{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:42Z","timestamp":1742913522276,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031314681"},{"type":"electronic","value":"9783031314698"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-31469-8_7","type":"book-chapter","created":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T16:01:50Z","timestamp":1682611310000},"page":"96-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning and Network Traffic to Distinguish Between Malware and Benign Applications"],"prefix":"10.1007","author":[{"given":"Laith","family":"Abualigah","sequence":"first","affiliation":[]},{"given":"Sayel","family":"Abualigah","sequence":"additional","affiliation":[]},{"given":"Mothanna","family":"Almahmoud","sequence":"additional","affiliation":[]},{"given":"Agostino","family":"Forestiero","sequence":"additional","affiliation":[]},{"given":"Gagan","family":"Sachdeva","sequence":"additional","affiliation":[]},{"given":"Essam S.","family":"Hanandeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,28]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3073559","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. 50(3), 1\u201340 (2017)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1080\/19361610.2018.1387734","volume":"13","author":"MA Jerlin","year":"2018","unstructured":"Jerlin, M.A., Marimuthu, K.: A new malware detection system using machine learning techniques for API call sequences. J. Appl. Secur. Res. 13(1), 45\u201362 (2018)","journal-title":"J. Appl. Secur. Res."},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-030-03418-4_34","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Modeling","author":"F Biondi","year":"2018","unstructured":"Biondi, F., Given-Wilson, T., Legay, A., Puodzius, C., Quilbeuf, J.: Tutorial: an overview of malware detection and evasion techniques. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 565\u2013586. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03418-4_34"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Poudyal, S., Subedi, K.P., Dasgupta, D.: A framework for analyzing ransomware using machine learning. In: Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence SSCI, January 2018, pp. 1692\u20131699 (2019)","DOI":"10.1109\/SSCI.2018.8628743"},{"key":"7_CR5","unstructured":"Vurdelja, I., Bla\u017ei\u0107, I., Dra\u0161kovi\u0107, D., Nikoli\u0107, B.: Detection of Linux Malware Using System Tracers \u2013 An Overview of Solutions, pp. 1\u20136 (2020)"},{"key":"7_CR6","unstructured":"Niveditha, V.R., Ananthan, T.V., Amudha, S., Sam, D., Srinidhi, S.: Detect and classify zero day malware efficiently in big data platform. Int. J. Adv. Sci. Technol. 29(4) Special Issue, 1947\u20131954 (2020)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Rabadi, D., Teo, S.G.: Advanced windows methods on malware detection and classification, pp. 54\u201368 (2020)","DOI":"10.1145\/3427228.3427242"},{"key":"7_CR8","unstructured":"Singh, J., Singh, J.: Assessment of supervised machine learning algorithms using dynamic API calls for malware detection. Int. J. Comput. Appl. 1\u20138 (2020)"},{"issue":"6","key":"7_CR9","first-page":"94","volume":"13","author":"R Kumar","year":"2020","unstructured":"Kumar, R., Alenezi, M., Ansari, M., Gupta, B., Agrawal, A., Khan, R.: Evaluating the impact of malware analysis techniques for securing web applications through a decision-making framework under fuzzy environment. Int. J. Intell. Eng. Syst. 13(6), 94\u2013109 (2020)","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Xiao, X., Mercaldo, F., Ni, S., Martinelli, F., Sangaiah, A.K.: Classification of ransomware families with machine learning based on N-gram of opcodes. Future Gener. Comput. Syst. 90, 211\u2013221 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"106273","DOI":"10.1016\/j.infsof.2020.106273","volume":"121","author":"J Singh","year":"2020","unstructured":"Singh, J., Singh, J.: Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms. Inf. Softw. Technol. 121, 106273 (2020)","journal-title":"Inf. Softw. Technol."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: Emulator vs real phone: android malware detection using machine learning. In: IWSPA 2017 \u2013 Proceedings of the 3rd ACM International Workshop on Security and Privacy Analytics co-located with CODASPY 2017, pp. 65\u201372 (2017)","DOI":"10.1145\/3041008.3041010"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Kilgallon, S., De La Rosa, L., Cavazos, J.: Improving the effectiveness and efficiency of dynamic malware analysis with machine learning. In: Proceedings of the - 2017 Resilience Week, RWS 2017, pp. 30\u201336 (2017)","DOI":"10.1109\/RWEEK.2017.8088644"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kumar, R., Sethi, K., Prajapati, N., Rout, R.R., Bera, P.: Machine learning based malware detection in cloud environment using clustering approach. In: 2020 11th International Conference on Computing, Communication and Networking Technologies ICCCNT 2020 (2020)","DOI":"10.1109\/ICCCNT49239.2020.9225627"},{"key":"7_CR15","unstructured":"Kr\u00fcger, F.: Activity, context, and plan recognition with computational causal behaviour models. ResearchGate (2018)"},{"issue":"7","key":"7_CR16","first-page":"704","volume":"11","author":"AM Al-Shatnwai","year":"2020","unstructured":"Al-Shatnwai, A.M., Faris, M.: Predicting customer retention using XGBoost and balancing methods. Int. J. Adv. Comput. Sci. Appl. 11(7), 704\u2013712 (2020)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.simpat.2015.03.003","volume":"55","author":"T Vafeiadis","year":"2015","unstructured":"Vafeiadis, T., Diamantaras, K.I., Sarigiannidis, G., Chatzisavvas, K.C.: A comparison of machine learning techniques for customer churn prediction. Simul. Model. Pract. Theor. 55, 1\u20139 (2015)","journal-title":"Simul. Model. Pract. Theor."},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"126871","DOI":"10.1109\/ACCESS.2022.3218653","volume":"10","author":"F Gul","year":"2022","unstructured":"Gul, F., et al.: A centralized strategy for multi-agent exploration. IEEE Access 10, 126871\u2013126884 (2022)","journal-title":"IEEE Access"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Abualigah, L., Elaziz, M.A., Khodadadi, N., Forestiero, A., Jia, H., Gandomi, A.H. Aquila optimizer based pso swarm intelligence for IoT task scheduling application in cloud computing. In: Houssein, E.H., Abd Elaziz, M., Oliva, D., Abualigah, L. (eds.) Integrating Meta-Heuristics and Machine Learning for Real-World Optimization Problems. Studies in Computational Intelligence, vol. 1038, pp. 481\u2013497. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99079-4_19","DOI":"10.1007\/978-3-030-99079-4_19"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Abualigah, L., Forestiero, A., Elaziz, M.A.: Bio-inspired agents for a distributed NLP-based clustering in smart environments. In: Abraham, A., et al. (eds.) SoCPaR 2021. LNNS, vol. 417, pp. 678\u2013687. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96302-6_64","DOI":"10.1007\/978-3-030-96302-6_64"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Alzu\u2019bi, D., et al.: Kidney tumor detection and classification based on deep learning approaches: a new dataset in CT scans. J. Healthc. Eng. (2022)","DOI":"10.1155\/2022\/3861161"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Khazalah, A., et al.: Image processing identification for sapodilla using convolution neural network (cnn) and transfer learning techniques. In: Abualigah, L. (eds.) Classification Applications with Deep Learning and Machine Learning Technologies. Studies in Computational Intelligence, vol. 1071, pp. 107\u2013127. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-17576-3_5","DOI":"10.1007\/978-3-031-17576-3_5"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Melhem, M.K.B., Abualigah, L., Zitar, R.A., Hussien, A.G., Oliva, D.: Comparative study on Arabic text classification: challenges and opportunities. In: Abualigah, L. (eds.) Classification Applications with Deep Learning and Machine Learning Technologies. Studies in Computational Intelligence, vol. 1071, pp. 217\u2013224. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-17576-3_10","DOI":"10.1007\/978-3-031-17576-3_10"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Anuar, N.A., et al.: Rambutan image classification using various deep learning approaches. In: Abualigah, L. (eds.) Classification Applications with Deep Learning and Machine Learning Technologies. Studies in Computational Intelligence, vol. 1071, pp. 23\u201343. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-17576-3_2","DOI":"10.1007\/978-3-031-17576-3_2"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Ke, C., et al.: Mango varieties classification-based optimization with transfer learning and deep learning approaches. In: Abualigah, L. (eds.) Classification Applications with Deep Learning and Machine Learning Technologies. Studies in Computational Intelligence, vol. 1071, pp. 45\u201365. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-17576-3_3","DOI":"10.1007\/978-3-031-17576-3_3"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Pervasive Knowledge and Collective Intelligence on Web and Social Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-31469-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T16:06:38Z","timestamp":1682611598000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-31469-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031314681","9783031314698"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-31469-8_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PerSOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pervasive Knowledge and Collective Intelligence on Web and Social Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Messina","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"persom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}