{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:41:21Z","timestamp":1774539681252,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05104-7","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T12:10:28Z","timestamp":1750075828000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Advanced memory forensics for malware classification with deep learning algorithms"],"prefix":"10.1007","volume":"28","author":[{"given":"Ammar","family":"Odeh","sequence":"first","affiliation":[]},{"given":"Anas Abu","family":"Taleb","sequence":"additional","affiliation":[]},{"given":"Tareq","family":"Alhajahjeh","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Navarro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"5104_CR1","doi-asserted-by":"crossref","unstructured":"Shah, S.S.H., Ahmad, A.R., Jamil, N., Khan, A.R.: Memory forensics-based malware detection using computer vision and machine learning, Electronics, vol. 11, p. 2579, (2022)","DOI":"10.3390\/electronics11162579"},{"key":"5104_CR2","doi-asserted-by":"crossref","unstructured":"Sihwail, R., Omar, K., Arifin, K.A.Z.: An Effective Memory Analysis for Malware Detection and Classification, Computers, Materials & Continua, vol. 67, (2021)","DOI":"10.32604\/cmc.2021.014510"},{"key":"5104_CR3","first-page":"7611","volume":"22","author":"SSH Shah","year":"2022","unstructured":"Shah, S.S.H., Jamil, N., Khan, A.U.R.: Memory Visualization-Based Malware Detect. Technique Sens. 22, 7611 (2022)","journal-title":"Memory Visualization-Based Malware Detect. Technique Sens."},{"key":"5104_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., Chen, L.: Exploration of Adaptive Environment Design Strategy Based on Reinforcement Learning in CAD Environment, (2024)","DOI":"10.14733\/cadaps.2024.S23.175-190"},{"key":"5104_CR5","doi-asserted-by":"crossref","unstructured":"Odeh, A., Abu Taleb, A.: Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection, Applied Sciences, vol. 13, p. 11985, (2023)","DOI":"10.3390\/app132111985"},{"key":"5104_CR6","doi-asserted-by":"crossref","unstructured":"Al-Taani, R., Bassah, R., Naimat, N., Odeh, A.: PDF Malware Detection optimisation using machine learning, in 2023 3rd International Conference on Computing and Information Technology (ICCIT), pp. 15\u201319. (2023)","DOI":"10.1109\/ICCIT58132.2023.10273942"},{"key":"5104_CR7","doi-asserted-by":"crossref","unstructured":"Al-Sofyani, S., Alelayani, A., Al-zahrani, F., Monshi, R.: A Survey off Malware Forensics Analysis Techniques And Tools, in 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), pp. 1\u20136. (2023)","DOI":"10.1109\/ICAISC56366.2023.10085474"},{"key":"5104_CR8","doi-asserted-by":"crossref","unstructured":"Abu Al-Haija, Q., Alohaly, M., Odeh, A.: A lightweight double-stage scheme to identify malicious DNS over HTTPS traffic using a hybrid learning approach, sensors, 23, p. 3489, (2023)","DOI":"10.3390\/s23073489"},{"key":"5104_CR9","doi-asserted-by":"crossref","unstructured":"Nath, H.V., Mehtre, B.M.: Static malware analysis using machine learning methods, in Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13\u201314, 2014, Proceedings 2, pp. 440\u2013450. (2014)","DOI":"10.1007\/978-3-642-54525-2_39"},{"key":"5104_CR10","doi-asserted-by":"crossref","unstructured":"Baker del Aguila, R., Contreras P\u00e9rez, C.D., Silva-Trujillo, A.G., Cuevas-Tello, J.C., Nunez-Varela, J.: Static Malware Analysis Using Low-Parameter Machine Learning Models, Computers, vol. 13, p. 59, (2024)","DOI":"10.3390\/computers13030059"},{"key":"5104_CR11","doi-asserted-by":"publisher","first-page":"6526","DOI":"10.3390\/app13116526","volume":"13","author":"S Zhang","year":"2023","unstructured":"Zhang, S., Wu, J., Zhang, M., Yang, W.: Dynamic Malware Analysis based on API sequence Semantic Fusion. Appl. Sci. 13, 6526 (2023)","journal-title":"Appl. Sci."},{"key":"5104_CR12","doi-asserted-by":"crossref","unstructured":"von der Assen, J., Celdr\u00e1n, A.H., Zermin, A., Mogicato, R., Bovet, G., Stiller, B.: SecBox: A Lightweight Container-based Sandbox for Dynamic Malware Analysis, in NOMS 2023\u20132023 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20133. (2023)","DOI":"10.1109\/NOMS56928.2023.10154293"},{"key":"5104_CR13","doi-asserted-by":"crossref","unstructured":"Novansyah, H., Sutabri, T.: Analisis Malware dengan Metode Dinamik Menggunakan Framework Cuckoo Sandbox, Blantika: Multidisciplinary journal, vol. 1, pp. 79\u201385, (2023)","DOI":"10.57096\/blantika.v2i1.15"},{"key":"5104_CR14","unstructured":"Anandhi, V., Vinod, P., Menon, V.G., ER, A.K., Shilesh, A., Viswam, A., et al.: Malware Detection using Dynamic Analysis, in 2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS), pp. 1\u20136. (2023)"},{"key":"5104_CR15","doi-asserted-by":"crossref","unstructured":"Ezeonwu, I.J., Musa, S.M.: Comparative Analysis of Machine Learning Classifiers for Fileless Malware Detection, in 2024 International Conference on Green Energy, Computing and Sustainable Technology (GECOST), pp. 1\u20136. (2024)","DOI":"10.1109\/GECOST60902.2024.10474708"},{"key":"5104_CR16","doi-asserted-by":"crossref","unstructured":"Laouadi, A., Menacer, D.E., Benatchba, K.: A Machine Learning Approach for Malware Detection based on Image Conversion, (2024)","DOI":"10.21203\/rs.3.rs-3832623\/v1"},{"key":"5104_CR17","doi-asserted-by":"crossref","unstructured":"Sabah Talabani, H., Abdulhadi, H.M.T., Ali, M.H.: Obfuscated Malware Memory Detection employing Lazy Instance based Learner Algorithm based on Manhattan Distance function, Passer Journal of Basic and Applied Sciences, 6, pp. 130\u2013137, (2024)","DOI":"10.24271\/psr.2023.391018.1296"},{"key":"5104_CR18","doi-asserted-by":"crossref","unstructured":"Hill, J.E., Walker, T.O., Blanco, J.A., Ives, R.W., Rakvic, R., Jacob, B.: Ransomware Classification Using Hardware Performance Counters on a Non-Virtualized System, IEEE Access, (2024)","DOI":"10.1109\/ACCESS.2024.3395491"},{"key":"5104_CR19","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.diin.2018.09.006","volume":"27","author":"Y Dai","year":"2018","unstructured":"Dai, Y., Li, H., Qian, Y., Lu, X.: A malware classification method based on memory dump grayscale image. Digit. Invest. 27, 30\u201337 (2018)","journal-title":"Digit. Invest."},{"key":"5104_CR20","doi-asserted-by":"crossref","unstructured":"Mosli, R., Li, R., Yuan, B., Pan, Y.: Automated malware detection using artifacts in forensic memory images, in 2016 IEEE Symposium on Technologies for Homeland Security (HST), pp. 1\u20136. (2016)","DOI":"10.1109\/THS.2016.7568881"},{"key":"5104_CR21","doi-asserted-by":"crossref","unstructured":"Rathnayaka, C., Jamdagni, A.: An efficient approach for advanced malware analysis using memory forensic technique, in IEEE Trustcom\/BigDataSE\/ICESS, 2017, pp. 1145\u20131150. (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.365"},{"key":"5104_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, S., Hu, C., Wang, L., Mihaljevic, M.J., Xu, S., Lan, T.: A malware detection approach based on deep learning and memory forensics, Symmetry, vol. 15, p. 758, (2023)","DOI":"10.3390\/sym15030758"},{"key":"5104_CR23","first-page":"301564","volume":"45","author":"A Ali-Gombe","year":"2023","unstructured":"Ali-Gombe, A., Sudhakaran, S., Vijayakanthan, R., Richard, G.G.: cRGB_Mem: At the intersection of memory forensics and machine learning. Forensic Sci. International: Digit. Invest. 45, 301564 (2023)","journal-title":"Forensic Sci. International: Digit. Invest."},{"key":"5104_CR24","doi-asserted-by":"publisher","first-page":"103864","DOI":"10.1016\/j.cose.2024.103864","volume":"142","author":"P Maniriho","year":"2024","unstructured":"Maniriho, P., Mahmood, A.N., Chowdhury, M.J.M.: MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations. Computers Secur. 142, 103864 (2024)","journal-title":"Computers Secur."},{"key":"5104_CR25","doi-asserted-by":"crossref","unstructured":"Cevallos-Salas, D., Grijalva, F., Estrada-Jim\u00e9nez, J., Ben\u00edtez, D., Andrade, R.: Obfuscated Priv. Malware Classifiers Based Memory Dump. Anal. IEEE Access., (2024)","DOI":"10.1109\/ACCESS.2024.3358840"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05104-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05104-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05104-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:20:22Z","timestamp":1756930822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05104-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":25,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5104"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05104-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"19 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"353"}}