{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:16:39Z","timestamp":1757625399444,"version":"3.44.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T00:00:00Z","timestamp":1754956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T00:00:00Z","timestamp":1754956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05004-2","type":"journal-article","created":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T18:58:38Z","timestamp":1755025118000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing malware detection through ensemble learning techniques"],"prefix":"10.1007","volume":"28","author":[{"given":"Loubna","family":"Moujoud","sequence":"first","affiliation":[]},{"given":"Meryeme","family":"Ayache","sequence":"additional","affiliation":[]},{"given":"Abdelhamid","family":"Belmekki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,12]]},"reference":[{"key":"5004_CR1","unstructured":"Palatty, N.J.: 30+ Malware Statistics You Need to Know in 2024 (2023). https:\/\/www.getastra.com\/blog\/security-audit\/malware-statistics\/"},{"key":"5004_CR2","unstructured":"Ensemble Learning\u2014The Science of Machine Learning\u2014ml-science.com. https:\/\/www.ml-science.com\/ensemble-learning"},{"key":"5004_CR3","unstructured":"Kundu, R.: Ensemble Learning: Methods, Techniques and Examples\u2014v7labs.com (2022). https:\/\/www.v7labs.com\/blog\/ensemble-learning"},{"issue":"6","key":"5004_CR4","first-page":"1276","volume":"71","author":"M Ficco","year":"2021","unstructured":"Ficco, M.: Malware analysis by combining multiple detectors and observation windows. IEEE Trans. Comput. 71(6), 1276\u20131290 (2021)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"5004_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.3390\/electronics10040485","volume":"10","author":"R Dama\u0161evi\u010dius","year":"2021","unstructured":"Dama\u0161evi\u010dius, R., Ven\u010dkauskas, A., Toldinas, J., Grigali\u016bnas, \u0160: Ensemble-based classification using neural networks and machine learning models for windows PR malware detection. Electronics 10(4), 485 (2021)","journal-title":"Electronics"},{"key":"5004_CR6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7247095","author":"J Yan","year":"2018","unstructured":"Yan, J., Qi, Y., Rao, Q.: Detecting malware with an ensemble method based on deep neural network. Secur. Commun. Netw. (2018). https:\/\/doi.org\/10.1155\/2018\/7247095","journal-title":"Secur. Commun. Netw."},{"key":"5004_CR7","doi-asserted-by":"crossref","unstructured":"Dhalaria, M., Gandotra, E.: Android malware detection using chi-square feature selection and ensemble learning method. In: 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), 2020, pp. 36\u201341. IEEE (2020)","DOI":"10.1109\/PDGC50313.2020.9315818"},{"issue":"7","key":"5004_CR8","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.3390\/s22072597","volume":"22","author":"X Wang","year":"2022","unstructured":"Wang, X., Zhang, L., Zhao, K., Ding, X., Yu, M.: MFDroid: a stacking ensemble learning framework for android malware detection. Sensors 22(7), 2597 (2022)","journal-title":"Sensors"},{"key":"5004_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2021.102391","volume":"113","author":"S Li","year":"2021","unstructured":"Li, S., Li, Y., Han, W., Du, X., Guizani, M., Tian, Z.: Malicious mining code detection based on ensemble learning in cloud computing environment. Simul. Model. Pract. Theory 113, 102391 (2021)","journal-title":"Simul. Model. Pract. Theory"},{"issue":"11","key":"5004_CR10","doi-asserted-by":"publisher","first-page":"1654","DOI":"10.1109\/TC.2020.3015584","volume":"69","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Venkatraman, S., Akram, J., Qin, Z.: MTHAEL: cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans. Comput. 69(11), 1654\u20131667 (2020)","journal-title":"IEEE Trans. Comput."},{"key":"5004_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103385","volume":"133","author":"SH Khan","year":"2023","unstructured":"Khan, S.H., Alahmadi, T.J., Ullah, W., Iqbal, J., Rahim, A., Alkahtani, H.K., Alghamdi, W., Almagrabi, A.Q.: A new deep boosted CNN and ensemble learning based IoT malware detection. Comput. Secur. 133, 103385 (2023)","journal-title":"Comput. Secur."},{"key":"5004_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106729","volume":"86","author":"D Gupta","year":"2020","unstructured":"Gupta, D., Rani, R.: Improving malware detection using big data and ensemble learning. Comput. Electr. Eng. 86, 106729 (2020)","journal-title":"Comput. Electr. Eng."},{"key":"5004_CR13","doi-asserted-by":"crossref","unstructured":"Ganapathiyappan, K., Noorudheen, F.: A deep learning approach to PDF malware detection enhanced with XAI. In: Cyber Warfare, Security and Space Computing, 2025. Springer, Cham (2025)","DOI":"10.1007\/978-3-031-73494-6_26"},{"key":"5004_CR14","doi-asserted-by":"crossref","unstructured":"Kirubavathi, G., Nithish, S.: Dynamic ensemble learning framework enhanced with XAI to detect Android malware. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), 2024, pp. 1\u20136 (2024)","DOI":"10.1109\/ISCS61804.2024.10581314"},{"key":"5004_CR15","unstructured":"Nayak, S.G.: Malware detection using deeplearning (October 2023)"},{"key":"5004_CR16","unstructured":"Saravana, N.: Malware detection using Naive Bayes (April 2018)"},{"key":"5004_CR17","unstructured":"Adithya, J.: Malware detection (September 2020)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05004-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05004-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05004-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:42:47Z","timestamp":1757439767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05004-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,12]]},"references-count":17,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5004"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05004-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,8,12]]},"assertion":[{"value":"20 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"477"}}