{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:09:20Z","timestamp":1776294560411,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032168078","type":"print"},{"value":"9783032168085","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16808-5_31","type":"book-chapter","created":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:16:54Z","timestamp":1776291414000},"page":"376-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Neural Network-Based Framework for Enhanced Malware Variant Detection"],"prefix":"10.1007","author":[{"given":"Wei","family":"Dai","sequence":"first","affiliation":[]},{"given":"Junping","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Fangbing","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"31_CR1","unstructured":"Rising: 2024 china cybersecurity report. Report (2025). http:\/\/www.rising.com.cn\/2025\/baogao\/baogao.pdf (2025). Accessed 25 Jan 2025"},{"key":"31_CR2","unstructured":"AV-TEST: Malware statistics & trends report. AV-TEST Institute. https: \/\/www.av-test.org\/en\/statistics\/malware\/ (2024). Accessed 17 Jan 2025"},{"key":"31_CR3","unstructured":"ANY.RUN: Malware trends overview report: 2024. ANY.RUN Cybersecurity Blog. https:\/\/any.run\/cybersecurity-blog\/malware-trends-2024\/ (2024). Accessed 9 Jan 2025"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/SECPRI.2001.924286","volume-title":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","author":"M Schultz","year":"2001","unstructured":"Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp. 38\u201349 (2001). https:\/\/doi.org\/10.1109\/SECPRI.2001.924286"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/CMPSAC.2004.1342667","volume-title":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004","author":"T Abou-Assaleh","year":"2004","unstructured":"Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004, vol. 2, pp. 41\u201342 (2004). https:\/\/doi.org\/10.1109\/CMPSAC.2004.1342667"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","volume-title":"Recent Advances in Intrusion Detection","author":"M Bailey","year":"2007","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) Recent Advances in Intrusion Detection, vol. 4637, pp. 178\u2013197. Springer, Berlin\/Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74320-0_10"},{"issue":"1","key":"31_CR7","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11416-006-0012-2","volume":"2","author":"U Bayer","year":"2006","unstructured":"Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. J. Comput. Virol. 2(1), 67\u201377 (2006). https:\/\/doi.org\/10.1007\/s11416-006-0012-2","journal-title":"J. Comput. Virol."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1852666.1852716","volume-title":"Proceedings of the sixth annual workshop on cyber security and information intelligence research","author":"Y Park","year":"2010","unstructured":"Park, Y., Reeves, D., Mulukutla, V., Sundaravel, B.: Fast malware classification by automated behavioral graph matching. In: Proceedings of the sixth annual workshop on cyber security and information intelligence research, pp. 1\u20134. ACM, Oak Ridge, Tennessee, USA (Apr 2010). https:\/\/doi.org\/10.1145\/1852666.1852716"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64\u201382 (2013). https:\/\/doi.org\/10.1016\/j.ins.2011.08.020","journal-title":"Inf. Sci."},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-319-75408-6_26","volume-title":"Recent Developments and the New Direction in Soft-Computing Foundations and Applications","author":"LS Grini","year":"2018","unstructured":"Grini, L.S., Shalaginov, A., Franke, K.: Study of soft computing methods for large-scale multinomial malware types and families detection. In: Zadeh, L.A., Yager, R.R., Shahbazova, S.N., Reformat, M.Z., Kreinovich, V. (eds.) Recent Developments and the New Direction in Soft-Computing Foundations and Applications, vol. 361, pp. 337\u2013350. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75408-6_26"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"K Rieck","year":"2008","unstructured":"Rieck, K., Holz, T., Willems, C., D\u00fcssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) Detection of Intrusions and Malware, and Vulnerability Assessment, vol. 5137, pp. 108\u2013125. Springer Berlin Heidelberg, Berlin, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70542-0_6"},{"issue":"9","key":"31_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1361-3723(14)70531-7","volume":"2014","author":"Z Salehi","year":"2014","unstructured":"Salehi, Z., Sami, A., Ghiasi, M.: Using feature generation from API calls for malware detection. Comput. Fraud Secur. 2014(9), 9\u201318 (2014). https:\/\/doi.org\/10.1016\/S1361-3723(14)70531-7","journal-title":"Comput. Fraud Secur."},{"key":"31_CR13","doi-asserted-by":"publisher","unstructured":"Kim, C.W.: NtMalDetect: a machine learning approach to malware detection using native API system calls. (May 2018). https:\/\/doi.org\/10.48550\/arXiv.1802.05412","DOI":"10.48550\/arXiv.1802.05412"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"3422","DOI":"10.1109\/ICASSP.2013.6638293","volume-title":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing","author":"GE Dahl","year":"2013","unstructured":"Dahl, G.E., Stokes, J.W., Deng, L., Yu, D.: Large-scale malware classification using random projections and neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3422\u20133426 (2013)"},{"key":"31_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85933-8_1","volume-title":"Visualization for Computer Security","author":"G Conti","year":"2008","unstructured":"Conti, G., Dean, E., Sinda, M., Sangster, B.: Visual reverse engineering of binary and data files. In: Goodall, J.R., Conti, G., Ma, K.L. (eds.) Visualization for Computer Security, vol. 5210, pp. 1\u201317. Springer Berlin Heidelberg, Berlin, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85933-8_1"},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2016904.2016908","volume-title":"Proceedings of the 8th International Symposium on Visualization for Cyber Security","author":"L Nataraj","year":"2011","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp. 1\u20137. ACM, Pittsburgh Pennsylvania USA (Jul 2011). https:\/\/doi.org\/10.1145\/2016904.2016908"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/CICYBS.2013.6597204","volume-title":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","author":"K Kancherla","year":"2013","unstructured":"Kancherla, K., Mukkamala, S.: Image visualization based malware detection. In: 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 40\u201344 (2013)"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1109\/ICMLA.2017.00-19","volume-title":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)","author":"E Rezende","year":"2017","unstructured":"Rezende, E., Ruppert, G., Carvalho, T., Ramos, F., de Geus, P.: Malicious software classification using transfer learning of ResNet-50 deep neural network. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1011\u20131014 (2017). https:\/\/doi.org\/10.1109\/ICMLA.2017.00-19"},{"key":"31_CR19","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/TDSC.2018.2884928","volume":"18","author":"G Sun","year":"2021","unstructured":"Sun, G., Qian, Q.: Deep learning and visualization for identifying malware families. IEEE Trans. Dependable Secure Comput. 18, 283\u2013295 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Kumar, S., Janet, B.: DTMIC: deep transfer learning for malware image classification. 64, 103063\u2013103063 (2021)","DOI":"10.1016\/j.jisa.2021.103063"},{"key":"31_CR21","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2022","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., Chen, Z.: SySeVR: a framework for using deep learning to detect software vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19, 2244\u20132258 (2022)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"31_CR22","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1109\/CVPR.2017.243","volume-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"G Huang","year":"2017","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2261\u20132269 (Jul 2017). https:\/\/doi.org\/10.1109\/CVPR.2017.243"},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/CVPR.2016.90","volume-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"K He","year":"2016","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90"},{"key":"31_CR24","doi-asserted-by":"publisher","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. (Sep 2014). https:\/\/doi.org\/10.48550\/arXiv.1408.5882","DOI":"10.48550\/arXiv.1408.5882"},{"key":"31_CR25","unstructured":"Sandbox, A.M.A.: Cuckoo sandbox. Cuckoosandbox.Org Retrieved February 4, 2025. https:\/\/cuckoosandbox.org\/index.html (n.d.) Accessed 10 Feb 2025"},{"key":"31_CR26","unstructured":"Dataset, M.: Malimg dataset. Retrieved January 27, 2025. https:\/\/ paperswithcode.com\/dataset\/malimg (n.d.) Accessed 05 Feb 2025"},{"key":"31_CR27","unstructured":"Dataset, A.C.: Alibaba cloud dataset. Retrieved January 27, 2025. https: \/\/tianchi.aliyun.com\/competition\/entrance\/231668\/information (n.d.) Accessed 10 Feb 2025"},{"key":"31_CR28","unstructured":"Datasets, V.: Virusshare datasets. Retrieved January 27, 2025. https:\/\/ virusshare.com (n.d.) Accessed 10 Feb 2025"},{"key":"31_CR29","first-page":"15","volume":"15","author":"DG Llaurad\u00f3","year":"2018","unstructured":"Llaurad\u00f3, D.G., Mateu, C., Planes, J., Vicens, R.: Using convolutional neural networks for classification of malware represented as images. J. Comput. Virol. Hacking Tech. 15, 15\u201328 (2018) https:\/\/api.semanticscholar.org\/CorpusID:52273131","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"31_CR30","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/CompComm.2017.8322598","volume-title":"2017 3rd IEEE International Conference on Computer and Communications (ICCC)","author":"B Sun","year":"2017","unstructured":"Sun, B., Li, Q., Guo, Y., Wen, Q., Lin, X., Liu, W.: Malware family classification method based on static feature extraction. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 507\u2013513 (2017). https:\/\/doi.org\/10.1109\/CompComm.2017.8322598"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16808-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:16:56Z","timestamp":1776291416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16808-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032168078","9783032168085"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16808-5_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}