{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:09:36Z","timestamp":1743152976996,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819797424"},{"type":"electronic","value":"9789819797431"}],"license":[{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-9743-1_10","type":"book-chapter","created":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T17:03:00Z","timestamp":1730566980000},"page":"135-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data"],"prefix":"10.1007","author":[{"given":"S. P.","family":"Ramesh","sequence":"first","affiliation":[]},{"given":"S. Raj","family":"Anand","sequence":"additional","affiliation":[]},{"given":"V. Ganesh","family":"Karthikeyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,3]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Alagrash, Y., Mohan, N., Gollapalli, S.R., Rrushi, J.: Machine learning and recognition of user tasks for malware detection. In: Proceedings - 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019, February 2020, 73\u201381 (2019)","DOI":"10.1109\/TPS-ISA48467.2019.00018"},{"issue":"April","key":"10_CR2","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/OJCOMS.2022.3169500","volume":"3","author":"M Hataba","year":"2022","unstructured":"Hataba, M., Sherif, A., Mahmoud, M., Abdallah, M., Alasmary, W.: Security and privacy issues in autonomous vehicles: a layer-based survey. IEEE Open J. Commun. Soc. 3(April), 811\u2013829 (2022)","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"101","DOI":"10.23851\/mjs.v31i3.876","volume":"31","author":"AA Abdulhameed","year":"2020","unstructured":"Abdulhameed, A.A., Al-Azawi, R.J., Al-Mahdawi, B.M.: Modeling web security analysis attacks with CySeMoL tool. Al-Mustansiriyah J. Sci. 31(3), 101\u2013109 (2020)","journal-title":"Al-Mustansiriyah J. Sci."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Banin, S., Dyrkolbotn, G.O.: Detection of previously unseen malware using memory access patterns recorded before the entry point. In: Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), pp. 2242\u20132253. Atlanta, GA, USA (2020)","DOI":"10.1109\/BigData50022.2020.9377933"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.18517\/ijaseit.8.4-2.6827","volume":"8","author":"R Sihwail","year":"2018","unstructured":"Sihwail, R., Omar, K., Zainol Ariffin, K.A.A.: Survey on malware analysis techniques: static, dynamic, hybrid and memory analysis. Int. J. Adv. Sci. Eng. Inf. Technol. 8, 1662\u20131671 (2018)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Mosli, R.N., Li, R., Yuan, B., Pan, Y.: Automated malware detection using artifacts in forensic memory images. In: Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Waltham, MA, USA (2016)","DOI":"10.1109\/THS.2016.7568881"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Davuluru, V.S.P., Narayanan Narayanan, B., Balster, E.J.: Convolutional neural networks as classification tools and feature extractors for distinguishing malware programs. In: 2019 IEEE National Aerospace and Electronics Conference (NAECON), pp. 273\u2013278 (2019)","DOI":"10.1109\/NAECON46414.2019.9058025"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Narayanan, B.N., Djaneye-Boundjou, O., Kebede, T.M.: Performance analysis of machine learning and pattern recognition algorithms for Malware classification. In: 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS), pp. 338\u2013342 (2016)","DOI":"10.1109\/NAECON.2016.7856826"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Hegedus, J., Miche, Y., Ilin, A., Lendasse, A.: Methodology for behavioral-based malware analysis and detection using random projections and K-nearest neighbors classifiers. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 1016\u20131023 (2011)","DOI":"10.1109\/CIS.2011.227"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Sahin, D.O., Kural, O.E., Akleylek, S., Kilic, E.: New results on permission-based static analysis for Android malware. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1\u20134 (2018)","DOI":"10.1109\/ISDFS.2018.8355377"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Smith, D., Khorsandroo, S., Roy, K.: Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets. In: 2023 IEEE 2nd International Conference on AI in Cybersecurity, ICAIC 2023 (2023). Bazeer Ahamed, B., Krishnamoorthy, M.: Detection and Recovery of Node Failure in Fog-Based WiLD Network for Smart Farming. Springer International Publishing (LNNS, volume 569), pp. 721\u2013731 (2022)","DOI":"10.1109\/ICAIC57335.2023.10044169"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Talukder, M.A., et al.: A dependable hybrid machine learning model for network intrusion detection. J. Info. Sec. Appl. 72 (2023)","DOI":"10.31224\/2716"},{"issue":"9","key":"10_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/a15090332","volume":"15","author":"MHL Louk","year":"2022","unstructured":"Louk, M.H.L., Tama, B.A.: Tree-based classifier ensembles for PE malware analysis: a performance revisit. Algorithms 15(9), 1\u201315 (2022)","journal-title":"Algorithms"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"S, A., A, R., Maheshwari, G.: Improved IDS for Vehicular Ad-Hoc Networks using Deep Learning Approaches (2023). https:\/\/doi.org\/10.1109\/icacrs58579.2023.10404805","DOI":"10.1109\/icacrs58579.2023.10404805"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Rajkumar, G.V., et al.: Improving the power consumption of sensor networks using optimization technique for sleep scheduling mechanism. In: 2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) (2022). https:\/\/doi.org\/10.1109\/icacrs55517.2022.10029222","DOI":"10.1109\/icacrs55517.2022.10029222"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Ramanan, K., et al.: Sparse Long Short-Term Memory Approach for Energy-Efficient Adaptive Cluster Fuzzy-based Controller in Wireless Sensor Network (2023). https:\/\/doi.org\/10.1109\/icssit55814.2023.10061129","DOI":"10.1109\/icssit55814.2023.10061129"},{"key":"10_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11263-4","author":"A Ramathilagam","year":"2024","unstructured":"Ramathilagam, A., Vijayalakshmi, K.: Customizable fuzzy-neuro inference system attack detection based on trust for mobile wireless sensor networks. Wireless Pers. Commun. (2024). https:\/\/doi.org\/10.1007\/s11277-024-11263-4","journal-title":"Wireless Pers. Commun."},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Ponkumar, D.D.N., Ramesh, S., Purushothaman, K.E., Arun, M.R.: Improved energy-saving multi-hop networking in wireless networks. In: Lecture notes in networks and systems, pp. 587\u2013599 (2023). https:\/\/doi.org\/10.1007\/978-981-99-4071-4_45","DOI":"10.1007\/978-981-99-4071-4_45"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Abbas, M.F.B., Srikanthan, T.: Low-Complexity Signature-Based Malware Detection for IoT Devices. In: Batten, L., Kim, D., Zhang, X., Li, G. (eds.) Applications and Techniques in Information Security. ATIS 2017. Communications in Computer and Information Science, vol 719. Springer, Singapore (2017)","DOI":"10.1007\/978-981-10-5421-1_15"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Jose, A., Priyadharsini, C., Mercy Praise, P., Kathrine, G.J.W., Andrew, J.: Detection of android ransomware using machine learning approach. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds.) Applications and Techniques in Information Security. ATIS 2022. Communications in Computer and Information Science, vol 1804. Springer, Singapore (2023)","DOI":"10.1007\/978-981-99-2264-2_16"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-9743-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T17:04:00Z","timestamp":1730567040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-9743-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,3]]},"ISBN":["9789819797424","9789819797431"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-9743-1_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024,11,3]]},"assertion":[{"value":"3 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}