{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:27:48Z","timestamp":1773772068879,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s00500-022-07447-4","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T15:06:12Z","timestamp":1661526372000},"page":"1471-1491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Next-generation antivirus endowed with web-server Sandbox applied to audit fileless attack"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4350-9689","authenticated-orcid":false,"given":"Sidney M. L.","family":"Lima","sequence":"first","affiliation":[]},{"given":"Sth\u00e9fano H. M. T.","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Ricardo P.","family":"Pinheiro","sequence":"additional","affiliation":[]},{"given":"Danilo M.","family":"Souza","sequence":"additional","affiliation":[]},{"given":"Petr\u00f4nio G.","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"Rafael D. T.","family":"de Lima","sequence":"additional","affiliation":[]},{"given":"Jemerson R.","family":"de Oliveira","sequence":"additional","affiliation":[]},{"given":"Thyago de A.","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"S\u00e9rgio M. M.","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Edison de Q.","family":"Albuquerque","sequence":"additional","affiliation":[]},{"given":"Washington W. A. da","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Wellington P.","family":"dos Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,26]]},"reference":[{"key":"7447_CR1","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.ins.2014.03.128","volume":"279","author":"OAAZ Abo-Hammour","year":"2014","unstructured":"Abo-Hammour OAAZ (2014) Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm. Inf Sci 279:396\u2013415. https:\/\/doi.org\/10.1016\/j.ins.2014.03.128","journal-title":"Inf Sci"},{"key":"7447_CR2","doi-asserted-by":"publisher","first-page":"3283","DOI":"10.1007\/s00500-015-1707-4","volume":"20","author":"O Abu Arqub","year":"2016","unstructured":"Abu Arqub O, AL-Smadi MMS (2016) Numerical solutions of fuzzy differential equations using reproducing kernel hilbert space method. Soft Comput 20:3283\u20133302. https:\/\/doi.org\/10.1007\/s00500-015-1707-4","journal-title":"Soft Comput"},{"key":"7447_CR3","doi-asserted-by":"publisher","first-page":"12501","DOI":"10.1007\/s00500-020-04687-0","volume":"24","author":"OA Arqub","year":"2020","unstructured":"Arqub OA, Al-Smadi M (2020) Fuzzy conformable fractional differential equations: novel extended approach and new numerical solutions. Soft Comput 24:12501\u201312522. https:\/\/doi.org\/10.1007\/s00500-020-04687-0","journal-title":"Soft Comput"},{"key":"7447_CR4","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al. (2015a) Fuzzy morphological extreme learning machines to detect and classify masses in mammograms. In: 2015 IEEE International conference on fuzzy systems (FUZZIEEE). Istanbul. https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2015.7337975","DOI":"10.1109\/FUZZ-IEEE.2015.7337975"},{"key":"7447_CR5","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al. (2015b) Morphological extreme learning machines applied to detect and classify masses in mammograms. In: 2015 International Joint Conference on Neural Networks (IJCNN). Killarney. https:\/\/doi.org\/10.1109\/IJCNN.2015.7280774","DOI":"10.1109\/IJCNN.2015.7280774"},{"key":"7447_CR6","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al. (2020) Morphological extreme learning machines applied to the detection and classification of mammary lesions. In: Tapan K Gandhi; Siddhartha Bhattacharyya; Sourav De; Debanjan Konar; Sandip Dey. (Org.). Advanced Machine Vision Paradigms for Medical Image Analysis. 1ed.Londres: Elsevier Science. , 1\u201330 https:\/\/doi.org\/10.1016\/B978-0-12-819295-5.00003-2","DOI":"10.1016\/B978-0-12-819295-5.00003-2"},{"key":"7447_CR7","unstructured":"Ba L, Caurana R (2014) Do deep nets really need to be deep? Advances in neural information processing systems, 2654\u20132662"},{"key":"7447_CR8","doi-asserted-by":"publisher","unstructured":"Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) https:\/\/doi.org\/10.1109\/CVPR.2017.195","DOI":"10.1109\/CVPR.2017.195"},{"key":"7447_CR9","unstructured":"CISCO (2018) CISCO 2018 Annual Cybersecurity Report. Accessed on Dec. 2020. https:\/\/www.cisco.com\/c\/dam\/m\/hu_hu\/campaigns\/security-hub\/pdf\/acr-2018.pdf"},{"key":"7447_CR10","unstructured":"Conrad E, Misenar S, Feldman J (2017) Eleventh Hour CISSP (Certified Information Systems Security Professional). Syngress Publishing"},{"key":"7447_CR11","doi-asserted-by":"publisher","unstructured":"Faruki P, Buddhadev B (2019) Droiddivesdeep: Android malware classification via low level monitorable features with deep neural networks. In: International conference on security & privacy. https:\/\/doi.org\/10.1007\/978-981-13-7561-3_10","DOI":"10.1007\/978-981-13-7561-3_10"},{"issue":"2","key":"7447_CR12","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"GB Huang","year":"2012","unstructured":"Huang GB et al (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern 42(2):513\u2013519. https:\/\/doi.org\/10.1109\/TSMCB.2011.2168604","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"7447_CR13","unstructured":"IBM (2014) Explore the latest security trends\u2013from malware delivery to mobile device risks\u2013based on 2013 year-end data and ongoing research. Accessed on Dec. 2020"},{"key":"7447_CR14","unstructured":"Intel (2018) McAfee Labs. Accessed on Feb 2020. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-mar-2018.pdf"},{"key":"7447_CR15","doi-asserted-by":"publisher","unstructured":"Lima S (2020) Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses. In: Cruz-Cunha MM, Mateus-Coelho NR (eds.) Handbook of Research on Cyber Crime and Information Privacy, vol. 1, 1st edn. IGI Global, Hershey. https:\/\/doi.org\/10.4018\/978-1-7998-5728-0.ch020","DOI":"10.4018\/978-1-7998-5728-0.ch020"},{"key":"7447_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-020-00220-4","author":"S Lima","year":"2021","unstructured":"Lima S, Silva H, Luz J et al (2021) Artificial intelligence-based antivirus in order to detect malware preventively. Prog Artif Intell. https:\/\/doi.org\/10.1007\/s13748-020-00220-4","journal-title":"Prog Artif Intell"},{"key":"7447_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cmpb.2016.04.029","volume":"134","author":"S Lima","year":"2016","unstructured":"Lima S, Silva-Filho AG, Santos WP (2016) Detection and classification of masses in mammographic images in a multi-kernel approach. Comput Methods Programs Biomed 134:11\u201329. https:\/\/doi.org\/10.1016\/j.cmpb.2016.04.029","journal-title":"Comput Methods Programs Biomed"},{"key":"7447_CR18","unstructured":"Lima SML, Silva-Filho, Santos WP (2020) Morphological Decomposition to Detect and Classify Lesions in Mammograms.In: Wellington Pinheiro dos Santos; Ma\u00edra Ara\u00fajo de Santana; Washington Wagner Azevedo da Silva. (Org.). Understanding a Cancer Diagnosis. https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"7447_CR19","doi-asserted-by":"publisher","unstructured":"Lima SML, Silva-Filho AG, Dos Santos WP (2014) A methodology for classification of lesions in mammographies using zernike moments, elm and svm neural networks in a multi-kernel approach. In: 2014 IEEE International Conference on Systems, Man and Cybernetics SMC, San Diego https:\/\/doi.org\/10.1109\/SMC.2014.6974041","DOI":"10.1109\/SMC.2014.6974041"},{"key":"7447_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/RDCAPE.2017.8358312","author":"S Maniath","year":"2017","unstructured":"Maniath S, Ashok A (2017) Deep learning lstm based ransomware detection. Recent Dev Control Autom Power Eng. https:\/\/doi.org\/10.1109\/RDCAPE.2017.8358312","journal-title":"Recent Dev Control Autom Power Eng"},{"key":"7447_CR21","unstructured":"Microsoft (2013) Trustworthy Computing. Microsoft Computing Safety Index (MCSI)Worldwide Results Summary. Technical report"},{"key":"7447_CR22","unstructured":"PAEMAL (2020) PAEMAL(PHP Analysis Environment Applied to Malware Machine Learning). Accessed on Dec. 2020. https:\/\/github.com\/rewema\/PAEMAL"},{"key":"7447_CR23","unstructured":"PALOALTO (2013) PALOALTO 2013 The network security company. The Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks. volume 1st Edition"},{"key":"7447_CR24","unstructured":"Patterson DA, HJL, (2017) Computer Organization and Design. The Hardware\/Software Interface, Fifth edition, Morgan Kaufmann"},{"key":"7447_CR25","unstructured":"Pereira JMS et al (2020) Method for Classification of Breast Lesions in Thermographic Images Using ELM Classifiers. In: Wellington Pinheiro dos Santos; Ma\u00edra Ara\u00fajo de Santana; Washington Wagner Azevedo da Silva. (Org.). Understanding a Cancer Diagnosis. https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"7447_CR26","unstructured":"SANS (2017) SANS Institute InfoSec Reading Room. Out with The Old, In with The New: Replacing Traditional Antivirus. Accessed on Feb 2020. https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/old-new-replacing-traditional-antivirus-37377"},{"key":"7447_CR27","volume-title":"Mathematical morphology in digital document analysis and processing","author":"WP SANTOS","year":"2011","unstructured":"SANTOS WP (2011) Mathematical morphology in digital document analysis and processing, vol 8. Nova Science, New York"},{"key":"7447_CR28","unstructured":"Skybox (2018) Skybox Security vulnerability and threat trends report 2018. Analysis of current vulnerabilities, exploits and threats in play. Accessed on Dec. 2020. https:\/\/lp.skyboxsecurity.com\/rs\/skyboxsecurity\/images\/Skybox_Report_Vulnerability_Threat_Trends_18.pdf"},{"key":"7447_CR29","unstructured":"Skycure (2016) Skycure mobile threat defense. Mobile Threat Intelligence Report Q1 2016. Accessed on Dec. 2020. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/skycure-mobile-threat-intelligence-report-q1-2016-en.pdf"},{"key":"7447_CR30","unstructured":"Sophos (2014) Sophos Security made simple. Security Threat Report 2014. Smarter, Shadier, Stealthier Malware. Accessed on Dec. 2020. https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/other\/sophos-security-threat-report-2014.pdf"},{"key":"7447_CR31","doi-asserted-by":"publisher","unstructured":"Su J, VASCONCELLOS D, t (2018) Lightweight classification of iot malware based on image recognition. 2018 IEEE 42nd Annual computer software and applications conference (COMPSAC) https:\/\/doi.org\/10.1109\/COMPSAC.2018.10315","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"7447_CR32","unstructured":"Symantec (2012) Symantec Reports. Internet security threat report: 2001 Trends. volume 17. Published April 2012. Symantec Corporation"},{"key":"7447_CR33","unstructured":"Symantec (2017) Symantec reports. internet security threat report: living off the land and fileless attack techniques. An ISTR Special Report"},{"key":"7447_CR34","doi-asserted-by":"publisher","unstructured":"Wang Y, Qiu Y, Thai T, Moore K, Liu H, Zheng B (2017) A two-step convolutional neural network based computer-aided detection scheme for automatically segmenting adipose tissue volume depicting on ct images. Comput Methods Progr Biomed 144:97\u2013104. https:\/\/doi.org\/10.1016\/j.cmpb.2017.03.017","DOI":"10.1016\/j.cmpb.2017.03.017"},{"key":"7447_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3021689","author":"M Wozniak","year":"2015","unstructured":"Wozniak M, Silka J (2015) Recurrent neural network model for iot and networking malware threads detection. IEEE Trans Industr Inf. https:\/\/doi.org\/10.1109\/TII.2020.3021689","journal-title":"IEEE Trans Industr Inf"},{"key":"7447_CR36","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TNN.2004.836197","volume":"16","author":"C Xiang","year":"2005","unstructured":"Xiang C, Ding SQ, Lee TH (2005) Geometrical interpretation and architecture selection of mlp. The IEEE Trans Neural Netw Learn Syst 16:84\u201396. https:\/\/doi.org\/10.1109\/TNN.2004.836197","journal-title":"The IEEE Trans Neural Netw Learn Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07447-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07447-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07447-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T07:09:53Z","timestamp":1674803393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07447-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,26]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["7447"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07447-4","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,26]]},"assertion":[{"value":"6 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that no human participants were involved in this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Animal and human rights"}},{"value":"This research did not include healthcare intervention of human participants.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}