{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T14:02:41Z","timestamp":1760623361503},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T00:00:00Z","timestamp":1714435200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T00:00:00Z","timestamp":1714435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00854-8","type":"journal-article","created":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T07:02:19Z","timestamp":1714460539000},"page":"2547-2557","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Unmasking the common traits: an ensemble approach for effective malware detection"],"prefix":"10.1007","volume":"23","author":[{"given":"Parthajit","family":"Borah","sequence":"first","affiliation":[]},{"given":"Upasana","family":"Sarmah","sequence":"additional","affiliation":[]},{"given":"D. K.","family":"Bhattacharyya","sequence":"additional","affiliation":[]},{"given":"J. K.","family":"Kalita","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,30]]},"reference":[{"issue":"1","key":"854_CR1","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIT.1968.1054102","volume":"14","author":"G Hughes","year":"1968","unstructured":"Hughes, G.: On the mean accuracy of statistical pattern recognizers. IEEE Trans. Inf. Theory 14(1), 55\u201363 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"854_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16\u201328 (2014)","journal-title":"Comput. Electr. Eng."},{"issue":"Mar","key":"854_CR3","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(Mar), 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"7","key":"854_CR4","doi-asserted-by":"publisher","first-page":"8170","DOI":"10.1016\/j.eswa.2010.12.160","volume":"38","author":"A Arauzo-Azofra","year":"2011","unstructured":"Arauzo-Azofra, A., Aznarte, J.L., Ben\u00edtez, J.M.: Empirical study of feature selection methods based on individual feature evaluation for classification problems. Expert Syst. Appl. 38(7), 8170\u20138177 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"16","key":"854_CR5","doi-asserted-by":"publisher","first-page":"6241","DOI":"10.1016\/j.eswa.2013.05.051","volume":"40","author":"JM Cadenas","year":"2013","unstructured":"Cadenas, J.M., Garrido, M.C., Mart\u00edNez, R.: Feature subset selection filter-wrapper based on low quality data. Expert Syst. Appl. 40(16), 6241\u20136252 (2013)","journal-title":"Expert Syst. Appl."},{"key":"854_CR6","doi-asserted-by":"crossref","unstructured":"Kira, K., Rendell, L.A.: A practical approach to feature selection. In: Machine Learning Proceedings 1992, pp. 249\u2013256. Elsevier, Amsterdam (1992)","DOI":"10.1016\/B978-1-55860-247-2.50037-1"},{"issue":"4","key":"854_CR7","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TKDE.2005.66","volume":"17","author":"H Liu","year":"2005","unstructured":"Liu, H., Yu, L.: Toward integrating feature selection algorithms for classification and clustering. IEEE Trans. Knowl. Data Eng. 17(4), 491\u2013502 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"854_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3136625","volume":"50","author":"J Li","year":"2017","unstructured":"Li, J., Cheng, K., Wang, S., Morstatter, F., Trevino, R.P., Tang, J., Liu, H.: Feature selection: a data perspective. ACM Comput. Surv. (CSUR) 50(6), 1\u201345 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"854_CR9","unstructured":"Nie, F., Huang, H., Cai, X., Ding, C.: Efficient and robust feature selection via joint 2, 1-norms minimization. In: Advances in Neural Information Processing Systems, vol. 23 (2010)"},{"issue":"3","key":"854_CR10","first-page":"49","volume":"23","author":"S Iftikhar","year":"2023","unstructured":"Iftikhar, S., Al-Madani, D., Abdullah, S., Saeed, A., Fatima, K.: A supervised feature selection method for malicious intrusions detection in IoT based on genetic algorithm. Int. J. Comput. Sci. Netw. Secur. 23(3), 49\u201356 (2023)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"854_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2021.02.034","volume":"566","author":"T Bhadra","year":"2021","unstructured":"Bhadra, T., Bandyopadhyay, S.: Supervised feature selection using integration of densest subgraph finding with floating forward-backward search. Inf. Sci. 566, 1\u201318 (2021)","journal-title":"Inf. Sci."},{"key":"854_CR12","doi-asserted-by":"crossref","unstructured":"Cai, D., Zhang, C., He, X.: Unsupervised feature selection for multi-cluster data. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 333\u2013342 (2010)","DOI":"10.1145\/1835804.1835848"},{"issue":"06","key":"854_CR13","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1142\/S0219622011004671","volume":"10","author":"R Liu","year":"2011","unstructured":"Liu, R., Rallo, R., Cohen, Y.: Unsupervised feature selection using incremental least squares. Int. J. Inf. Technol. Decis. Mak. 10(06), 967\u2013987 (2011)","journal-title":"Int. J. Inf. Technol. Decis. Mak."},{"issue":"Aug","key":"854_CR14","first-page":"845","volume":"5","author":"JG Dy","year":"2004","unstructured":"Dy, J.G., Brodley, C.E.: Feature selection for unsupervised learning. J. Mach. Learn. Res. 5(Aug), 845\u2013889 (2004)","journal-title":"J. Mach. Learn. Res."},{"key":"854_CR15","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TIP.2023.3234497","volume":"32","author":"D Shi","year":"2023","unstructured":"Shi, D., Zhu, L., Li, J., Zhang, Z., Chang, X.: Unsupervised adaptive feature selection with binary hashing. IEEE Trans. Image Process. 32, 838\u2013853 (2023)","journal-title":"IEEE Trans. Image Process."},{"key":"854_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.neucom.2022.10.030","volume":"516","author":"MS Jahani","year":"2023","unstructured":"Jahani, M.S., Aghamollaei, G., Eftekhari, M., Saberi-Movahed, F.: Unsupervised feature selection guided by orthogonal representation of feature space. Neurocomputing 516, 61\u201376 (2023)","journal-title":"Neurocomputing"},{"issue":"7","key":"854_CR17","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/TNN.2010.2047114","volume":"21","author":"Z Xu","year":"2010","unstructured":"Xu, Z., King, I., Lyu, M.R.-T., Jin, R.: Discriminative semi-supervised feature selection via manifold regularization. IEEE Trans. Neural Netw. 21(7), 1033\u20131047 (2010)","journal-title":"IEEE Trans. Neural Netw."},{"key":"854_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, H.: Semi-supervised feature selection via spectral analysis. In: Proceedings of the 2007 SIAM International Conference on Data Mining, pp. 641\u2013646. SIAM (2007)","DOI":"10.1137\/1.9781611972771.75"},{"key":"854_CR19","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.patcog.2016.11.003","volume":"64","author":"R Sheikhpour","year":"2017","unstructured":"Sheikhpour, R., Sarram, M.A., Gharaghani, S., Chahooki, M.A.Z.: A survey on semi-supervised feature selection methods. Pattern Recogn. 64, 141\u2013158 (2017)","journal-title":"Pattern Recogn."},{"key":"854_CR20","doi-asserted-by":"publisher","first-page":"119130","DOI":"10.1016\/j.eswa.2022.119130","volume":"214","author":"F Karimi","year":"2023","unstructured":"Karimi, F., Dowlatshahi, M.B., Hashemi, A.: Semiaco: a semi-supervised feature selection based on ant colony optimization. Expert Syst. Appl. 214, 119130 (2023)","journal-title":"Expert Syst. Appl."},{"key":"854_CR21","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.ijar.2022.11.020","volume":"153","author":"W Shu","year":"2023","unstructured":"Shu, W., Yu, J., Yan, Z., Qian, W.: Semi-supervised feature selection for partially labeled mixed-type data based on multi-criteria measure approach. Int. J. Approx. Reason. 153, 258\u2013279 (2023)","journal-title":"Int. J. Approx. Reason."},{"issue":"10","key":"854_CR22","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986\u20132998 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"13","key":"854_CR23","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.1016\/j.ins.2009.02.014","volume":"179","author":"S Maldonado","year":"2009","unstructured":"Maldonado, S., Weber, R.: A wrapper method for feature selection using support vector machines. Inf. Sci. 179(13), 2208\u20132217 (2009)","journal-title":"Inf. Sci."},{"key":"854_CR24","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.eswa.2018.11.006","volume":"119","author":"M Lu","year":"2019","unstructured":"Lu, M.: Embedded feature selection accounting for unknown data heterogeneity. Expert Syst. Appl. 119, 350\u2013361 (2019)","journal-title":"Expert Syst. Appl."},{"key":"854_CR25","doi-asserted-by":"publisher","first-page":"7839","DOI":"10.1007\/s00521-019-04171-3","volume":"32","author":"M Ghosh","year":"2020","unstructured":"Ghosh, M., Guha, R., Sarkar, R., Abraham, A.: A wrapper-filter feature selection technique based on ant colony optimization. Neural Comput. Appl. 32, 7839\u20137857 (2020)","journal-title":"Neural Comput. Appl."},{"key":"854_CR26","doi-asserted-by":"crossref","unstructured":"Wei, F., Li, Y., Roy, S., Ou, X., Zhou, W.: Deep ground truth analysis of current android malware. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA\u201917), pp. 252\u2013276. Springer, Bonn (2017)","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"854_CR27","doi-asserted-by":"crossref","unstructured":"Borah, P., Bhattacharyya, D., Kalita, J.: Malware dataset generation and evaluation. In: 2020 IEEE 4th Conference on Information & Communication Technology (CICT), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/CICT51604.2020.9312053"},{"key":"854_CR28","unstructured":"Hall, M.A.: Correlation-based Feature Selection for Machine Learning, vol. 27, no. 2, pp. 115\u2013131. University of Waikato, Hamilton (1999)"},{"issue":"4","key":"854_CR29","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/72.298224","volume":"5","author":"R Battiti","year":"1994","unstructured":"Battiti, R.: Using mutual information for selecting features in supervised neural net learning. IEEE Trans. Neural Netw. 5(4), 537\u2013550 (1994)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"1\u20132","key":"854_CR30","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1023\/A:1025667309714","volume":"53","author":"M Robnik-\u0160ikonja","year":"2003","unstructured":"Robnik-\u0160ikonja, M., Kononenko, I.: Theoretical and empirical analysis of ReliefF and RReliefF. Mach. Learn. 53(1\u20132), 23\u201369 (2003)","journal-title":"Mach. Learn."},{"key":"854_CR31","unstructured":"Yu, L., Liu, H.: Efficient attribute selection in the presence of categorical target attributes. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 594\u2013601. AUAI Press (2004)"},{"issue":"1","key":"854_CR32","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"854_CR33","unstructured":"Hemelo, L.: Malware Exploratory Dataset. https:\/\/www.kaggle.com\/code\/luizhemelo\/malware-exploratory\/input"},{"key":"854_CR34","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/CCST.2018.8585560"},{"key":"854_CR35","doi-asserted-by":"crossref","unstructured":"Peng, H., Long, F., Ding, C.: Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27(8), 1226\u20131238 (2005)","DOI":"10.1109\/TPAMI.2005.159"},{"key":"854_CR36","doi-asserted-by":"crossref","unstructured":"Vidal-Naquet, M., Ullman, S.: Object recognition with informative features and linear classification. In: ICCV, vol. 3, p. 281 (2003)","DOI":"10.1109\/ICCV.2003.1238356"},{"key":"854_CR37","unstructured":"Liu, H., Setiono, R.: Chi2: feature selection and discretization of numeric attributes. In: Proceedings of 7th IEEE International Conference on Tools with Artificial Intelligence, pp. 388\u2013391. IEEE (1995)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00854-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00854-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00854-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:12:10Z","timestamp":1721013130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00854-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,30]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["854"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00854-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,30]]},"assertion":[{"value":"30 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}