{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:44:37Z","timestamp":1774950277404,"version":"3.50.1"},"reference-count":162,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10586-024-05017-x","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T11:02:32Z","timestamp":1737457352000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Review of malicious code detection in data mining applications: challenges, algorithms, and future direction"],"prefix":"10.1007","volume":"28","author":[{"given":"Abdul","family":"Razaque","sequence":"first","affiliation":[]},{"given":"Gulnara","family":"Bektemyssova","sequence":"additional","affiliation":[]},{"given":"Joon","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]},{"given":"Meer Jaro","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Nurgul","family":"Nalgozhina","sequence":"additional","affiliation":[]},{"given":"Jaeryong","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"M. Ajmal","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"issue":"12","key":"5017_CR1","doi-asserted-by":"crossref","first-page":"8154","DOI":"10.1109\/TII.2021.3065702","volume":"17","author":"Y Bao","year":"2021","unstructured":"Bao, Y., Yang, Q.: A data-mining compensation approach for yaw misalignment on wind turbine. IEEE Trans. Ind. Informat. 17(12), 8154\u20138164 (2021)","journal-title":"IEEE Trans. Ind. Informat."},{"key":"5017_CR2","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.procs.2023.11.013","volume":"228","author":"Y Yang","year":"2023","unstructured":"Yang, Y.: Application of data mining technology in exam score analysis. Procedia Comput. Sci. 228, 98\u2013111 (2023)","journal-title":"Procedia Comput. Sci."},{"key":"5017_CR3","doi-asserted-by":"crossref","unstructured":"Kamatkar, S.J., Tayade, A., Viloria, A., Hern\u00e1ndez-Chac\u00edn, A.: Application of classification technique of data mining for employee management system. In: International Conference on Data Mining and Big Data, pp. 434\u2013444. Springer (2018)","DOI":"10.1007\/978-3-319-93803-5_41"},{"key":"5017_CR4","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.procir.2023.06.074","volume":"118","author":"F Garghetti","year":"2023","unstructured":"Garghetti, F., Grasso, M., Pacella, M., Fogliazza, G., Colosimo, B.M.: Multi-stream big data mining for industry 4.0 in machining: novel application of a Gated Recurrent Unit Network. Procedia CIRP 118, 431\u2013436 (2023)","journal-title":"Procedia CIRP"},{"issue":"1","key":"5017_CR5","doi-asserted-by":"crossref","first-page":"32","DOI":"10.5121\/ijdps.2010.1103","volume":"1","author":"S Deshpande","year":"2010","unstructured":"Deshpande, S., Thakare, V.: Data mining system and applications: a review. Int. J. Distrib. Parallel Syst. (IJDPS) 1(1), 32\u201344 (2010)","journal-title":"Int. J. Distrib. Parallel Syst. (IJDPS)"},{"key":"5017_CR6","doi-asserted-by":"crossref","unstructured":"AlNuaimi, N., Masud, M.M., Serhani, M.A., Zaki, N.: Streaming feature selection algorithms for big data: a survey. Appl. Comput. Informat. (2020)","DOI":"10.1016\/j.aci.2019.01.001"},{"issue":"1","key":"5017_CR7","first-page":"1","volume":"8","author":"A Souri","year":"2018","unstructured":"Souri, A., Hosseini, R.: A state-of-the-art survey of malware detection approaches using data mining techniques. HCIS 8(1), 1\u201322 (2018)","journal-title":"HCIS"},{"issue":"2","key":"5017_CR8","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1007\/s00500-017-2918-7","volume":"23","author":"MK Najafabadi","year":"2019","unstructured":"Najafabadi, M.K., Mohamed, A.H., Mahrin, M.N.: A survey on data mining techniques in recommender systems. Soft. Comput. 23(2), 627\u2013654 (2019)","journal-title":"Soft. Comput."},{"key":"5017_CR9","doi-asserted-by":"crossref","first-page":"56046","DOI":"10.1109\/ACCESS.2018.2872784","volume":"6","author":"F Salo","year":"2018","unstructured":"Salo, F., Injadat, M., Nassif, A.B., Shami, A., Essex, A.: Data mining techniques in intrusion detection systems: a systematic literature review. IEEE Access 6, 56046\u201356058 (2018)","journal-title":"IEEE Access"},{"key":"5017_CR10","doi-asserted-by":"crossref","unstructured":"Berkhin, P.: A survey of clustering data mining techniques. In: Grouping Multidimensional Data, pp. 25\u201371. Springer (2006)","DOI":"10.1007\/3-540-28349-8_2"},{"key":"5017_CR11","unstructured":"Phyu, T.N.: Survey of classification techniques in data mining. In: Proceedings of the International Multiconference of Engineers and Computer Scientists, vol. 1, no. 5 (2009)"},{"issue":"2","key":"5017_CR12","first-page":"65","volume":"2","author":"S Archana","year":"2014","unstructured":"Archana, S., Elangovan, K.: Survey of classification techniques in data mining. Int. J. Comput. Sci. Mob. Appl. 2(2), 65\u201371 (2014)","journal-title":"Int. J. Comput. Sci. Mob. Appl."},{"issue":"8","key":"5017_CR13","first-page":"18","volume":"4","author":"DL AbdAl-Nabi","year":"2013","unstructured":"AbdAl-Nabi, D.L., Ahmed, S.S.: Survey on classification algorithms for data mining:(comparison and evaluation). Int. J. Comput. Eng. Intell. Syst. 4(8), 18\u201327 (2013)","journal-title":"Int. J. Comput. Eng. Intell. Syst."},{"key":"5017_CR14","doi-asserted-by":"crossref","unstructured":"Brindha, S., Prabha, K. and Sukumaran, S.: A survey on classification techniques for text mining. In: 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), vol. 1, pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/ICACCS.2016.7586371"},{"issue":"3","key":"5017_CR15","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1007\/s10462-017-9599-6","volume":"52","author":"F Hemmatian","year":"2019","unstructured":"Hemmatian, F., Sohrabi, M.K.: A survey on classification techniques for opinion mining and sentiment analysis. Artif. Intell. Rev. 52(3), 1495\u20131545 (2019)","journal-title":"Artif. Intell. Rev."},{"key":"5017_CR16","doi-asserted-by":"crossref","first-page":"3144","DOI":"10.1109\/ACCESS.2021.3137078","volume":"10","author":"A Razaque","year":"2022","unstructured":"Razaque, A., Alotaibi, B., Alotaibi, M., Amsaad, F., Manasov, A., Hariri, S., Yergaliyeva, B.B., Alotaibi, A.: Blockchain-enabled deep recurrent neural network model for clickbait detection. IEEE Access 10, 3144\u20133163 (2022)","journal-title":"IEEE Access"},{"key":"5017_CR17","doi-asserted-by":"crossref","unstructured":"Razaque, A., Amsaad, F., Halder, D., Baza, M., Aboshgifa, A., Bhatia, S.: Analysis of sentimental behaviour over social data using machine learning algorithms. In: Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices: 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA\/AIE 2021, Kuala Lumpur, Malaysia, July 26\u201329, 2021, Proceedings, Part I 34, pp. 396\u2013412. Springer International Publishing","DOI":"10.1007\/978-3-030-79457-6_34"},{"issue":"3","key":"5017_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3073559","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (CSUR) 50(3), 1\u201340 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"5017_CR19","doi-asserted-by":"crossref","first-page":"18","DOI":"10.3390\/bdcc2030018","volume":"2","author":"H Hassani","year":"2018","unstructured":"Hassani, H., Huang, X., Silva, E.: Digitalisation and big data mining in banking. Big Data Cogn. Comput. 2(3), 18 (2018)","journal-title":"Big Data Cogn. Comput."},{"key":"5017_CR20","doi-asserted-by":"crossref","unstructured":"Gan, W., Chun-Wei, J., Chao, H.C., Wang, S.L., Philip, S.Y.: Privacy preserving utility mining: a survey. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 2617\u20132626. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622405"},{"key":"5017_CR21","doi-asserted-by":"crossref","unstructured":"Deshpande, A., Pedamkar, O., Chaudhary, N., Borde, S.: Detection of phishing websites using machine learning. In: 2020 IEEE Cloud Summit, pp. 103\u2013107 (2020)","DOI":"10.1109\/IEEECloudSummit48914.2020.00022"},{"key":"5017_CR22","doi-asserted-by":"crossref","unstructured":"Marb\u00e1n, \u00d3., Mariscal, G., Segovia, J.: A data mining & knowledge discovery process model. IntechOpen (2009)","DOI":"10.5772\/6438"},{"key":"5017_CR23","doi-asserted-by":"crossref","unstructured":"Leung, C. K.: Big data analytics and mining for knowledge discovery. In: Research Anthology on Big Data Analytics, Architectures, and Applications, pp. 708\u2013721. IGI Global (2022)","DOI":"10.4018\/978-1-6684-3662-2.ch033"},{"key":"5017_CR24","unstructured":"Jiawei, H., Kamber, M.: Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems), vol. 2. Morgan Kaufmann Publisher (2011)"},{"issue":"4","key":"5017_CR25","doi-asserted-by":"crossref","first-page":"3846","DOI":"10.1109\/TKDE.2021.3126066","volume":"35","author":"Y Zhou","year":"2021","unstructured":"Zhou, Y., Dou, Z., Wen, J.-R.: Enhancing potential re-finding in personalized search with hierarchical memory networks. IEEE Trans. Knowl. Data Eng. 35(4), 3846\u20133857 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5017_CR26","doi-asserted-by":"crossref","unstructured":"Li, X., Dong, X., Wang, Y.: Malicious code forensics based on data mining. In: 2013 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 978\u2013983. IEEE (2013)","DOI":"10.1109\/FSKD.2013.6816337"},{"key":"5017_CR27","doi-asserted-by":"crossref","unstructured":"Piatetsky-Shapiro, G., Parker, G.: Lesson: Data Mining, and Knowledge Discovery: An Introduction. Introduction to Data Mining. KD Nuggets (2011)","DOI":"10.1007\/978-3-642-28047-4_13"},{"issue":"6","key":"5017_CR28","doi-asserted-by":"crossref","first-page":"3156","DOI":"10.1016\/j.csda.2006.09.005","volume":"51","author":"DM Cai","year":"2007","unstructured":"Cai, D.M., Gokhale, M., Theiler, J.: Comparison of feature selec- tion and classification algorithms in identifying malicious executables. Comput. Stat. Data Anal. 51(6), 3156\u20133172 (2007)","journal-title":"Comput. Stat. Data Anal."},{"issue":"1","key":"5017_CR29","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/34.824819","volume":"22","author":"AK Jain","year":"2000","unstructured":"Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: a review. IEEE Trans. Pattern Anal. Mach. Intell. 22(1), 4\u201337 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"5017_CR30","first-page":"2010","volume":"9","author":"C Clifton","year":"2010","unstructured":"Clifton, C.: Encyclop\u00e6dia britannica: definition of data mining. Retrieved on 9(12), 2010 (2010)","journal-title":"Retrieved on"},{"key":"5017_CR31","first-page":"335","volume-title":"Data mining concepts and techniques","author":"J Han","year":"2001","unstructured":"Han, J., Kamber, M.: Data mining concepts and techniques, pp. 335\u2013391. Morgan Kaufmann Publishers, San Francisco (2001)"},{"issue":"11","key":"5017_CR32","first-page":"1420","volume":"30","author":"G Zhu-lin","year":"2010","unstructured":"Zhu-lin, G., Ying, C., Yi, S., et al.: Application of data mining in biomedical data analysis. J. Shanghai Jiaotong Univer. (Med. Sci.) 30(11), 1420 (2010)","journal-title":"J. Shanghai Jiaotong Univer. (Med. Sci.)"},{"issue":"4","key":"5017_CR33","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/51.940042","volume":"20","author":"P Bertone","year":"2001","unstructured":"Bertone, P., Gerstein, M.: Integrative data mining: the new direction in bioinformatics. IEEE Eng. Med. Biol. Mag. 20(4), 33\u201340 (2001)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"issue":"9","key":"5017_CR34","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1093\/bioinformatics\/btaa961","volume":"37","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Elsworth, B., Erola, P., Haberland, V., Hemani, G., Lyon, M., Zheng, J., Lloyd, O., Vabistsevits, M., Gaunt, T.R.: Epigraphdb: a database and data mining platform for health data science. Bioinformatics 37(9), 1304\u20131311 (2021)","journal-title":"Bioinformatics"},{"key":"5017_CR35","doi-asserted-by":"crossref","first-page":"100061","DOI":"10.1016\/j.atech.2022.100061","volume":"2","author":"J Gladju","year":"2022","unstructured":"Gladju, J., Kamalam, B.S., Kanagaraj, A.: Applications of data mining and machine learning framework in aquaculture and fisheries: a review. Smart Agric Technol 2, 100061 (2022)","journal-title":"Smart Agric Technol"},{"issue":"1","key":"5017_CR36","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1093\/jamia\/ocab229","volume":"29","author":"H Yang","year":"2022","unstructured":"Yang, H., Tourani, R., Zhu, Y., Kumar, V., Melton, G.B., Steinbach, M., Simon, G.: Strategies for building robust prediction models using data unavailable at prediction time. J. Am. Med. Inform. Assoc. 29(1), 72\u201379 (2022)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"5017_CR37","doi-asserted-by":"crossref","unstructured":"Choi, Y., Kim, T., Choi, S., Lee, C.: Automatic detection for javascript obfuscation attacks in web pages through string pattern anal- ysis. In: International Conference on Future Generation Information Technology, pp. 160\u2013172. Springer (2009)","DOI":"10.1007\/978-3-642-10509-8_19"},{"key":"5017_CR38","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2019.105721","volume":"84","author":"S Ndichu","year":"2019","unstructured":"Ndichu, S., Kim, S., Ozawa, S., Misu, T., Makishima, K.: A machine learning approach to detection of Javascript-based attacks using ast features and paragraph vectors. Appl. Soft Comput. 84, 105721 (2019)","journal-title":"Appl. Soft Comput."},{"key":"5017_CR39","first-page":"27","volume":"2","author":"X-H Li","year":"2007","unstructured":"Li, X.-H., Chen, Q., Liang, Z.-W., et al.: Applying the association rules based data mining technology for the TCM auxiliary diagnosis and treatment. China Dig. Med. 2, 27\u201330 (2007)","journal-title":"China Dig. Med."},{"key":"5017_CR40","doi-asserted-by":"crossref","first-page":"177137","DOI":"10.1109\/ACCESS.2019.2957579","volume":"7","author":"M Ye","year":"2019","unstructured":"Ye, M., Zhang, H., Li, L.: Research on data mining application of orthopedic rehabilitation information for smart medical. IEEE Access 7, 177137\u2013177147 (2019)","journal-title":"IEEE Access"},{"key":"5017_CR41","doi-asserted-by":"crossref","first-page":"107886","DOI":"10.1016\/j.compeleceng.2022.107886","volume":"100","author":"I Batool","year":"2022","unstructured":"Batool, I., Khan, T.A.: Software fault prediction using data mining, machine learning and deep learning techniques: a systematic literature review. Comput. Electr. Eng. 100, 107886 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"5017_CR42","doi-asserted-by":"crossref","first-page":"107392","DOI":"10.1016\/j.infsof.2023.107392","volume":"168","author":"AF Nogueira","year":"2023","unstructured":"Nogueira, A.F., Zenha-Rela, M.: Process mining software engineering practices: a case study for deployment pipelines. Inf. Softw. Technol. 168, 107392 (2023)","journal-title":"Inf. Softw. Technol."},{"issue":"2","key":"5017_CR43","first-page":"18","volume":"2","author":"B Azhagusundari","year":"2013","unstructured":"Azhagusundari, B., Thanamani, A.S., et al.: Feature selection based on information gain. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2(2), 18\u201321 (2013)","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"issue":"12","key":"5017_CR44","first-page":"20","volume":"11","author":"O Elzeki","year":"2019","unstructured":"Elzeki, O., Alrahmawy, M., Elmougy, S.: A new hybrid genetic and information gain algorithm for imputing missing values in can- cer genes datasets. Int. J. Intell. Syst. Appl. 11(12), 20 (2019)","journal-title":"Int. J. Intell. Syst. Appl."},{"key":"5017_CR45","doi-asserted-by":"crossref","unstructured":"Fu, L., Zhang, T., Zhang, H., Li, Z.: A fuzzy classification method based on feature selection algorithm in malicious script code detection. In: 2011 International Conference on System science, Engineering design and Manufacturing informatization, vol. 2, pp. 218\u2013221. IEEE (2011)","DOI":"10.1109\/ICSSEM.2011.6081282"},{"key":"5017_CR46","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Dasgupta, A., Swetapadma, A.: A study on support vector machine based linear and non-linear pattern classification. In: 2019 International Conference on Intelligent Sustainable Systems (ICISS), pp. 24\u201328. IEEE (2019)","DOI":"10.1109\/ISS1.2019.8908018"},{"key":"5017_CR47","doi-asserted-by":"crossref","unstructured":"Rambabu, M., Gupta, S., Singh, R.S.: Data mining in cloud computing: survey. In: Innovations in Computational Intelligence and Computer Vision, pp. 48\u201356. Springer (2021)","DOI":"10.1007\/978-981-15-6067-5_7"},{"key":"5017_CR48","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based un- known malware detection. Inf. Sci. 231, 64\u201382 (2013)","journal-title":"Inf. Sci."},{"key":"5017_CR49","doi-asserted-by":"crossref","unstructured":"Sun, Z., Rao, Z., Chen, J., Xu, R., He, D., Yang, H., Liu, J.: An opcode sequences analysis method for unknown malware detection. In: Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, pp. 15\u201319 (2019)","DOI":"10.1145\/3318236.3318255"},{"issue":"1","key":"5017_CR50","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.asoc.2012.08.034","volume":"13","author":"S Afaneh","year":"2013","unstructured":"Afaneh, S., Zitar, R.A., Al-Hamami, A.: Virus detection using clonal selection algorithm with genetic algorithm (VDC algorithm). Appl. Soft Comput. 13(1), 239\u2013246 (2013)","journal-title":"Appl. Soft Comput."},{"key":"5017_CR51","doi-asserted-by":"crossref","unstructured":"Moskovitch, R., Feher, C., Tzachar, N., Berger, E., Gitelman, M., Dolev, S., Elovici, Y.: Unknown malcode detection using opcode representation. In: European Conference on Intelligence and Security Informatics, pp. 204\u2013215. Springer (2008)","DOI":"10.1007\/978-3-540-89900-6_21"},{"key":"5017_CR52","doi-asserted-by":"crossref","first-page":"103651","DOI":"10.1016\/j.cose.2023.103651","volume":"137","author":"H Yang","year":"2023","unstructured":"Yang, H., Wang, Y., Zhang, L., Cheng, X., Hu, Z.: A novel android malware detection method with API semantics extraction. Comput. Secur. 137, 103651 (2023)","journal-title":"Comput. Secur."},{"key":"5017_CR53","doi-asserted-by":"crossref","unstructured":"Dudeja, H., Modi, C.: Runtime program semantics based malware detection in virtual machines of cloud computing. In: International Conference on Information Processing, pp. 3\u201316. Springer (2021)","DOI":"10.1007\/978-3-030-91244-4_1"},{"issue":"1","key":"5017_CR54","first-page":"110","volume":"31","author":"L Jun-Qiang","year":"2004","unstructured":"Jun-Qiang, L., Xiao-Ying, S., Yun-He, P.: Survey on association rules mining technology. Comput. Sci. 31(1), 110\u2013113 (2004)","journal-title":"Comput. Sci."},{"issue":"2","key":"5017_CR55","first-page":"274","volume":"2","author":"V Khanduja","year":"2012","unstructured":"Khanduja, V., Verma, O.: Identification and proof of ownership by watermarkingrelational databases. Int. J. Inf. Electron. Eng. 2(2), 274 (2012)","journal-title":"Int. J. Inf. Electron. Eng."},{"key":"5017_CR56","unstructured":"Baesens, B.: Analytics in a Big Data World: the Essential Guide to Data Science and its Applications. Wiley (2014)"},{"key":"5017_CR57","first-page":"59","volume":"6","author":"DS Deshpande","year":"2014","unstructured":"Deshpande, D.S.: A novel approach for association rule mining using pattern generation. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 6, 59\u201365 (2014)","journal-title":"Int. J. Inf. Technol. Comput. Sci. (IJITCS)"},{"key":"5017_CR58","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.procs.2016.04.016","volume":"82","author":"S Perveen","year":"2016","unstructured":"Perveen, S., Shahbaz, M., Guergachi, A., Keshavjee, K.: Performance analysis of data mining classification techniques to predict diabetes. Procedia Comput. Sci. 82, 115\u2013121 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"5017_CR59","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.neucom.2016.10.077","volume":"250","author":"RA Becerra-Garc\u00eda","year":"2017","unstructured":"Becerra-Garc\u00eda, R.A., Garc\u00eda-Berm\u00fadez, R.V., Joya-Caparr\u00f3s, G., Fern\u00e1ndez-Higuera, A., Vel\u00e1zquez-Rodr\u00edguez, C., Vel\u00e1zquez-Mari\u00f1o, M., Cuevas-Beltr\u00e1n, F.R., Garc\u00eda-Lagos, F., Rodr\u00e1guez-Labrada, R.: Data mining process for identification of non-spontaneous saccadic movements in clinical electrooculography. Neurocomputing 250, 28\u201336 (2017)","journal-title":"Neurocomputing"},{"key":"5017_CR60","doi-asserted-by":"crossref","unstructured":"Menhour, I., Fergani, B., et al.: A new framework using pca, LDA and KNN-SVM to activity recognition based smartphone\u2019s sensors. In: 2018 6th International Conference on Multimedia Computing and Systems (ICMCS) , pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/ICMCS.2018.8525987"},{"issue":"4","key":"5017_CR61","first-page":"467","volume":"18","author":"PF Brown","year":"1992","unstructured":"Brown, P.F., DellaPietra, V.J., Desouza, P.V., Lai, J.C., Mercer, R.L.: Class-based n-gram models of natural language. Comput. Linguist. 18(4), 467\u2013480 (1992)","journal-title":"Comput. Linguist."},{"issue":"4","key":"5017_CR62","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"FA Gonz\u00e1lez","year":"2003","unstructured":"Gonz\u00e1lez, F.A., Dasgupta, D.: Anomaly detection using real-valued negative selection. Genet. Program. Evolv. Mach. 4(4), 383\u2013403 (2003)","journal-title":"Genet. Program. Evolv. Mach."},{"issue":"12","key":"5017_CR63","first-page":"2721","volume":"7","author":"JZ Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7(12), 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"5017_CR64","unstructured":"Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N. and Duncan, R.: Negative selection: How to generate detectors. In: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), vol. 1, pp. 89\u201398. University of Kent at Canterbury Printing Unit University of Kent at Canterbury (2002)"},{"issue":"1","key":"5017_CR65","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1111\/jebm.12373","volume":"13","author":"J Yang","year":"2020","unstructured":"Yang, J., Li, Y., Liu, Q., Li, L., Feng, A., Wang, T., Zheng, S., Xu, A., Lyu, J.: Brief introduction of medical database and data mining technology in big data era. J. Evid. Based Med. 13(1), 57\u201369 (2020)","journal-title":"J. Evid. Based Med."},{"issue":"1","key":"5017_CR66","first-page":"1","volume":"3","author":"AJ Hamid","year":"2016","unstructured":"Hamid, A.J., Ahmed, T.M.: Developing prediction model of loan risk in banks using data mining. Mach. Learn. Appl.: Int. J. 3(1), 1\u20139 (2016)","journal-title":"Mach. Learn. Appl.: Int. J."},{"key":"5017_CR67","doi-asserted-by":"crossref","unstructured":"Zhang, B., Yin, J., Hao, J., Zhang, D., Wang, S.: Malicious codes detection based on ensemble learning. In: International Conference on Autonomic and Trusted Computing, pp. 468\u2013477. Springer (2007)","DOI":"10.1007\/978-3-540-73547-2_48"},{"key":"5017_CR68","doi-asserted-by":"crossref","unstructured":"H. I. Bulbul and O\u00a8 . Unsal, \u201cComparison of classification techniques used in machine learning as applied on vocational guidance data,\u201d in 2011 10th International Conference on Machine Learning and Applications and Workshops, vol. 2. IEEE, 2011, pp. 298\u2013301.","DOI":"10.1109\/ICMLA.2011.49"},{"issue":"14","key":"5017_CR69","doi-asserted-by":"crossref","first-page":"1941","DOI":"10.1016\/j.patrec.2008.06.016","volume":"29","author":"R Perdisci","year":"2008","unstructured":"Perdisci, R., Lanzi, A., Lee, W.: Classification of packed executables for accurate computer virus detection. Pattern Recogn. Lett. 29(14), 1941\u20131946 (2008)","journal-title":"Pattern Recogn. Lett."},{"key":"5017_CR70","doi-asserted-by":"crossref","unstructured":"Huoming, Z., Lixing, S.: Research on k nearest neighbor identification of hand-drawn circuit diagram. In: Journal of Physics: Conference Series, vol. 1325, no. 1, p. 012233. IOP Publishing (2019)","DOI":"10.1088\/1742-6596\/1325\/1\/012233"},{"issue":"11","key":"5017_CR71","first-page":"3256","volume":"25","author":"Q Guo","year":"2008","unstructured":"Guo, Q., Li, Y., Tang, Q.: Research on text similarity calculation based on VSM. J. Comput. Appl. 25(11), 3256\u20133258 (2008)","journal-title":"J. Comput. Appl."},{"key":"5017_CR72","doi-asserted-by":"crossref","unstructured":"Deng, H., Runger, G., Tuv, E.: Bias of importance measures for multi-valued attributes and solutions. In: International Conference on Artificial Neural Networks, pp. 293\u2013300. Springer (2011)","DOI":"10.1007\/978-3-642-21738-8_38"},{"key":"5017_CR73","unstructured":"Quinlan, J.R.: Data mining tools see5 and c5.0 (2004). http:\/\/www.rulequest.com\/see5-info.html"},{"key":"5017_CR74","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.fss.2018.11.006","volume":"366","author":"A Trabelsi","year":"2019","unstructured":"Trabelsi, A., Elouedi, Z., Lefevre, E.: Decision tree classifiers for evidential attribute values and class labels. Fuzzy Sets Syst. 366, 46\u201362 (2019)","journal-title":"Fuzzy Sets Syst."},{"issue":"3","key":"5017_CR75","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.bbe.2019.05.001","volume":"39","author":"KA Dauda","year":"2019","unstructured":"Dauda, K.A., Pradhan, B., Shankar, B.U., Mitra, S.: Decision tree for modeling survival data with competing risks. Biocybern. Biomed. Eng. 39(3), 697\u2013708 (2019)","journal-title":"Biocybern. Biomed. Eng."},{"key":"5017_CR76","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.fss.2018.02.006","volume":"366","author":"NB Amor","year":"2019","unstructured":"Amor, N.B., El Khalfi, Z., Fargier, H., Sabbadin, R.: Lexicographic refinements in possibilistic decision trees and finite-horizon Markov decision processes. Fuzzy Sets Syst. 366, 85\u2013109 (2019)","journal-title":"Fuzzy Sets Syst."},{"key":"5017_CR77","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1016\/j.procs.2019.01.172","volume":"149","author":"RM Aguilar-Chinea","year":"2019","unstructured":"Aguilar-Chinea, R.M., Rodriguez, I.C., Exposito, C., Melian-Batista, B., Moreno-Vega, J.M.: Using a decision tree algorithm to predict the robustness of a transshipment schedule. Procedia Comput. Sci. 149, 529\u2013536 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"5017_CR78","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.promfg.2017.07.092","volume":"10","author":"F Ahmed","year":"2017","unstructured":"Ahmed, F., Kim, K.-Y.: Data-driven weld nugget width prediction with decision tree algorithm. Procedia Manuf. 10, 1009\u20131019 (2017)","journal-title":"Procedia Manuf."},{"key":"5017_CR79","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.trc.2017.01.009","volume":"77","author":"CS Pitombo","year":"2017","unstructured":"Pitombo, C.S., de Souza, A.D., Lindner, A.: Comparing decision tree algorithms to estimate intercity trip distribution. Transp. Res. Part C: Emerging Technol. 77, 16\u201332 (2017)","journal-title":"Transp. Res. Part C: Emerging Technol."},{"key":"5017_CR80","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.procs.2017.11.351","volume":"122","author":"X Liu","year":"2017","unstructured":"Liu, X., Li, B., Shen, D., Cao, J., Mao, B.: Analysis of grain storage loss based on decision tree algorithm. Procedia Comput. Sci. 122, 130\u2013137 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"5017_CR81","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.proenv.2015.03.016","volume":"24","author":"ID Nurpratami","year":"2015","unstructured":"Nurpratami, I.D., Sitanggang, I.S.: Classification rules for hotspot occurrences using spatial entropy-based decision tree algorithm. Procedia Environ. Sci. 24, 120\u2013126 (2015)","journal-title":"Procedia Environ. Sci."},{"key":"5017_CR82","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.knosys.2015.08.012","volume":"88","author":"X Li","year":"2015","unstructured":"Li, X., Zhao, H., Zhu, W.: A cost sensitive decision tree algorithm with two adaptive mechanisms. Knowl.-Based Syst. 88, 24\u201333 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"5017_CR83","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.knosys.2019.01.016","volume":"167","author":"J Gou","year":"2019","unstructured":"Gou, J., Qiu, W., Yi, Z., Shen, X., Zhan, Y., Ou, W.: Locality constrained representation-based k-nearest neighbor classification. Knowl.-Based Syst. 167, 38\u201352 (2019)","journal-title":"Knowl.-Based Syst."},{"key":"5017_CR84","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.patcog.2018.08.003","volume":"85","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Cao, G., Wang, B., Li, X.: A novel ensemble method for k-nearest neighbor. Pattern Recogn. 85, 13\u201325 (2019)","journal-title":"Pattern Recogn."},{"key":"5017_CR85","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.engappai.2018.03.014","volume":"72","author":"J Lu","year":"2018","unstructured":"Lu, J., Zhu, Q., Wu, Q.: A novel data clustering algorithm using heuristic rules based on k-nearest neighbors chain. Eng. Appl. Artif. Intell. 72, 213\u2013227 (2018)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"2","key":"5017_CR86","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.icte.2018.04.004","volume":"4","author":"J Oh","year":"2018","unstructured":"Oh, J., Kim, J.: Adaptive k-nearest neighbour algorithm for wifi fingerprint positioning. Ict Express 4(2), 91\u201394 (2018)","journal-title":"Ict Express"},{"key":"5017_CR87","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.patrec.2018.05.001","volume":"134","author":"Z Abu-Aisheh","year":"2020","unstructured":"Abu-Aisheh, Z., Raveaux, R., Ramel, J.-Y.: Efficient k-nearest neighbors search in graph space. Pattern Recogn. Lett. 134, 77\u201386 (2020)","journal-title":"Pattern Recogn. Lett."},{"key":"5017_CR88","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.compeleceng.2018.05.024","volume":"69","author":"A Swetapadma","year":"2018","unstructured":"Swetapadma, A., Yadav, A.: A novel single-ended fault location scheme for parallel transmission lines using k-nearest neighbor algorithm. Comput. Electr. Eng. 69, 41\u201353 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"5017_CR89","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.asoc.2017.02.020","volume":"55","author":"\u00d6F Ertu\u011frul","year":"2017","unstructured":"Ertu\u011frul, \u00d6.F., Ta\u011fluk, M.E.: A novel version of k nearest neighbor: dependent nearest neighbor. Appl. Soft Comput. 55, 480\u2013490 (2017)","journal-title":"Appl. Soft Comput."},{"key":"5017_CR90","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.aei.2017.05.003","volume":"33","author":"M Huang","year":"2017","unstructured":"Huang, M., Lin, R., Huang, S., Xing, T.: A novel approach for precipitation forecast via improved k-nearest neighbor algorithm. Adv. Eng. Inform. 33, 89\u201395 (2017)","journal-title":"Adv. Eng. Inform."},{"key":"5017_CR91","first-page":"41","volume":"69","author":"Hari Mohan Rai","year":"2015","unstructured":"Rai, H. M., Yoo, J., Razaque, A: Comparative analysis of machine learning and deep learning models for improved cancer detection: A comprehensive review of recent advancements in diagnostic techniques. Expert Systems with Applications, 2024, 124838.","journal-title":"Knowl.-Based Syst."},{"key":"5017_CR92","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.future.2019.02.006","volume":"96","author":"Z Kastrati","year":"2019","unstructured":"Kastrati, Z., Imran, A.S.: Performance analysis of machine learning classifiers on improved concept vector space models. Futur. Gener. Comput. Syst. 96, 552\u2013562 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"5017_CR93","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.ipm.2017.10.003","volume":"54","author":"FS Al-Anzi","year":"2018","unstructured":"Al-Anzi, F.S., AbuZeina, D.: Beyond vector space model for hierarchical Arabic text classification: a Markov chain approach. Inf. Process. Manage. 54(1), 105\u2013115 (2018)","journal-title":"Inf. Process. Manage."},{"key":"5017_CR94","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.specom.2015.01.004","volume":"68","author":"NG Ward","year":"2015","unstructured":"Ward, N.G., Werner, S.D., Garcia, F., Sanchis, E.: A prosody- based vector-space model of dialog activity for information retrieval. Speech Commun. 68, 85\u201396 (2015)","journal-title":"Speech Commun."},{"issue":"5","key":"5017_CR95","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1016\/j.jbi.2013.07.006","volume":"46","author":"M Kwak","year":"2013","unstructured":"Kwak, M., Leroy, G., Martinez, J.D., Harwell, J.: Development and evaluation of a biomedical search engine using a predicate-based vector space model. J. Biomed. Inform. 46(5), 929\u2013939 (2013)","journal-title":"J. Biomed. Inform."},{"issue":"3","key":"5017_CR96","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1016\/j.cad.2012.10.005","volume":"45","author":"K-M Hu","year":"2013","unstructured":"Hu, K.-M., Wang, B., Yong, J.-H., Paul, J.-C.: Relaxed lightweight assembly retrieval using vector space model. Comput. Aided Des. 45(3), 739\u2013750 (2013)","journal-title":"Comput. Aided Des."},{"key":"5017_CR97","unstructured":"Chun-mei, X.: Application of data mining technology in loan risk management. Mod. Electron. Tech. 04 (2014)"},{"issue":"2","key":"5017_CR98","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1007\/s11277-017-5224-x","volume":"102","author":"Y-C Wu","year":"2018","unstructured":"Wu, Y.-C., Feng, J.-W.: Development and application of artificial neural network. Wirel. Pers. Commun. 102(2), 1645\u20131656 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"5017_CR99","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.asoc.2015.06.005","volume":"35","author":"LA Laboissiere","year":"2015","unstructured":"Laboissiere, L.A., Fernandes, R.A., Lage, G.G.: Maximum and minimum stock price forecasting of Brazilian power distribution companies based on artificial neural networks. Appl. Soft Comput. 35, 66\u201374 (2015)","journal-title":"Appl. Soft Comput."},{"key":"5017_CR100","doi-asserted-by":"crossref","unstructured":"Wang, D., Zhang, J., Cao, W., Li, J., Zheng, Y.: When will you arrive? Estimating travel time based on deep neural networks. In: 32nd AAAI Conference on Artificial Intelligence (2018)","DOI":"10.1609\/aaai.v32i1.11877"},{"issue":"2","key":"5017_CR101","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/s11036-017-0932-8","volume":"23","author":"H Lu","year":"2018","unstructured":"Lu, H., Li, Y., Chen, M., Kim, H., Serikawa, S.: Brain intelligence: go beyond artificial intelligence. Mob. Netw. Appl. 23(2), 368\u2013375 (2018)","journal-title":"Mob. Netw. Appl."},{"issue":"33","key":"5017_CR102","doi-asserted-by":"crossref","first-page":"7255","DOI":"10.1523\/JNEUROSCI.0388-18.2018","volume":"38","author":"R Rajalingham","year":"2018","unstructured":"Rajalingham, R., Issa, E.B., Bashivan, P., Kar, K., Schmidt, K., DiCarlo, J.J.: Large-scale, high-resolution comparison of the core visual object recognition behavior of humans, monkeys, and state-of-the-art deep artificial neural networks. J. Neurosci. 38(33), 7255\u20137269 (2018)","journal-title":"J. Neurosci."},{"issue":"3","key":"5017_CR103","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/s10346-015-0587-0","volume":"13","author":"PV Gorsevski","year":"2016","unstructured":"Gorsevski, P.V., Brown, M.K., Panter, K., Onasch, C.M., Simic, A., Snyder, J.: Landslide detection and susceptibility mapping using lidar and an artificial neural network approach: a case study in the Cuyahoga Valley National Park, Ohio. Landslides 13(3), 467\u2013484 (2016)","journal-title":"Landslides"},{"issue":"1\u20132","key":"5017_CR104","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00704-015-1702-9","volume":"128","author":"BT Pham","year":"2017","unstructured":"Pham, B.T., Bui, D.T., Pourghasemi, H.R., Indra, P., Dholakia, M.: Landslide susceptibility assesssment in the Uttarakhand area (India) using GIS: a comparison study of prediction capability of Na\u0131ve Bayes, multilayer perceptron neural networks, and functional trees methods. Theoret. Appl. Climatol. 128(1\u20132), 255\u2013273 (2017)","journal-title":"Theoret. Appl. Climatol."},{"key":"5017_CR105","first-page":"55","volume":"121","author":"NS El Jerjawi","year":"2018","unstructured":"El Jerjawi, N.S., Abu-Naser, S.S.: Diabetes prediction using artificial neural network. Int. J. Adv. Sci. Technol. 121, 55\u201364 (2018)","journal-title":"Int. J. Adv. Sci. Technol."},{"issue":"3","key":"5017_CR106","first-page":"17","volume":"3","author":"IM Nasser","year":"2019","unstructured":"Nasser, I.M., Abu-Naser, S.S.: Lung cancer detection using artificial neural network. Int. J. Eng. Inf. Syst. (IJEAIS) 3(3), 17\u201323 (2019)","journal-title":"Int. J. Eng. Inf. Syst. (IJEAIS)"},{"issue":"5","key":"5017_CR107","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1007\/s00521-015-2121-7","volume":"28","author":"G Asencio-Cortes","year":"2017","unstructured":"Asencio-Cortes, G., Martinez-Alvarez, F., Troncoso, A., Morales-Esteban, A.: Medium\u2013large earthquake magnitude prediction in tokyo with artificial neural networks. Neural Comput. Appl. 28(5), 1043\u20131055 (2017)","journal-title":"Neural Comput. Appl."},{"key":"5017_CR108","doi-asserted-by":"crossref","unstructured":"Carneiro, E.M., Dias, L.A.V., Da Cunha, A.M., Mialaret, L.F.S.: Cluster analysis and artificial neural networks: a case study in credit card fraud detection. In: 2015 12th International Conference on Information Technology-New Generations, pp. 122\u2013126. IEEE (2015)","DOI":"10.1109\/ITNG.2015.25"},{"issue":"2","key":"5017_CR109","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1007\/s10462-017-9611-1","volume":"52","author":"J Nalepa","year":"2019","unstructured":"Nalepa, J., Kawulok, M.: Selecting training sets for support vector machines: a review. Artif. Intell. Rev. 52(2), 857\u2013900 (2019)","journal-title":"Artif. Intell. Rev."},{"key":"5017_CR110","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cherd.2019.06.034","volume":"149","author":"S Herceg","year":"2019","unstructured":"Herceg, S., Andriji\u0107, \u017dU., Bolf, N.: Development of soft sensors for isomerization process based on support vector machine regression and dynamic polynomial models. Chem. Eng. Res. Des. 149, 95\u2013103 (2019)","journal-title":"Chem. Eng. Res. Des."},{"issue":"17","key":"5017_CR111","first-page":"201","volume":"38","author":"Z Cheng","year":"2012","unstructured":"Cheng, Z., Qing, L., Fujun, L.: Improved VSM algorithm and its application in FAQ. Comput. Eng. 38(17), 201\u2013204 (2012)","journal-title":"Comput. Eng."},{"issue":"12","key":"5017_CR112","first-page":"72","volume":"7","author":"EO Olaniyi","year":"2015","unstructured":"Olaniyi, E.O., Oyedotun, O.K., Adnan, K.: Heart diseases diagnosis using neural networks arbitration. Int. J. Intell. Syst. Appl. 7(12), 72 (2015)","journal-title":"Int. J. Intell. Syst. Appl."},{"issue":"2","key":"5017_CR113","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1016\/j.eswa.2014.08.029","volume":"42","author":"T Harris","year":"2015","unstructured":"Harris, T.: Credit scoring using the clustered support vector machine. Expert Syst. Appl. 42(2), 741\u2013750 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"5017_CR114","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/j.ejor.2017.12.001","volume":"267","author":"H Wang","year":"2018","unstructured":"Wang, H., Zheng, B., Yoon, S.W., Ko, H.S.: A support vector machine-based ensemble algorithm for breast cancer diagnosis. Eur. J. Oper. Res. 267(2), 687\u2013699 (2018)","journal-title":"Eur. J. Oper. Res."},{"key":"5017_CR115","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.protcy.2016.03.039","volume":"23","author":"KS Parikh","year":"2016","unstructured":"Parikh, K.S., Shah, T.P.: Support vector machine\u2013a large margin classifier to diagnose skin illnesses. Procedia Technol. 23, 369\u2013375 (2016)","journal-title":"Procedia Technol."},{"key":"5017_CR116","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.enconman.2016.03.082","volume":"118","author":"S Belaid","year":"2016","unstructured":"Belaid, S., Mellit, A.: Prediction of daily and mean monthly global solar radiation using support vector machine in an arid climate. Energy Convers. Manage. 118, 105\u2013118 (2016)","journal-title":"Energy Convers. Manage."},{"key":"5017_CR117","doi-asserted-by":"crossref","unstructured":"Tuba, E., Stanimirovic, Z.: Elephant herding optimization algorithm for support vector machine parameters tuning. In: 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/ECAI.2017.8166464"},{"issue":"4","key":"5017_CR118","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s00477-015-1021-9","volume":"29","author":"MS Tehrany","year":"2015","unstructured":"Tehrany, M.S., Pradhan, B., Jebur, M.N.: Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method. Stoch. Env. Res. Risk Assess. 29(4), 1149\u20131165 (2015)","journal-title":"Stoch. Env. Res. Risk Assess."},{"key":"5017_CR119","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.neucom.2016.11.006","volume":"225","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Ding, S., Xue, Y.: An improved multiple birth support vector machine for pattern classification. Neurocomputing 225, 119\u2013128 (2017)","journal-title":"Neurocomputing"},{"key":"5017_CR120","doi-asserted-by":"crossref","unstructured":"Sridhar, K., Parthasarathy, S., Busso, C.: Role of Regularization in the Prediction of Valence from Speech, vol. 2018. Interspeech (2018)","DOI":"10.21437\/Interspeech.2018-2508"},{"key":"5017_CR121","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.sysconle.2015.10.003","volume":"86","author":"T Berger","year":"2015","unstructured":"Berger, T., Van Dooren, P.: Computing the regularization of a linear differential\u2013algebraic system. Syst. Control Lett. 86, 48\u201353 (2015)","journal-title":"Syst. Control Lett."},{"key":"5017_CR122","doi-asserted-by":"crossref","unstructured":"Guo, Y., Ding, G., Jin, X., Wang, J.: Learning predictable and discriminative attributes for visual recognition. In: 29th AAAI Conference on Artificial Intelligence (2015)","DOI":"10.1609\/aaai.v29i1.9792"},{"key":"5017_CR123","doi-asserted-by":"crossref","unstructured":"Wu, F., Shu, J., Huang, Y., Yuan, Z.: Social spammer and spam message co-detection in microblogging with social context regularization. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 1601\u20131610 (2015)","DOI":"10.1145\/2806416.2806560"},{"issue":"3","key":"5017_CR124","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.patcog.2009.09.003","volume":"43","author":"MH Nguyen","year":"2010","unstructured":"Nguyen, M.H., De la Torre, F.: Optimal feature selection for support vector machines. Pattern Recogn. 43(3), 584\u2013591 (2010)","journal-title":"Pattern Recogn."},{"key":"5017_CR125","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wang, K., Cai, L., Li, J.: Intelligent grouping algorithms for regular expressions in deep inspection. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/ICCCN.2014.6911804"},{"key":"5017_CR126","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.procs.2018.01.119","volume":"127","author":"A Allag","year":"2018","unstructured":"Allag, A., Drai, R., Benammar, A., Boutkedjirt, T.: X-rays tomographic reconstruction images using proximal methods based on l1 norm and tv regularization. Procedia Comput. Sci. 127, 236\u2013245 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"5017_CR127","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.compbiolchem.2016.09.014","volume":"65","author":"Y-X Wang","year":"2016","unstructured":"Wang, Y.-X., Liu, J.-X., Gao, Y.-L., Zheng, C.-H., Shang, J.-L.: Differentially expressed genes selection via Laplacian regularized low-rank representation method. Comput. Biol. Chem. 65, 185\u2013192 (2016)","journal-title":"Comput. Biol. Chem."},{"issue":"1","key":"5017_CR128","doi-asserted-by":"crossref","first-page":"27","DOI":"10.4208\/cicp.OA-2017-0109","volume":"24","author":"C Brito-Loeza","year":"2018","unstructured":"Brito-Loeza, C., Legarda-S\u00e1enz, R., Espinosa-Romero, A., Martin-Gonzalez, A.: A mean curvature regularized based model for demodulating phase maps from fringe patterns. Commun. Comput. Phys. 24(1), 27\u201343 (2018)","journal-title":"Commun. Comput. Phys."},{"key":"5017_CR129","doi-asserted-by":"crossref","unstructured":"Ardehaly, E.M., Culotta, A.: Inferring latent attributes of twitter users with label regularization. In: Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 185\u2013195 (2015)","DOI":"10.3115\/v1\/N15-1019"},{"key":"5017_CR130","doi-asserted-by":"crossref","unstructured":"Ardehaly, E.M. and Culotta, A.: Inferring latent attributes of Twitter users with label regularization. In: Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 185\u2013195 (2015)","DOI":"10.3115\/v1\/N15-1019"},{"key":"5017_CR131","doi-asserted-by":"crossref","unstructured":"Guo, Y., Bartlett, P.L., Shawe-Taylor, J., Williamson, R.C.: Covering numbers for support vector machines. In: Proceedings of the 12th Annual Conference on Computational Learning Theory, pp. 267\u2013277 (1999)","DOI":"10.1145\/307400.307467"},{"key":"5017_CR132","doi-asserted-by":"crossref","unstructured":"T. Calinski and J. Harabasz, \u201cA, dendrite method for cluster analysis, communications in statistics-theory and methods,\u201d 1974.","DOI":"10.1080\/03610927408827101"},{"issue":"9","key":"5017_CR133","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026\u20131037 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"5017_CR134","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/s13278-017-0426-5","volume":"7","author":"A Kuhnle","year":"2017","unstructured":"Kuhnle, A., Nguyen, N.P., Dinh, T.N., Thai, M.T.: Vulnerability of clustering under node failure in complex networks. Soc. Netw. Anal. Min. 7(1), 8 (2017)","journal-title":"Soc. Netw. Anal. Min."},{"key":"5017_CR135","unstructured":"Kobielus, J.: The Forrester Wave: Predictive Analytics and Data Mining Solutions, q1 2010. Forrester Research, Inc (2010)"},{"key":"5017_CR136","doi-asserted-by":"crossref","unstructured":"Kireev, V.S., Bochkaryov, P.V., Guseva, A.I., Kuznetsov, I.A., Filippov, S.A.: Monitoring system for the housing and utility services based on the digital technologies iiot, big data, data mining, edge and cloud computing. In: International Conference on Big Data Innovations and Applications, pp. 193\u2013205. Springer (2019)","DOI":"10.1007\/978-3-030-27355-2_15"},{"key":"5017_CR137","unstructured":"J. Galloway and S. J. Simoff, \u201cNetwork data mining: methods and techniques for discovering deep linkage between attributes,\u201d in Asia- Pacific Conference on Conceptual Modelling. ACS, 2006."},{"key":"5017_CR138","doi-asserted-by":"crossref","unstructured":"Sinha, A., Shen, Z., Song, Y., Ma, H., Eide, D., Hsu, B.J., Wang, K.: An overview of microsoft academic service (mas) and applications. In: Proceedings of the 24th International Conference on World Wide Web, pp. 243\u2013246 (2015)","DOI":"10.1145\/2740908.2742839"},{"key":"5017_CR139","unstructured":"Rexer, K., Allen, H., Gearan, P.: Understanding data miners (2011)"},{"issue":"CSCW1","key":"5017_CR140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3392859","volume":"4","author":"J Middleton","year":"2020","unstructured":"Middleton, J., Murphy-Hill, E., Stolee, K.T.: Data analysts and their software practices: a profile of the sabermetrics community and beyond. Proc. ACM Hum.-Comput. Interact. 4(CSCW1), 1\u201327 (2020)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"5017_CR141","doi-asserted-by":"crossref","unstructured":"Abdelsalam, M., Gupta, M., Mittal, S.: Artificial intelligence assisted malware analysis. In: Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, pp. 75\u201377 (2021)","DOI":"10.1145\/3445969.3450433"},{"key":"5017_CR142","doi-asserted-by":"crossref","unstructured":"Noh, J., Lee, S., Kim, B., Kim, G.: Improving occlusion and hard negative handling for single-stage pedestrian detectors. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 966\u2013974 (2018)","DOI":"10.1109\/CVPR.2018.00107"},{"key":"5017_CR143","doi-asserted-by":"crossref","first-page":"110166","DOI":"10.1016\/j.patcog.2023.110166","volume":"148","author":"R Davashi","year":"2024","unstructured":"Davashi, R.: IME: Efficient list-based method for incremental mining of maximal erasable patterns. Pattern Recogn. 148, 110166 (2024)","journal-title":"Pattern Recogn."},{"key":"5017_CR144","doi-asserted-by":"crossref","unstructured":"Sami, A., Yadegari, B., Rahimi, H., Peiravian, N., Hashemi, S., Hamze, A.: Malware detection based on mining api calls. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1020\u20131025 (2010)","DOI":"10.1145\/1774088.1774303"},{"key":"5017_CR145","doi-asserted-by":"crossref","first-page":"21235","DOI":"10.1109\/ACCESS.2019.2896003","volume":"7","author":"Z Ma","year":"2019","unstructured":"Ma, Z., Ge, H., Liu, Y., Zhao, M., Ma, J.: A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7, 21235\u201321245 (2019)","journal-title":"IEEE Access"},{"key":"5017_CR146","volume":"657","author":"H Kim","year":"2024","unstructured":"Kim, H., Kim, H., Cho, M., Vo, B., Lin, J.-W., Fujita, H., Yun, U.: Efficient approach of high average utility pattern mining with indexed list-based structure in dynamic environments. Inf. Sci. 657, 119924 (2024)","journal-title":"Inf. Sci."},{"key":"5017_CR147","doi-asserted-by":"crossref","unstructured":"Hsiao, H.-W., Chen, D.-N., Wu, T.J.: Detecting hiding malicious website using network traffic mining approach. In: 2010 2nd International Conference on Education Technology and Computer, vol. 5, pp. V5-276. IEEE (2010)","DOI":"10.1109\/ICETC.2010.5530064"},{"key":"5017_CR148","doi-asserted-by":"crossref","unstructured":"Nowakowski, P., Z\u00f3rawski, P., Cabaj, K., Mazurczyk, W,: Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2020)","DOI":"10.1145\/3407023.3409217"},{"key":"5017_CR149","doi-asserted-by":"crossref","unstructured":"Li, X., Qiu, K., Qian, C., Zhao, G.: An adversarial machine learning method based on opcode n-grams feature in malware detection. In: 2020 IEEE 5th International Conference on Data Science in Cyberspace (DSC) , pp. 380\u2013387. IEEE (2020)","DOI":"10.1109\/DSC50466.2020.00066"},{"key":"5017_CR150","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.107111","volume":"126","author":"T Tran","year":"2023","unstructured":"Tran, T., Duong, H., Truong, T., Le, B.: Efficient mining of concise and informative representations of frequent high utility itemsets. Eng. Appl. Artif. Intell. 126, 107111 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"5017_CR151","first-page":"1","volume":"78","author":"S Li","year":"2021","unstructured":"Li, S., Zhou, Q., Zhou, R., Lv, Q.: Intelligent malware detection based on graph convolutional network. J. Supercomput. 78(3), 1\u201317 (2021)","journal-title":"J. Supercomput."},{"issue":"4","key":"5017_CR152","doi-asserted-by":"crossref","first-page":"225","DOI":"10.53106\/199115992021083204018","volume":"32","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., Zhang, Z., Li, W., Zhou, H., Shen, B.: Design of malicious code detection system based on binary code slicing. J. Comput. 32(4), 225\u2013238 (2021)","journal-title":"J. Comput."},{"key":"5017_CR153","doi-asserted-by":"crossref","unstructured":"Karampatsis, R.M., Babii, H., Robbes, R., Sutton, C., Janes, A.: Big code!= big vocabulary: Open-vocabulary models for source code. In: 2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE) , pp. 1073\u20131085. IEEE (2020)","DOI":"10.1145\/3377811.3380342"},{"key":"5017_CR154","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.cose.2013.08.008","volume":"39","author":"Y Ding","year":"2013","unstructured":"Ding, Y., Yuan, X., Tang, K., Xiao, X., Zhang, Y.: A fast malware detection algorithm based on objective-oriented association mining. Comput. Secur. 39, 315\u2013324 (2013)","journal-title":"Comput. Secur."},{"key":"5017_CR155","unstructured":"Huaman, N., von Skarczinski, B., Stransky, C., Wermke, D., Acar, Y., Drei\u00dfigacker, A., Fahl, S.: A large-scale interview study on information security in and attacks against small and medium-sized enterprises. In: 30th {USENIX} Security Symposium ({USENIX} Security 21) (2021)"},{"key":"5017_CR156","doi-asserted-by":"crossref","unstructured":"Pakoci, E., Popovi\u0107, B.: Methods for using class based n-gram language models in the kaldi toolkit. In: International Conference on Speech and Computer, pp. 492\u2013503. Springer (2021)","DOI":"10.1007\/978-3-030-87802-3_45"},{"key":"5017_CR157","doi-asserted-by":"crossref","unstructured":"Hagen, M., Arora, P., Ghosh, R., Thomas, D., Joshi, S.R.: Class- based order-independent models of natural language for bayesian auto-complete inference. In: The 1st International Conference on AI-ML-Systems, pp. 1\u20137 (2021)","DOI":"10.1145\/3486001.3486240"},{"key":"5017_CR158","doi-asserted-by":"crossref","unstructured":"Kesheng, L., Yikun, N., Zihan, L., Bin, D.: Data mining and feature analysis of college students\u2019 campus network behavior. In: 2020 5th IEEE International Conference on Big Data Analytics (ICBDA), pp. 231\u2013237. IEEE (2020)","DOI":"10.1109\/ICBDA49040.2020.9101257"},{"key":"5017_CR159","unstructured":"Pechenizkiy, M., Trcka, N., De Bra, P., Toledo, P.: Currim: curriculum mining. In: Educational Data Mining, vol. 2012 (2012)"},{"issue":"1","key":"5017_CR160","first-page":"1","volume":"19","author":"M Katsurai","year":"2021","unstructured":"Katsurai, M., Joo, S.: Adoption of data mining methods in the discipline of library and information science. J. Libr. Inf. Stud. 19(1), 1\u201317 (2021)","journal-title":"J. Libr. Inf. Stud."},{"key":"5017_CR161","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2020.104079","volume":"97","author":"Z Sadeghian","year":"2021","unstructured":"Sadeghian, Z., Akbari, E., Nematzadeh, H.: A hybrid feature selection method based on information theory and binary butterfly optimization algorithm. Eng. Appl. Artif. Intell. 97, 104079 (2021)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"5017_CR162","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/10888438.2021.1920951","volume":"26","author":"R Treiman","year":"2021","unstructured":"Treiman, R., Kessler, B.: Statistical learning in word reading and spelling across languages and writing systems. Sci. Stud. Read. 26, 139\u2013149 (2021)","journal-title":"Sci. Stud. Read."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05017-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05017-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05017-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:53:44Z","timestamp":1747778024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05017-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,21]]},"references-count":162,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["5017"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05017-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,21]]},"assertion":[{"value":"2 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"206"}}