{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:18:13Z","timestamp":1772554693928,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T00:00:00Z","timestamp":1696809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T00:00:00Z","timestamp":1696809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10115-023-01978-4","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T07:48:01Z","timestamp":1696837681000},"page":"1337-1370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Next-generation antivirus for JavaScript malware detection based on dynamic features"],"prefix":"10.1007","volume":"66","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4350-9689","authenticated-orcid":false,"given":"Sidney M. L.","family":"de Lima","sequence":"first","affiliation":[]},{"given":"Danilo M.","family":"Souza","sequence":"additional","affiliation":[]},{"given":"Ricardo P.","family":"Pinheiro","sequence":"additional","affiliation":[]},{"given":"Sth\u00e9fano H. M. T.","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Petr\u00f4nio G.","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"Rafael D. T.","family":"de Lima","sequence":"additional","affiliation":[]},{"given":"Jemerson R.","family":"de Oliveira","sequence":"additional","affiliation":[]},{"given":"Thyago de A.","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"S\u00e9rgio M. M.","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Edison de Q.","family":"Albuquerque","sequence":"additional","affiliation":[]},{"given":"Washington W. A.","family":"da Silva","sequence":"additional","affiliation":[]},{"given":"Wellington P.","family":"dos Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,9]]},"reference":[{"key":"1978_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/ICCWS53234.2021.9703021","volume":"2021","author":"M Alam","year":"2021","unstructured":"Alam M, Akram A, Saeed T, Arshad S (2021) Deepmalware: a deep learning based malware images classification. Int Conf Cyber Warfare Secur 2021:93\u201399. https:\/\/doi.org\/10.1109\/ICCWS53234.2021.9703021","journal-title":"Int Conf Cyber Warfare Secur"},{"key":"1978_CR2","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al. (2015a) Fuzzy morphological extreme learning machines to detect and classify masses in mammograms. In: 2015 IEEE international conference on fuzzy systems (FUZZIEEE), Istanbul. https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2015.7337975","DOI":"10.1109\/FUZZ-IEEE.2015.7337975"},{"key":"1978_CR3","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al. (2015b) Morphological extreme learning machines applied to detect and classify masses in mammograms. In: 2015 international joint conference on neural networks (IJCNN), Killarney. https:\/\/doi.org\/10.1109\/IJCNN.2015.7280774","DOI":"10.1109\/IJCNN.2015.7280774"},{"key":"1978_CR4","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al. (2020) Morphological extreme learning machines applied to the detection and classification of mammary lesions. In: Tapan K Gandhi; Siddhartha Bhattacharyya; Sourav De; Debanjan Konar; Sandip Dey. (Org.). Advanced machine vision paradigms for medical image analysis. 1ed.Londres: Elsevier Science. , 1\u201330https:\/\/doi.org\/10.1016\/B978-0-12-819295-5.00003-2","DOI":"10.1016\/B978-0-12-819295-5.00003-2"},{"key":"1978_CR5","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s10115-022-01672-x","volume":"64","author":"C Catal","year":"2022","unstructured":"Catal C, Giray G, Tekinerdogan B, Kumar S, SHUKLA S (2022) Applications of deep learning for phishing detection: a systematic literature review. Knowl Inf Syst 64:1457\u20131500. https:\/\/doi.org\/10.1007\/s10115-022-01672-x","journal-title":"Knowl Inf Syst"},{"key":"1978_CR6","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1007\/s10115-022-01707-3","volume":"64","author":"J Challapalli","year":"2022","unstructured":"Challapalli J, Devarakonda N (2022) A novel approach for optimization of convolution neural network with hybrid particle swarm and grey wolf algorithm for classification of indian classical dances. Knowl Inf Syst 64:2411\u20132434. https:\/\/doi.org\/10.1007\/s10115-022-01707-3","journal-title":"Knowl Inf Syst"},{"key":"1978_CR7","doi-asserted-by":"publisher","unstructured":"Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. In: 2017 IEEE conference on computer vision and pattern recognition (CVPR) https:\/\/doi.org\/10.1109\/CVPR.2017.195","DOI":"10.1109\/CVPR.2017.195"},{"key":"1978_CR8","unstructured":"CISCO (2018) CISCO 2018 annual cybersecurity report. Accessed on Dec 2020. https:\/\/www.cisco.com\/c\/dam\/m\/hu_hu\/campaigns\/security-hub\/pdf\/acr-2018.pdf"},{"key":"1978_CR9","doi-asserted-by":"publisher","unstructured":"Cosovan D, Bencha R, Gavrilut D (2014) A practical guide for detecting javascript-based malware using hidden markov models and linear classifiers. In: 16th IEEE international symposium on symbolic and numeric algorithms for scientific computing https:\/\/doi.org\/10.1109\/SYNASC.2014.39","DOI":"10.1109\/SYNASC.2014.39"},{"key":"1978_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_10","author":"P Faruki","year":"2019","unstructured":"Faruki P, Buddhadev B (2019) Droiddivesdeep: android malware classification via low level monitorable features with deep neural networks. Int Conf Secur Priv. https:\/\/doi.org\/10.1007\/978-981-13-7561-3_10","journal-title":"Int Conf Secur Priv"},{"key":"1978_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01906-6","author":"L Ferreira","year":"2023","unstructured":"Ferreira L, Silva D, Itzazelaia M (2023) Recommender systems in cybersecurity. Knowl Inf Syst. https:\/\/doi.org\/10.1007\/s10115-023-01906-6","journal-title":"Knowl Inf Syst"},{"key":"1978_CR12","unstructured":"Hardy W, Lingwei CT (2016) Dl 4 md: a deep learning framework for intelligent malware detection. In Int\u2019l Conf. Data Mining, pp 61\u201367"},{"key":"1978_CR13","doi-asserted-by":"publisher","unstructured":"Hou S, Saas A, (2016) Droiddelver: an android malware detection system using deep belief network based on api call blocks. Web-Age Information Management. In: WAIM 2016 International Workshops, MWDA, SDMMW, and SemiBDMA https:\/\/doi.org\/10.1007\/978-3-319-47121-1_5","DOI":"10.1007\/978-3-319-47121-1_5"},{"issue":"3","key":"1978_CR14","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/72.846750","volume":"11","author":"GB Huang","year":"2000","unstructured":"Huang GB et al (2000) Classification ability of single hidden layer feedforward neural networks. IEEE Trans. Neural Netw. Learn. Syst. 11(3):799\u2013801. https:\/\/doi.org\/10.1109\/72.846750","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"2","key":"1978_CR15","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"GB Huang","year":"2012","unstructured":"Huang GB et al (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern 42(2):513\u2013519. https:\/\/doi.org\/10.1109\/TSMCB.2011.2168604","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"1978_CR16","unstructured":"Intel (2018) McAfee Labs. Accessed on Feb 2022. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-mar-2018.pdf"},{"key":"1978_CR17","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam R, Tian R, Batten L, Versteeg S (2013) Classification of malware based on integrated static and dynamic features. J Netw Comput Appl 36:646\u2013656","journal-title":"J Netw Comput Appl"},{"key":"1978_CR18","doi-asserted-by":"publisher","unstructured":"Lima S (2021) Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses. In: Cruz-Cunha MM, Mateus-Coelho, NR (eds) Handbook of research on cyber crime and information privacy, vol 1, 1st edn. IGI Global, Hershey. https:\/\/doi.org\/10.4018\/978-1-7998-5728-0.ch020","DOI":"10.4018\/978-1-7998-5728-0.ch020"},{"key":"1978_CR19","doi-asserted-by":"publisher","unstructured":"Lima SML, Silva-Filho AG, Dos\u00a0Santos WP (2014) A methodology for classification of lesions in mammographies using zernike moments, elm and svm neural networks in a multi-kernel approach. In: 2014 IEEE international conference on systems, man and cybernetics SMC, San Diego https:\/\/doi.org\/10.1109\/SMC.2014.6974041","DOI":"10.1109\/SMC.2014.6974041"},{"key":"1978_CR20","unstructured":"Lima SML, Silva-Filho Santos WP (2020b) Morphological decomposition to detect and classify lesions in mammograms. In: Wellington Pinheiro dos Santos; Ma\u00edra Ara\u00fajo de Santana; Washington Wagner Azevedo da Silva. (Org.). Understanding a Cancer Diagnosis. https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"1978_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cmpb.2016.04.029","volume":"134","author":"S Lima","year":"2016","unstructured":"Lima S, Silva-Filho AG, Santos WP (2016) Detection and classification of masses in mammographic images in a multi-kernel approach. Comput Methods Progr Biomed 134:11\u201329. https:\/\/doi.org\/10.1016\/j.cmpb.2016.04.029","journal-title":"Comput Methods Progr Biomed"},{"key":"1978_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-020-00220-4","author":"S Lima","year":"2020","unstructured":"Lima S, Silva H, Luz J et al (2020) Artificial intelligence-based antivirus in order to detect malware preventively. Progr Artif Intelli. https:\/\/doi.org\/10.1007\/s13748-020-00220-4","journal-title":"Progr Artif Intelli"},{"key":"1978_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/RDCAPE.2017.8358312","author":"S Maniath","year":"2017","unstructured":"Maniath S, Ashok A (2017) Deep learning lstm based ransomware detection. Recent Dev Contr Autom Power Eng. https:\/\/doi.org\/10.1109\/RDCAPE.2017.8358312","journal-title":"Recent Dev Contr Autom Power Eng"},{"key":"1978_CR24","unstructured":"MARADJS (2021) MARADJS (Machine learning repository applied to dynamic JavaScript files analysis). Accessed Dec 2021. https:\/\/github.com\/rewema\/MARADJS"},{"key":"1978_CR25","unstructured":"Pereira JMS et al. (2020) Method for classification of breast lesions in thermographic images using ELM classifiers. In: Wellington Pinheiro dos Santos; Ma\u00edra Ara\u00fajo de Santana; Washington Wagner Azevedo da Silva. (Org.). Understanding a cancer diagnosis. https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"1978_CR26","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1361-3723(14)70531-7","volume":"9","author":"Z Salehi","year":"2014","unstructured":"Salehi Z, Sami A, Ghiasi M (2014) Using features generation from API calls form malware detection. Comput Fraud Secur 9:9\u201318","journal-title":"Comput Fraud Secur"},{"key":"1978_CR27","unstructured":"SANS (2017) SANS Institute InfoSec reading room. Out with The Old, In with The New: Replacing Traditional Antivirus. Accessed Feb 2020. https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/old-new-replacing-traditional-antivirus-37377"},{"key":"1978_CR28","volume-title":"Mathematical morphology in digital document analysis and processing","author":"WP Santos","year":"2011","unstructured":"Santos WP (2011) Mathematical morphology in digital document analysis and processing, vol 8. Nova Science, New York"},{"key":"1978_CR29","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.neucom.2018.10.063","volume":"329","author":"MM Santos","year":"2019","unstructured":"Santos MM, Silva Filho AG, Santos WP (2019) Deep convolutional extreme learning machines: filters combination and error model validation. Neurocomputing 329:359\u2013369. https:\/\/doi.org\/10.1016\/j.neucom.2018.10.063","journal-title":"Neurocomputing"},{"key":"1978_CR30","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ins.2011.09.016","volume":"231","author":"F Shahzad","year":"2013","unstructured":"Shahzad F, Shahzad MFM (2013) In-execution dynamic malware analysis and detection by mining information in process control blocks of linux os. Inf Sci 231:45\u201363. https:\/\/doi.org\/10.1016\/j.ins.2011.09.016","journal-title":"Inf Sci"},{"key":"1978_CR31","doi-asserted-by":"publisher","first-page":"3511","DOI":"10.1007\/s10115-023-01860-3","volume":"65","author":"L SIKOS","year":"2023","unstructured":"SIKOS L (2023) Cybersecurity knowledge graphs. Knowl Inf Syst 65:3511\u20133531. https:\/\/doi.org\/10.1007\/s10115-023-01860-3","journal-title":"Knowl Inf Syst"},{"key":"1978_CR32","doi-asserted-by":"publisher","unstructured":"Su J, Vasconcellos DT (2018) Lightweight classification of IoT malware based on image recognition. In: 2018 IEEE 42nd annual computer software and applications conference (COMPSAC) https:\/\/doi.org\/10.1109\/COMPSAC.2018.10315","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"1978_CR33","unstructured":"Symantec (2016) Symantec Reports. The Increased use of Powershell in Attacks. Version 1.0. Accessed on Dec 2021"},{"key":"1978_CR34","unstructured":"Symantec (2017) Symantec Reports. Internet Security Threat Report: Living off the land and fileless attack techniques. An ISTR Special Report. Accessed Dec 2021"},{"key":"1978_CR35","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s10115-022-01753-x","volume":"65","author":"X Wang","year":"2023","unstructured":"Wang X, Zhang Q, Guo D, Zhao X (2023) A survey of continuous subgraph matching for dynamic graphs. Knowl Inf Syst 65:945\u2013989. https:\/\/doi.org\/10.1007\/s10115-022-01753-x","journal-title":"Knowl Inf Syst"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01978-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-023-01978-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01978-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T14:11:11Z","timestamp":1705500671000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-023-01978-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,9]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1978"],"URL":"https:\/\/doi.org\/10.1007\/s10115-023-01978-4","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,9]]},"assertion":[{"value":"10 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}