0_34"},{"key":"16_CR27","doi-asserted-by":"publisher","unstructured":"Li, B., Zhang, Y., Yao, J., Yin, T.: MDBA: Detecting Malware based on Bytes N-Gram with Association Mining. In: 2019 26th International Conference on Telecommunications (ICT), pp. 227\u2013232. IEEE (2019). https:\/\/doi.org\/10.1109\/ict.2019.8798828","DOI":"10.1109\/ict.2019.8798828"},{"key":"16_CR28","doi-asserted-by":"publisher","unstructured":"Ding, Y., Chen, S., Xu, J.: Application of Deep Belief Networks for opcode based malware detection. In: 2016 International Joint Conference on Neural Networks (IJCNN), pp. 3901\u20133908. IEEE (2016). https:\/\/doi.org\/10.1109\/ijcnn.2016.7727705","DOI":"10.1109\/ijcnn.2016.7727705"},{"key":"16_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.eswa.2016.01.002","volume":"52","author":"Y Fan","year":"2016","unstructured":"Fan, Y., Ye, Y., Chen, L.: Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52, 16\u201325 (2016). https:\/\/doi.org\/10.1016\/j.eswa.2016.01.002","journal-title":"Expert Syst. Appl."},{"key":"16_CR30","doi-asserted-by":"publisher","unstructured":"Saini, A., Gandotra, E., Bansal, D., Sofat, S.: Classification of PE files using static analysis. In: Proceedings of the 7th International Conference on Security of Information and Networks, pp. 429\u2013433. ACM (2014). https:\/\/doi.org\/10.1145\/2659651.2659679","DOI":"10.1145\/2659651.2659679"},{"key":"16_CR31","doi-asserted-by":"publisher","first-page":"140915","DOI":"10.1109\/ACCESS.2020.3014245","volume":"8","author":"L Yang","year":"2020","unstructured":"Yang, L., Liu, J.: TuningMalconv: malware detection with not just raw bytes. IEEE Access. 8, 140915\u2013140922 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3014245","journal-title":"IEEE Access."},{"key":"16_CR32","doi-asserted-by":"publisher","unstructured":"Uppal, D., Sinha, R., Mehra, V., Jain, V.: Malware detection and classification based on extraction of API sequences. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2337\u20132342. IEEE (2014). https:\/\/doi.org\/10.1109\/icacci.2014.6968547","DOI":"10.1109\/icacci.2014.6968547"},{"key":"16_CR33","doi-asserted-by":"publisher","unstructured":"Zhou, H.: Malware detection with neural network using combined features. In: CNCERT 2018, CCIS, pp. 96\u2013106 (2019). https:\/\/doi.org\/10.1007\/978-981-13-6621-5_8","DOI":"10.1007\/978-981-13-6621-5_8"},{"key":"16_CR34","doi-asserted-by":"publisher","unstructured":"Huang, X., Ma, L., Yang, W., Zhong, Y.: A method for windows malware detection based on deep learning. J. Signal Process. Syst. (2020). https:\/\/doi.org\/10.1007\/s11265-020-01588-1","DOI":"10.1007\/s11265-020-01588-1"},{"key":"16_CR35","doi-asserted-by":"publisher","unstructured":"Zhao, J., Zhang, S., Liu, B., B.C.: Malware detection using machine learning based on the combination of dynamic and static features. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE (2018). https:\/\/doi.org\/10.1109\/icccn.2018.8487459","DOI":"10.1109\/icccn.2018.8487459"},{"issue":"2","key":"16_CR36","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11416-017-0304-8","volume":"14","author":"M Saleh","year":"2018","unstructured":"Saleh, M., Li, T., Xu, S.: Multi-context features for detecting malicious programs. J. Comput. Virol. Hacking Techniq. 14(2), 181\u2013193 (2018). https:\/\/doi.org\/10.1007\/s11416-017-0304-8","journal-title":"J. Comput. Virol. Hacking Techniq."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65610-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:47:34Z","timestamp":1710269254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65610-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030656096","9783030656102"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65610-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jammu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isrdc.iitb.ac.in\/iciss2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 3 work-in-progress papers were published.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}