{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T01:00:47Z","timestamp":1771981247096,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811636363","type":"print"},{"value":"9789811636370","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T00:00:00Z","timestamp":1633132800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T00:00:00Z","timestamp":1633132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-3637-0_32","type":"book-chapter","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T11:58:23Z","timestamp":1633089503000},"page":"453-464","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Image-Based Malware Classification Using Multi-layer Perceptron"],"prefix":"10.1007","author":[{"given":"Ikram","family":"Ben Abdel Ouahab","sequence":"first","affiliation":[]},{"given":"Lotfi","family":"Elaachak","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Bouhorma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,2]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","unstructured":"Ben Abdel Ouahab, I., et al.: Classification of grayscale malware images using the K-nearest neighbor algorithm. In: Ben Ahmed, M., et al. (eds.) Innovations in Smart Cities Applications, 3rd edn., pp. 1038\u20131050. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-37629-1_75","DOI":"10.1007\/978-3-030-37629-1_75"},{"key":"32_CR2","doi-asserted-by":"publisher","unstructured":"Ben Abdel Ouahab, I. et al.: Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide. In: Proceedings of the 3rd International Conference on Networking, Information Systems & Security. Association for Computing Machinery, Marrakech, Morocco (2020). https:\/\/doi.org\/10.1145\/3386723.3387839","DOI":"10.1145\/3386723.3387839"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Bishop, C.M., Bishop, P., of N.C.C.M.: Neural Networks for Pattern Recognition. Clarendon Press (1995)","DOI":"10.1201\/9781420050646.ptb6"},{"issue":"2","key":"32_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11416-015-0244-0","volume":"12","author":"HS Galal","year":"2016","unstructured":"Galal, H.S., et al.: Behavior-based features model for malware detection. J. Comput. Virol. Hack. Tech. 12(2), 59\u201367 (2016). https:\/\/doi.org\/10.1007\/s11416-015-0244-0","journal-title":"J. Comput. Virol. Hack. Tech."},{"issue":"1","key":"32_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1080\/19361610.2018.1387734","volume":"13","author":"MA Jerlin","year":"2018","unstructured":"Jerlin, M.A., Marimuthu, K.: A new malware detection system using machine learning techniques for API call sequences. J. Appl. Secur. Res. 13(1), 45\u201362 (2018). https:\/\/doi.org\/10.1080\/19361610.2018.1387734","journal-title":"J. Appl. Secur. Res."},{"key":"32_CR6","doi-asserted-by":"publisher","unstructured":"Kalash, M., et al.: Malware classification with deep convolutional neural networks. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/NTMS.2018.8328749","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"32_CR7","unstructured":"Lu, Y., et al.: Deep Learning Based Malware Classification using Deep Residual Network, p. 7 (2019)"},{"key":"32_CR8","doi-asserted-by":"publisher","unstructured":"Luo, J., Lo, D.C.: Malware image classification using machine learning with local binary pattern. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 4664\u20134667 (2017). https:\/\/doi.org\/10.1109\/BigData.2017.8258512","DOI":"10.1109\/BigData.2017.8258512"},{"key":"32_CR9","doi-asserted-by":"publisher","unstructured":"Makandar, A., Patrot, A.: Malware analysis and classification using artificial neural network. In: 2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/ITACT.2015.7492653","DOI":"10.1109\/ITACT.2015.7492653"},{"key":"32_CR10","doi-asserted-by":"publisher","unstructured":"Nataraj, L., et al.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security\u2014VizSec \u201911, pp. 1\u20137. ACM Press, Pittsburgh, Pennsylvania (2011). https:\/\/doi.org\/10.1145\/2016904.2016908","DOI":"10.1145\/2016904.2016908"},{"issue":"3","key":"32_CR11","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1023\/A:1011139631724","volume":"42","author":"A Oliva","year":"2001","unstructured":"Oliva, A., Torralba, A.: Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. J. Comput. Vision 42(3), 145\u2013175 (2001). https:\/\/doi.org\/10.1023\/A:1011139631724","journal-title":"Int. J. Comput. Vision"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Sikos, L.F.: AI in Cybersecurity. Springer (2018)","DOI":"10.1007\/978-3-319-98842-9"},{"key":"32_CR13","doi-asserted-by":"publisher","unstructured":"Soufyane, A., et al.: An intelligent chatbot using NLP and TF-IDF algorithm for text understanding applied to the medical field. In: Ben Ahmed, M., et al. (eds.) Emerging Trends in ICT for Sustainable Development, pp. 3\u201310. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-53440-0_1","DOI":"10.1007\/978-3-030-53440-0_1"},{"issue":"1","key":"32_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s13673-018-0125-x","volume":"8","author":"A Souri","year":"2018","unstructured":"Souri, A., Hosseini, R.: A state-of-the-art survey of malware detection approaches using data mining techniques. Hum. Cent. Comput. Inf. Sci. 8(1), 3 (2018). https:\/\/doi.org\/10.1186\/s13673-018-0125-x","journal-title":"Hum. Cent. Comput. Inf. Sci."}],"container-title":["Smart Innovation, Systems and Technologies","Networking, Intelligent Systems and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-3637-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T12:26:58Z","timestamp":1633091218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-3637-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,2]]},"ISBN":["9789811636363","9789811636370"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-3637-0_32","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"value":"2190-3018","type":"print"},{"value":"2190-3026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,2]]},"assertion":[{"value":"2 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}