{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T10:50:03Z","timestamp":1770807003108,"version":"3.50.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032115386","type":"print"},{"value":"9783032115393","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-11539-3_18","type":"book-chapter","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T05:13:03Z","timestamp":1770786783000},"page":"311-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Malware Detection in\u00a0Windows Operating Systems Using AI and\u00a0In-Memory Process Analysis"],"prefix":"10.1007","author":[{"given":"Jessica C. C.","family":"Patricio","sequence":"first","affiliation":[]},{"given":"Carlos H.","family":"Paiva","sequence":"additional","affiliation":[]},{"given":"Renan L.","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Vanessa C.","family":"Lima","sequence":"additional","affiliation":[]},{"given":"Rafael L.","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103409","volume":"133","author":"MM Alani","year":"2023","unstructured":"Alani, M.M., Mashatan, A., Miri, A.: Xmal: A lightweight memory-based explainable obfuscated-malware detector. Comput. Secur. 133, 103409 (2023)","journal-title":"Comput. Secur."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Alsmadi, I., Al-Ahmad, B., Alsmadi, M.: Malware analysis and multi-label category detection issues: Ensemble-based approaches. In: 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA). pp. 164\u2013169. IEEE (2022)","DOI":"10.1109\/IDSTA55301.2022.9923057"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Carrier, T.: Detecting Obfuscated Malware Using Memory Feature Engineering (2021)","DOI":"10.5220\/0010908200003120"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Costa, M.A., Costa, Y.M., Almeida, Y.O., Cardoso, F.J., Gomes, R.L.: Connection management using automated firewall based on threat intelligence. In: Proceedings of the 2024 Latin America Networking Conference. p. 32\u201337. LANC \u201924, Association for Computing Machinery, New York, NY, USA (2024)","DOI":"10.1145\/3685323.3685331"},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"677","DOI":"10.3390\/sym15030677","volume":"15","author":"A Djenna","year":"2023","unstructured":"Djenna, A., Bouridane, A., Rubab, S., Marou, I.M.: Artificial intelligence-based malware detection, analysis, and mitigation. Symmetry 15(3), 677 (2023)","journal-title":"Symmetry"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"121118","DOI":"10.1109\/ACCESS.2023.3328351","volume":"11","author":"J Ferdous","year":"2023","unstructured":"Ferdous, J., Islam, R., Mahboubi, A., Islam, M.Z.: A review of state-of-the-art malware attack trends and defense mechanisms. IEEE Access 11, 121118\u2013121141 (2023)","journal-title":"IEEE Access"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Ferreira, M.C., Ribeiro, S.E., Nobre, F.V., Linhares, M.L., Ara\u00fajo, T.P., Gomes, R.L.: Mitigating measurement failures in throughput performance forecasting. In: 2024 20th International Conference on Network and Service Management (CNSM). pp.\u00a01\u20137 (2024). https:\/\/doi.org\/10.23919\/CNSM62983.2024.10814394","DOI":"10.23919\/CNSM62983.2024.10814394"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Gomes, R.L., da\u00a0Ponte, F.R.P., Urbano, A.C., Bittencourt, L.F., Madeira, E.R.M.: Strategies for daytime slicing in future internet service providers. Transactions on Emerging Telecommunications Technologies 31(1), e3727 (2020)","DOI":"10.1002\/ett.3727"},{"key":"18_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111921","volume":"209","author":"P Maniriho","year":"2024","unstructured":"Maniriho, P., Mahmood, A.N., Chowdhury, M.J.M.: A systematic literature review on windows malware detection: Techniques, research issues, and future directions. J. Syst. Softw. 209, 111921 (2024)","journal-title":"J. Syst. Softw."},{"key":"18_CR10","unstructured":"Monnappa, K.: Learning Malware Analysis: Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware. Packt Publishing Ltd. (2018)"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Nobre, F.V.J., Silva, D.d.S., Ferreira, M.C.M.M., Brito, M.L.M.L., de\u00a0Ara\u00fajo, T.P., Gomes, R.L.: Time-weighted correlation approach to identify high delay links in internet service providers. J. Int. Serv. Appl. 16(1), 419\u2013430 (2025). https:\/\/doi.org\/10.5753\/jisa.2025.5218, https:\/\/journals-sol.sbc.org.br\/index.php\/jisa\/article\/view\/5218","DOI":"10.5753\/jisa.2025.5218"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Onoja, M., Jegede, A., Mazadu, J., Aimufua, G., Oyedele, A., Olibodum, K.: Exploring the effectiveness and efficiency of lightgbm algorithm for windows malware detection. In: 2022 5th Information Technology for Education and Development (ITED). pp.\u00a01\u20136. IEEE (2022)","DOI":"10.1109\/ITED56637.2022.10051488"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Pimenta, I., Silva, D., Moura, E., Silveira, M., Gomes, R.L.: Impact of data anonymization in machine learning models. In: Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing. p. 188\u2013191. LADC \u201924, Association for Computing Machinery, New York, NY, USA (2024)","DOI":"10.1145\/3697090.3699865"}],"container-title":["Communications in Computer and Information Science","Dependable and Secure Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-11539-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T05:13:07Z","timestamp":1770786787000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-11539-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032115386","9783032115393"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-11539-3_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"12 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LADC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Latin-American Symposium on Dependable Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valpara\u00edso","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ladc2025a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ladc.sbc.org.br\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}