{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:06Z","timestamp":1742913726656,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_23","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"309-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["MACI: Malicious API Call Identifier Model to Secure the Host Platform"],"prefix":"10.1007","author":[{"given":"Ayushi","family":"Acharya","sequence":"first","affiliation":[]},{"given":"Hari","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Ishu","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Ashutosh Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Singh AK, Gupta I (2020) Online \u0131nformation leaker \u0131dentification scheme for secure data sharing. Multimed Tools Appl 79(41):31165\u201331182","DOI":"10.1007\/s11042-020-09470-9"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh AK (2020) SELI: statistical evaluation based leaker \u0131dentification stochastic scheme for secure data sharing. IET Commun 14(20):3607\u20133618","DOI":"10.1049\/iet-com.2020.0168"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Kaur K, Gupta I, Singh AK (2017) A comparative study of the approach provided for preventing the data leakage. Int J Netw Secur Appl (IJNSA) 9(5):21\u201333","DOI":"10.5121\/ijnsa.2017.9502"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Kaur K, Gupta I, Singh AK (2018) Data leakage prevention: email protection via gateway. J Phys: Conf Ser 933(1). IOP Publishing","DOI":"10.1088\/1742-6596\/933\/1\/012013"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh AK (2019) A confidentiality preserving data leaker detection model for secure sharing of cloud data using \u0131ntegrated techniques. In: Seventh \u0131nternational conference on smart computing and communication systems (ICSCC), Sarawak, Malaysia. IEEE, pp 1\u20135","DOI":"10.1109\/ICSCC.2019.8843648"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh AK (2020) A framework for malicious agent detection in cloud computing environment. Int J Adv Sci Technol (IJAST) 135, 49\u201362","DOI":"10.33832\/ijast.2020.135.05"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Gupta I, Gupta R, Singh AK, Buyya R (2020) MLPAM: a machine learning and probabilistic analysis based model for preserving security and privacy in cloud environment. IEEE Syst J","DOI":"10.1109\/JSYST.2020.3035666"},{"key":"23_CR8","unstructured":"Gupta I, Singh AK (2020) An integrated approach for data leaker detection in cloud environment. J Inf Sci Eng 36(5):993\u20131005"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst (JCOMSS) 15(2):173\u2013185","DOI":"10.24138\/jcomss.v15i2.617"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Ali M, Shiaeles S, Bendiab G, Ghita B (2020) MALGRA: machine learning and N-Gram malware feature extraction and detection system. Electronics 9(11). MDPI","DOI":"10.3390\/electronics9111777"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Han W, Xue J, Wang Y, Huang L, Kong X, Mao L (2019) MalDAE: detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. Comput Secur 83, 208\u2013233","DOI":"10.1016\/j.cose.2019.02.007"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Ma X, Guo S, Bai W, Chen J, Xia S, Pan Z (2019) An API semantics-aware malware detection method based on deep learning. Secur Commun Netw 1\u20139","DOI":"10.1155\/2019\/1315047"},{"key":"23_CR13","unstructured":"Hardy W, Chen L, Hou S, Ye Y, Li X (2016) DL4MD: a deep learning framework for intelligent malware detection. In: International conference on data mining DMIN\u201916"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Liu C, Zhang Z, Wang S (2016) An android malware detection approach using bayesian inference. In: IEEE international conference on computer and information technology (CIT), Nadi. IEEE, pp 476\u2013483","DOI":"10.1109\/CIT.2016.76"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh AK (2020) GUIM-SMD: guilty user identification model using summation matrix based distribution. IET Inf Secur 14(6):773\u2013782","DOI":"10.1049\/iet-ifs.2019.0203"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh AK (2019) Dynamic threshold based \u0131nformation leaker \u0131dentification scheme. Inf Process Lett 147, 69\u201373","DOI":"10.1016\/j.ipl.2019.03.005"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh AK (2018) A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Procedia Comput Sci 125, 662\u2013668","DOI":"10.1016\/j.procs.2017.12.085"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Gupta I, Singh AK (2017) A probability based model for data leakage detection using bigraph. In: 7th \u0131nternational conference on communication and network security (ICCNS). Tokyo, Japan. ACM, pp 1\u20135","DOI":"10.1145\/3163058.3163060"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Xu B, Li Y, Yu X (2020) Malware detection based on static and dynamic features analysis. In: Machine learning for cyber security ML4CS 2020. Lecture notes in computer science, vol 12486. Springer, Cham","DOI":"10.1007\/978-3-030-62223-7_10"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Zhao Y, Bo B, Feng Y, Xu C, Yu B (2019) A feature extraction method of hybrid gram for malicious behavior based on machine learning. Secur Commun Netw, Hindawi, 2674684:1\u20132674684:8","DOI":"10.1155\/2019\/2674684"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Gupta S, Sharma H, Kaur S (2016) Malware characterization using windows API call sequences. In: Carlet C, Hasan M, Saraswat V (eds) Security, privacy, and applied cryptography engineering SPACE 2016. Lecture notes in computer science, vol 10076. Springer, Cham, pp 271\u2013280","DOI":"10.1007\/978-3-319-49445-6_15"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Bagga P, Hans R, Sharma V (2017) N-grams based supervised machine learning model for mobile agent platform protection against unknown malicious mobile agents. Int J Interact Multimed Artif Intell 4(6):33\u201339","DOI":"10.9781\/ijimai.2017.03.013"},{"issue":"2","key":"23_CR23","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s00521-017-3077-6","volume":"31","author":"D Yuxin","year":"2019","unstructured":"Yuxin D, Siyi Z (2019) Malware detection based on deep learning algorithms. Neural Comput Appl 31(2):461\u2013472","journal-title":"Neural Comput Appl"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Sun Z, Rao Z, Chen J, Xu R, He D, Yang H, Liu J (2019) An opcode sequences analysis method for unknown malware detection. In: ICGDA 2019, Proceedings of the 2nd international conference on geoinformatics and data analysis. ACM, New York, pp 15\u201319","DOI":"10.1145\/3318236.3318255"},{"key":"23_CR25","unstructured":"Huang Y, Ting-Yi C, Sun YS, Chen YC (2019) Learning malware representation based on execution sequences. arXiv:abs\/1912.07250"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Hu Y, Ali A, Hsieh C, Williams A (2019) Machine learning techniques for classifying malicious API calls and N-Grams in kaggle data-set. SoutheastCon, 1\u20138","DOI":"10.1109\/SoutheastCon42311.2019.9020353"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Ahmed H, Traore I, Saad S (2018) Detecting opinion spams and fake news using text classification. Secur Priv 1(1). Wiley","DOI":"10.1002\/spy2.9"},{"key":"23_CR28","unstructured":"CSDMC2010 Dataset: https:\/\/www.azsecure-data.org\/other-data.html"},{"key":"23_CR29","unstructured":"APIMDS Dataset: http:\/\/ocslab.hksecurity.net\/apimds-dataset"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:05:54Z","timestamp":1646489154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}