{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T13:02:51Z","timestamp":1772456571360,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T00:00:00Z","timestamp":1772409600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T00:00:00Z","timestamp":1772409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100013774","name":"Universitat Oberta de Catalunya","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100013774","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Malicious software conduct using sophisticated techniques such as obfuscation and anti-analysis methods to avoid discovery is becoming more complex for digital forensic analysts to deal with. Using these advanced techniques, it has previously been reported that attackers have successfully bypassed existing security measures, making it a constant race to update and improve existent Intrusion Detection Systems\n                    <jats:bold>(IDSs)<\/jats:bold>\n                    and saving billions of dollars in currency of losses. Traditional Signature-based IDSs\n                    <jats:bold>(SIDSs)<\/jats:bold>\n                    and Anomaly-based IDSs\n                    <jats:bold>(ABIDSs)<\/jats:bold>\n                    struggle to detect new and unknown malicious threats, which require more advanced IDSs. These challenges highlight the need for continuous research and development in IDSs to keep up with the evolving security threat landscape. This paper proposes a two-stage solution Machine Learning\n                    <jats:bold>(ML)<\/jats:bold>\n                    detection-method approach. The novelty also arises from the combination of two distinct sets of features that enhance the final outcome more effectively than if they were applied separately. In stage 1, using sequences of opcodes; a discrete Hidden Markov Model\n                    <jats:bold>(dHMM)<\/jats:bold>\n                    validates the input data set; while stage 2 uses the Portable Executable\n                    <jats:bold>(PE)<\/jats:bold>\n                    sections from executable files as features of a Random Forest\n                    <jats:bold>(RF)<\/jats:bold>\n                    . Ultimately, the RF is responsible for the classification and detection purposes of metamorphic malware. This hybrid approach provided promising results with a precision rate of 100% and accuracy of 95%.\n                  <\/jats:p>","DOI":"10.1007\/s10207-026-01234-0","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T12:13:46Z","timestamp":1772453626000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A hybrid machine learning intrusion detection method for metamorphic malware"],"prefix":"10.1007","volume":"25","author":[{"given":"Victor Manuel","family":"Gonz\u00e1lez-Gorr\u00edn","sequence":"first","affiliation":[]},{"given":"Josep","family":"Prieto-Blazquez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,2]]},"reference":[{"key":"1234_CR1","unstructured":"What is an intrusion detection system (IDS)? https:\/\/www.ibm.com\/think\/topics\/intrusion-detection-system (2023)"},{"key":"1234_CR2","doi-asserted-by":"publisher","unstructured":"Almutairi, A.H., Abdelmajeed, N.T.: in 2017 International Conference on the Frontiers and Advances in Data Science (FADS) (2017), pp. 114\u2013119. https:\/\/doi.org\/10.1109\/FADS.2017.8253208","DOI":"10.1109\/FADS.2017.8253208"},{"key":"1234_CR3","doi-asserted-by":"crossref","unstructured":"Baldangombo, U., Jambaljav, N., Horng, S.J.: A static malware detection system using data mining methods (2013)","DOI":"10.5121\/ijaia.2013.4411"},{"key":"1234_CR4","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/JCN.2011.6157418","volume":"13","author":"SK Cha","year":"2011","unstructured":"Cha, S.K., Moraru, I., Jang, J., Truelove, J., Brumley, D., Andersen, D.G.: Journal of Communications and Networks 13, 187 (2011). https:\/\/doi.org\/10.1109\/JCN.2011.6157418","journal-title":"Journal of Communications and Networks"},{"key":"1234_CR5","doi-asserted-by":"publisher","unstructured":"Karnik, A., Goswami, S., Guha, R.: in Proceedings - 1st Asia International Conference on Modelling and Simulation: Asia Modelling Symposium 2007, AMS 2007 (IEEE, Phuket, Thailand, 2007), pp. 165\u2013170. https:\/\/doi.org\/10.1109\/AMS.2007.31","DOI":"10.1109\/AMS.2007.31"},{"key":"1234_CR6","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s40012-016-0095-y","volume":"4","author":"A Malhotra","year":"2016","unstructured":"Malhotra, A., Bajaj, K.: CSI Transactions on ICT 4, 141 (2016). https:\/\/doi.org\/10.1007\/s40012-016-0095-y","journal-title":"CSI Transactions on ICT"},{"key":"1234_CR7","doi-asserted-by":"publisher","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (IEEE, Oakland, CA, USA, 2001), pp. 38\u201349. https:\/\/doi.org\/10.1109\/SECPRI.2001.924286","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"1234_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TIFS.2015.2491300","volume":"11","author":"S Das","year":"2016","unstructured":"Das, S., Liu, Y., Zhang, W., Chandramohan, M.: IEEE Trans. Inf. Forensics Secur. 11, 289 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2491300","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1234_CR9","unstructured":"A. George, A. Hovan-George, T. Baskar, Partners Universal International Innovation Journal (PUIIJ) 01(04) (2023). doi: 10.5281\/zenodo.8274514"},{"key":"1234_CR10","doi-asserted-by":"crossref","unstructured":"Y. Kayode Saheed, O. Harazeem Abdulganiyu, T. Ait Tchakoucht, Journal of King Saud University - Computer and Information Sciences 35(5), 101532 (2023). doi: 10.1016\/j.jksuci.2023.03.010","DOI":"10.1016\/j.jksuci.2023.03.010"},{"key":"1234_CR11","doi-asserted-by":"crossref","unstructured":"M.A. Talukder, M.M. Islam, M.A. Uddin, K.F. Hasan, S. Sharmin, S.A. Alyami, M.A. Moni, Journal of Big Data 11,33(1) (2024). doi: 10.1186\/s40537-024-00886-w","DOI":"10.1186\/s40537-024-00886-w"},{"key":"1234_CR12","doi-asserted-by":"crossref","unstructured":"S. Ennaji, F.D. Gaspari, D. Hitaj, A. Kbidi, L.V. Mancini. Adversarial challenges in network intrusion detection systems: Research insights and future prospects (2024)","DOI":"10.1109\/ACCESS.2025.3600984"},{"key":"1234_CR13","doi-asserted-by":"publisher","unstructured":"Z. Li, A. Das, J. Zhou, in Lecture Notes in Computer Science, vol. 3531 (Springer, Berlin Heidelberg, Berlin, Heidelberg, 2005), vol. 3531, p. 222\u2013237. https:\/\/doi.org\/10.1007\/11496137_16","DOI":"10.1007\/11496137_16"},{"issue":"1","key":"1234_CR14","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s11276-023-03495-2","volume":"30","author":"OH Abdulganiyu","year":"2024","unstructured":"Abdulganiyu, O.H., Tchakoucht, T.A., Saheed, Y.K.: Wireless Netw. 30(1), 453\u2013482 (2024). https:\/\/doi.org\/10.1007\/s11276-023-03495-2","journal-title":"Wireless Netw."},{"key":"1234_CR15","doi-asserted-by":"publisher","unstructured":"Kathiresan, V., Karthik, S., Divya, P., Rajan, D.: in 2022 International Conference on Computer Communication and Informatics, ICCCI 2022 (IEEE, Coimbatore, India, 2022), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCI54379.2022.9740744","DOI":"10.1109\/ICCCI54379.2022.9740744"},{"key":"1234_CR16","doi-asserted-by":"publisher","unstructured":"Pachhala, N., Jothilakshmi, S., Battula, B.P.: in Proceedings - 2nd International Conference on Smart Electronics and Communication, ICOSEC 2021 (IEEE, Trichy, India, 2021), pp. 1207\u20131214. https:\/\/doi.org\/10.1109\/ICOSEC51865.2021.9591763","DOI":"10.1109\/ICOSEC51865.2021.9591763"},{"key":"1234_CR17","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/TIFS.2015.2469253","volume":"10","author":"S Naval","year":"2015","unstructured":"Naval, S., Laxmi, V., Rajarajan, M., Gaur, M.S., Conti, M.: IEEE Trans. Inf. Forensics Secur. 10, 2591 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2469253","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1234_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11416-011-0152-x","volume":"7","author":"B Anderson","year":"2011","unstructured":"Anderson, B., Quist, D., Neil, J., Storlie, C., Lane, T.: J. Comput. Virol. 7, 247 (2011). https:\/\/doi.org\/10.1007\/s11416-011-0152-x","journal-title":"J. Comput. Virol."},{"key":"1234_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Mach. Learn. 45, 5 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"1234_CR20","doi-asserted-by":"publisher","unstructured":"Griffin, K., Schneider, S., Hu, X., Chiueh, T.C.: Automatic generation of string signatures for malware detection, vol. 5758 LNCS (Springer Nature, Saint-Malo, France, 2009). https:\/\/doi.org\/10.1007\/978-3-642-04342-0_6","DOI":"10.1007\/978-3-642-04342-0_6"},{"key":"1234_CR21","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam, R., Tian, R., Batten, L.M., Versteeg, S.: J. Netw. Comput. Appl. 36, 646 (2013). https:\/\/doi.org\/10.1016\/j.jnca.2012.10.004","journal-title":"J. Netw. Comput. Appl."},{"key":"1234_CR22","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1002\/sec.869","volume":"7","author":"DK Mahawer","year":"2014","unstructured":"Mahawer, D.K., Nagaraju, A.: Security and Communication Networks 7, 1719 (2014). https:\/\/doi.org\/10.1002\/sec.869","journal-title":"Security and Communication Networks"},{"issue":"2","key":"1234_CR23","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner, L.R.: Proc. IEEE 77(2), 257 (1989). https:\/\/doi.org\/10.1109\/5.18626","journal-title":"Proc. IEEE"},{"key":"1234_CR24","doi-asserted-by":"publisher","unstructured":"Zhang, B., Yin, J., Hao, J., Zhang, D., Wang, S.: Malicious codes detection based on ensemble learning, vol. 4610 LNCS (Springer Nature, Hong Kong, China, 2007). https:\/\/doi.org\/10.1007\/978-3-540-73547-2_48","DOI":"10.1007\/978-3-540-73547-2_48"},{"key":"1234_CR25","doi-asserted-by":"publisher","unstructured":"Juyal, A., Bhushan, B., Hameed, A.A., Jamil, A.: in ACM International Conference Proceeding Series (Association for Computing Machinery, Istanbul, Turkiye, 2023), pp. 34\u201341. https:\/\/doi.org\/10.1145\/3633598.3633605","DOI":"10.1145\/3633598.3633605"},{"key":"1234_CR26","doi-asserted-by":"publisher","first-page":"87936","DOI":"10.1109\/ACCESS.2021.3089586","volume":"9","author":"R \u00d6mer Aslan","year":"2021","unstructured":"\u00d6mer Aslan, R.: Samet. IEEE Access 9, 87936 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3089586","journal-title":"IEEE Access"},{"key":"1234_CR27","unstructured":"Hardy, W., Chen, L., Hou, S., Ye, Y., Li, X.: in Proceedings of the International Conference on Data Mining (DMIN16) (Springer, Las Vegas, Nevada, USA, 2016), p. nill"},{"key":"1234_CR28","doi-asserted-by":"publisher","unstructured":"Huang, W., Stokes, J.W.: MtNet: A multi-task neural network for dynamic malware classification, vol. 9721 (Springer Nature, San Sebastian, Spain, 2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_20","DOI":"10.1007\/978-3-319-40667-1_20"},{"key":"1234_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036491","volume":"8","author":"SA Roseline","year":"2020","unstructured":"Roseline, S.A., Geetha, S., Kadry, S., Nam, Y.: IEEE Access 8, 206303 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3036491","journal-title":"IEEE Access"},{"key":"1234_CR30","doi-asserted-by":"publisher","unstructured":"Saxe, J., Berlin, K.: in 2015 10th International Conference on Malicious and Unwanted Software, MALWARE 2015 (IEEE, Fajardo, PR, USA, 2015), pp. 11\u201320. https:\/\/doi.org\/10.1109\/MALWARE.2015.7413680","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"1234_CR31","doi-asserted-by":"publisher","unstructured":"Srivastava, S., Raju, K.M., Dudeja, D.D.: Gagandeep, N. Shaik, A. Yadav, in ACM International Conference Proceeding Series (Association for Computing Machinery, Jaipur, India, 2023), pp. 1\u20137. https:\/\/doi.org\/10.1145\/3647444.3647868","DOI":"10.1145\/3647444.3647868"},{"key":"1234_CR32","doi-asserted-by":"publisher","first-page":"25696","DOI":"10.1109\/ACCESS.2022.3155695","volume":"10","author":"X Xing","year":"2022","unstructured":"Xing, X., Jin, X., Elahi, H., Jiang, H., Wang, G.: IEEE Access 10, 25696 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3155695","journal-title":"IEEE Access"},{"key":"1234_CR33","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10115-017-1058-9","volume":"54","author":"Y Ye","year":"2018","unstructured":"Ye, Y., Chen, L., Hou, S., Hardy, W., Li, X.: Knowl. Inf. Syst. 54, 265 (2018). https:\/\/doi.org\/10.1007\/s10115-017-1058-9","journal-title":"Knowl. Inf. Syst."},{"key":"1234_CR34","doi-asserted-by":"publisher","first-page":"93104","DOI":"10.1109\/ACCESS.2022.3204051","volume":"10","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Hamadi, H.A., Damiani, E., Yeun, C.Y., Taher, F.: IEEE Access 10, 93104 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3204051","journal-title":"IEEE Access"},{"key":"1234_CR35","doi-asserted-by":"publisher","unstructured":"Cimitile, A., Mercaldo, F., Martinelli, F., Nardone, V., Santone, A., Vaglini, G.: in Proceedings - 2017 IEEE\/ACM 5th International FME Workshop on Formal Methods in Software Engineering, FormaliSE 2017 (IEEE, Buenos Aires, Argentina, 2017), pp. 24\u201330. https:\/\/doi.org\/10.1109\/FormaliSE.2017.4","DOI":"10.1109\/FormaliSE.2017.4"},{"key":"1234_CR36","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1109\/TMC.2017.2687918","volume":"16","author":"L Xiao","year":"2017","unstructured":"Xiao, L., Li, Y., Huang, X., Du, X.: IEEE Trans. Mob. Comput. 16, 2742 (2017). https:\/\/doi.org\/10.1109\/TMC.2017.2687918","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1234_CR37","doi-asserted-by":"publisher","unstructured":"Ansori, D.B., Slamet, J., Ghufron, M.Z., Putra, M.A.R., Ahmad, T.: International Journal of Safety and Security Engineering 14(1), 259 (2024). https:\/\/doi.org\/10.18280\/ijsse.140126","DOI":"10.18280\/ijsse.140126"},{"key":"1234_CR38","doi-asserted-by":"publisher","unstructured":"Yu, T., Li, X., Ling, Y., Bin, D., Yang, C.: in ACM International Conference Proceeding Series (Association for Computing Machinery, Shenzhen, China, 2022), pp. 131\u2013137. https:\/\/doi.org\/10.1145\/3545801.3545820","DOI":"10.1145\/3545801.3545820"},{"key":"1234_CR39","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","volume":"9","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh, A., Dehghantanha, A., Conti, M., Choo, K.W.R.: J. Ambient. Intell. Humaniz. Comput. 9, 1141 (2018). https:\/\/doi.org\/10.1007\/s12652-017-0558-5","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"1234_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3131014","volume":"9","author":"F Hussain","year":"2021","unstructured":"Hussain, F., Abbas, S.G., Pires, I.M., Tanveer, S., Fayyaz, U.U., Garcia, N.M., Shah, G.A., Shahzad, F.: IEEE Access 9, 163412 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3131014","journal-title":"IEEE Access"},{"key":"1234_CR41","doi-asserted-by":"publisher","unstructured":"Stamp, M.: A Revealing Introduction to Hidden Markov Models (Chapman and Hall\/CRC, New York, USA, 2023), 2nd edn., chap. Introduction to Machine Learning with Applications in Information Security, p. 548. https:\/\/doi.org\/10.1201\/9781003264873","DOI":"10.1201\/9781003264873"},{"key":"1234_CR42","doi-asserted-by":"publisher","unstructured":"Zhao, J., Basole, S., Stamp, M.: in International Conference on Information Systems Security and Privacy (Science and Technology Publications, LDA, Set\u00fabal, Portugal, 2021), pp. 753\u2013762. https:\/\/doi.org\/10.5220\/0010409907530762","DOI":"10.5220\/0010409907530762"},{"key":"1234_CR43","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1145\/3638552","volume":"56\u20136","author":"MG Gaber","year":"2024","unstructured":"Gaber, M.G., Ahmed, M., Janicke, H.: ACM Comput. Surv. 56\u20136, 148 (2024). https:\/\/doi.org\/10.1145\/3638552","journal-title":"ACM Comput. Surv."},{"key":"1234_CR44","doi-asserted-by":"publisher","unstructured":"Akhter, A., Ferens, K.: in Proceedings - 2023 Congress in Computer Science, Computer Engineering, and Applied Computing, CSCE 2023 (IEEE, Las Vegas, NV, USA, 2023), 461\u2013469. https:\/\/doi.org\/10.1109\/CSCE60160.2023.00083","DOI":"10.1109\/CSCE60160.2023.00083"},{"key":"1234_CR45","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s11749-016-0481-7","volume":"25","author":"G Biau","year":"2016","unstructured":"Biau, G., Scornet, E.: TEST 25, 197 (2016). https:\/\/doi.org\/10.1007\/s11749-016-0481-7","journal-title":"TEST"},{"key":"1234_CR46","doi-asserted-by":"publisher","DOI":"10.1201\/9781003499527","volume-title":"Introduction to Artificial Intelligence (AI)","author":"A Banafa","year":"2024","unstructured":"Banafa, A.: Introduction to Artificial Intelligence (AI). River Publishers, Gistrup, Denmark (2024)"},{"issue":"7553","key":"1234_CR47","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y Lecun","year":"2015","unstructured":"Lecun, Y., Bengio, Y., Hinton, G.: Nature 521(7553), 436 (2015). https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nature"},{"issue":"7","key":"1234_CR48","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Osindero, S., Teh, Y.W.: Neural Comput. 18(7), 1527\u20131554 (2006). https:\/\/doi.org\/10.1162\/neco.2006.18.7.1527","journal-title":"Neural Comput."},{"key":"1234_CR49","doi-asserted-by":"publisher","unstructured":"Al-Janabi, M., Altamimi, A.M.: in Proceedings - 2020 21st International Arab Conference on Information Technology, ACIT 2020 (IEEE, Giza, Egypt, 2020), p. nill. https:\/\/doi.org\/10.1109\/ACIT50332.2020.9300081","DOI":"10.1109\/ACIT50332.2020.9300081"},{"key":"1234_CR50","doi-asserted-by":"publisher","unstructured":"Yuanming, L., Latih, R.: International Journal on Advanced Science, Engineering and Information Technology 14, 826 (2024). https:\/\/doi.org\/10.18517\/ijaseit.14.3.19993","DOI":"10.18517\/ijaseit.14.3.19993"},{"key":"1234_CR51","doi-asserted-by":"publisher","unstructured":"Sahin, M., Bahtiyar, S.: in 13th International Conference on Security of Information and Networks (Association for Computing Machinery, New York, NY, USA, 2021), SIN, 1\u20136 (2020). https:\/\/doi.org\/10.1145\/3433174.3433609","DOI":"10.1145\/3433174.3433609"},{"key":"1234_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/J.CSA.2024.100072","volume":"3","author":"E Baghirov","year":"2025","unstructured":"Baghirov, E.: Cyber Security and Applications 3, 100072 (2025). https:\/\/doi.org\/10.1016\/J.CSA.2024.100072","journal-title":"Cyber Security and Applications"},{"key":"1234_CR53","doi-asserted-by":"publisher","unstructured":"Brezinski, K., Ferens, K.: Security and Communication Networks 2023 (2023). https:\/\/doi.org\/10.1155\/2023\/8227751","DOI":"10.1155\/2023\/8227751"},{"key":"1234_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENGAPPAI.2023.107801","volume":"131","author":"K Shaukat","year":"2024","unstructured":"Shaukat, K., Luo, S., Varadharajan, V.: Eng. Appl. Artif. Intell. 131, 107801 (2024). https:\/\/doi.org\/10.1016\/J.ENGAPPAI.2023.107801","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1234_CR55","doi-asserted-by":"publisher","unstructured":"Garc\u00eda, D.E., DeCastro-Garc\u00eda, N., Casta\u00f1eda, A.L.M.: Expert Systems with Applications 212 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.118724","DOI":"10.1016\/j.eswa.2022.118724"},{"issue":"32","key":"1234_CR56","doi-asserted-by":"publisher","first-page":"27057","DOI":"10.1007\/s00521-025-11656-x","volume":"37","author":"M Eslamnejad","year":"2025","unstructured":"Eslamnejad, M., Taheri, R., Shojafar, M., Bader-El-Den, M.: Neural Comput. Appl. 37(32), 27057\u201327082 (2025)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"1234_CR57","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s10922-025-09963-8","volume":"33","author":"H Rezaei","year":"2025","unstructured":"Rezaei, H., Taheri, R., Jordanov, I., Shojafar, M.: J. Netw. Syst. Manage. 33(4), 82 (2025)","journal-title":"J. Netw. Syst. Manage."},{"key":"1234_CR58","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3390\/sym15010123","volume":"15","author":"ES Alomari","year":"2023","unstructured":"Alomari, E.S., Nuiaa, R.R., Alyasseri, Z.A.A., Mohammed, H.J., Sani, N.S., Esa, M.I., Musawi, B.A.: Symmetry 15, 123 (2023). https:\/\/doi.org\/10.3390\/sym15010123","journal-title":"Symmetry"},{"key":"1234_CR59","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The elements of statistical learning: data mining, inference, and prediction (2017)"},{"key":"1234_CR60","unstructured":"Stamp, M.: DEFCON 11. https:\/\/www.cs.sjsu.edu\/~stamp\/cv\/tripreports\/defcon11.html (2003)"},{"key":"1234_CR61","volume-title":"The Art of Computer Virus Research and Defense","author":"P Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense, 1st edn. Addison-Wesley Professional, Boston (2005)","edition":"1"},{"key":"1234_CR62","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.icte.2020.11.001","volume":"6","author":"BM Khammas","year":"2020","unstructured":"Khammas, B.M.: ICT Express 6, 325 (2020). https:\/\/doi.org\/10.1016\/j.icte.2020.11.001","journal-title":"ICT Express"},{"key":"1234_CR63","unstructured":"Lee, D.D., Seung, H.S.: in Advances in Neural Information Processing Systems (2001), p. nill"},{"key":"1234_CR64","first-page":"169","volume-title":"the IoT Era","author":"NS Bhati","year":"2021","unstructured":"Bhati, N.S., Khari, M.: in Forthcoming Networks and Sustainability. In: Ever, E., Al-Turjman, F. (eds.) the IoT Era, pp. 169\u2013176. Springer International Publishing, Cham (2021)"},{"key":"1234_CR65","doi-asserted-by":"crossref","unstructured":"Bhati, N.S., Khari, M.: Lecture Notes in Electrical Engineering 925, 777\u2013789 (2022). Cited by: 17","DOI":"10.1007\/978-981-19-4831-2_64"},{"issue":"2","key":"1234_CR66","first-page":"969","volume":"42","author":"NS Bhati","year":"2022","unstructured":"Bhati, N.S., Khari, M., Malik, H., Chaudhary, G., Srivastava, S.: J. Intell. Fuzzy Syst. 42(2), 969\u2013979 (2022)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"6","key":"1234_CR67","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1214\/aoms\/1177699147","volume":"37","author":"LE Baum","year":"1966","unstructured":"Baum, L.E., Petrie, T.: Ann. Math. Stat. 37(6), 1554 (1966)","journal-title":"Ann. Math. Stat."},{"key":"1234_CR68","doi-asserted-by":"publisher","unstructured":"Blaylock, N., Allen, J.: in Plan, Activity, and Intent Recognition, ed. by G. Sukthankar, C. Geib, H.H. Bui, D.V. Pynadath, R.P. Goldman (Morgan Kaufmann, Boston, 2014), pp. 3\u201332. https:\/\/doi.org\/10.1016\/B978-0-12-398532-3.00001-4","DOI":"10.1016\/B978-0-12-398532-3.00001-4"},{"key":"1234_CR69","doi-asserted-by":"publisher","unstructured":"Saheed, Y.K., Ayobami, R.M., Orje-Ishegh, T.: EAI\/Springer Innovations in Communication and Computing pp. 187\u2013209 (2022). https:\/\/doi.org\/10.1007\/978-3-030-89546-4_10","DOI":"10.1007\/978-3-030-89546-4_10"},{"issue":"5","key":"1234_CR70","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.3906\/elk-1501-181","volume":"24","author":"G Zararsiz","year":"2016","unstructured":"Zararsiz, G., Akyildiz, H.Y., G\u00f6ks\u00fcl\u00fck, D., Korkmaz, S., \u00d6zt\u00fcrk, A.: Turk. J. Electr. Eng. Comput. Sci. 24(5), 3685 (2016). https:\/\/doi.org\/10.3906\/elk-1501-181","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"1234_CR71","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1016\/J.JSS.2023.111921","volume":"26","author":"RE Schapire","year":"1998","unstructured":"Schapire, R.E., Freund, Y., Bartlett, P., Lee, W.S.: Ann. Stat. 26, 1651 (1998). https:\/\/doi.org\/10.1016\/J.JSS.2023.111921","journal-title":"Ann. Stat."},{"key":"1234_CR72","doi-asserted-by":"publisher","unstructured":"Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., Abuzneid, A.: Electronics (Switzerland) 8(3) (2019). https:\/\/doi.org\/10.3390\/electronics8030322. Cited by: 249","DOI":"10.3390\/electronics8030322"},{"issue":"3","key":"1234_CR73","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/BF02294361","volume":"52","author":"H Bozdogan","year":"1987","unstructured":"Bozdogan, H.: Psychometrika 52(3), 345 (1987). https:\/\/doi.org\/10.1007\/BF02294361","journal-title":"Psychometrika"},{"key":"1234_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012372560-8\/50035-8","author":"W Penny","year":"2007","unstructured":"Penny, W., Mattout, J., Trujillo-Barreto, N.: Bayesian model selection and averaging (Academic Press. London (2007). https:\/\/doi.org\/10.1016\/B978-012372560-8\/50035-8","journal-title":"London"},{"issue":"1","key":"1234_CR75","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1006\/jmps.1999.1278","volume":"44","author":"L Wasserman","year":"2000","unstructured":"Wasserman, L.: J. Math. Psychol. 44(1), 92 (2000). https:\/\/doi.org\/10.1006\/jmps.1999.1278","journal-title":"J. Math. Psychol."},{"key":"1234_CR76","doi-asserted-by":"crossref","unstructured":"Akhtar, M.S., Feng, T.: Symmetry 14(11) (2022)","DOI":"10.3390\/sym14112304"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01234-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-026-01234-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01234-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T12:13:53Z","timestamp":1772453633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-026-01234-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,2]]},"references-count":76,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1234"],"URL":"https:\/\/doi.org\/10.1007\/s10207-026-01234-0","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,2]]},"assertion":[{"value":"2 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"63"}}