{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T03:23:11Z","timestamp":1778556191815,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11277-024-11366-y","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T09:03:37Z","timestamp":1719479017000},"page":"1879-1901","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Hybrid Deep Learning Approach Based on LSTM and CNN for Malware Detection"],"prefix":"10.1007","volume":"136","author":[{"given":"Preeti","family":"Thakur","sequence":"first","affiliation":[]},{"given":"Vineet","family":"Kansal","sequence":"additional","affiliation":[]},{"given":"Vinay","family":"Rishiwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"key":"11366_CR1","doi-asserted-by":"publisher","first-page":"182459","DOI":"10.1109\/ACCESS.2019.2960412","volume":"7","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A. K., Rodrigues, J. J., Shetty, S., & Park, Y. (2019). Iomt malware detection approaches: analysis and research challenges. IEEE Access, 7, 182459\u2013182476.","journal-title":"IEEE Access"},{"issue":"11","key":"11366_CR2","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.3390\/sym14112308","volume":"14","author":"MS Akhtar","year":"2022","unstructured":"Akhtar, M. S., & Feng, T. (2022). Detection of malware by deep learning as cnn-lstm machine learning techniques in real time. Symmetry, 14(11), 2308.","journal-title":"Symmetry"},{"key":"11366_CR3","doi-asserted-by":"crossref","unstructured":"Shijo, P. V., & Salim, A. J. P. C. S. (2015). Integrated static and dynamic analysis for malware detection. Procedia Computer Science, 46, 804\u2013811.","DOI":"10.1016\/j.procs.2015.02.149"},{"key":"11366_CR4","doi-asserted-by":"crossref","unstructured":"Chaffey, E. J., & Sgandurra, D. (2020). Malware vs anti-malware battle-gotta evade \u2018em all! In 2020 IEEE symposium on visualization for cyber security (VizSec), pp. 40\u201344. IEEE.","DOI":"10.1109\/VizSec51108.2020.00012"},{"key":"11366_CR5","doi-asserted-by":"publisher","first-page":"124579","DOI":"10.1109\/ACCESS.2020.3006143","volume":"8","author":"K Liu","year":"2020","unstructured":"Liu, K., Xu, S., Xu, G., Zhang, M., Sun, D., & Liu, H. (2020). A review of android malware detection approaches based on machine learning. IEEE Access, 8, 124579\u2013124607.","journal-title":"IEEE Access"},{"issue":"7","key":"11366_CR6","first-page":"3523","volume":"44","author":"S Minaee","year":"2021","unstructured":"Minaee, S., Boykov, Y., Porikli, F., Plaza, A., Kehtarnavaz, N., & Terzopoulos, D. (2021). Image segmentation using deep learning: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44(7), 3523\u20133542.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"11366_CR7","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s10664-019-09750-5","volume":"25","author":"C Vassallo","year":"2020","unstructured":"Vassallo, C., Panichella, S., Palomba, F., Proksch, S., Gall, H. C., & Zaidman, A. (2020). How developers engage with static analysis tools in different contexts. Empirical Software Engineering, 25, 1419\u20131457.","journal-title":"Empirical Software Engineering"},{"key":"11366_CR8","doi-asserted-by":"publisher","first-page":"116363","DOI":"10.1109\/ACCESS.2020.3002842","volume":"8","author":"Y Pan","year":"2020","unstructured":"Pan, Y., Ge, X., Fang, C., & Fan, Y. (2020). A systematic literature review of android malware detection using static analysis. IEEE Access, 8, 116363\u2013116379.","journal-title":"IEEE Access"},{"key":"11366_CR9","doi-asserted-by":"publisher","first-page":"96899","DOI":"10.1109\/ACCESS.2020.2995887","volume":"8","author":"J Jeon","year":"2020","unstructured":"Jeon, J., Park, J. H., & Jeong, Y. S. (2020). Dynamic analysis for iot malware detection with convolution neural network model. IEEE Access, 8, 96899\u201396911.","journal-title":"IEEE Access"},{"issue":"6","key":"11366_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3365001","volume":"52","author":"A Afianian","year":"2019","unstructured":"Afianian, A., Niksefat, S., Sadeghiyan, B., & Baptiste, D. (2019). Malware dynamic analysis evasion techniques: A survey. ACM Computing Surveys (CSUR), 52(6), 1\u201328.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"11366_CR11","doi-asserted-by":"crossref","unstructured":"Onwuzurike, L., Almeida, M., Mariconti, E., Blackburn, J., Stringhini, G., & Cristofaro, E. D. (2018). A family of droids-android malware detection via behavioral modeling: Static vs dynamic analysis. In 2018 16th annual conference on privacy, security and trust (PST), pp. 1\u201310 (2018). IEEE.","DOI":"10.1109\/PST.2018.8514191"},{"key":"11366_CR12","doi-asserted-by":"publisher","unstructured":"Pathak, P., & Choudhary, P. (2023). A comprehensive review of various machine learning techniques, pp. 1\u201310. Wiley (2023). https:\/\/doi.org\/10.1002\/9781394186570.ch1.","DOI":"10.1002\/9781394186570.ch1"},{"issue":"2","key":"11366_CR13","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.32604\/cmc.2021.014510","volume":"67","author":"R Sihwail","year":"2021","unstructured":"Sihwail, R., Omar, K., & Ariffin, K. A. Z. (2021). An effective memory analysis for malware detection and classification. Computers, Materials & Continua, 67(2), 2301\u20132320.","journal-title":"Computers, Materials & Continua"},{"key":"11366_CR14","doi-asserted-by":"publisher","first-page":"6249","DOI":"10.1109\/ACCESS.2019.2963724","volume":"8","author":"OA Aslan","year":"2020","unstructured":"Aslan, O. A., & Samet, R. (2020). A comprehensive review on malware detection approaches. IEEE Access, 8, 6249\u20136271.","journal-title":"IEEE Access"},{"key":"11366_CR15","doi-asserted-by":"crossref","unstructured":"Naseer, M., Rusdi, J. F., Shanono, N. M., Salam, S., Muslim, Z. B., Abu, N. A., & Abadi, I. Malware detection: Issues and challenges. Journal of Physics: Conference Series, 1807, 012011 (2021). IOP Publishing.","DOI":"10.1088\/1742-6596\/1807\/1\/012011"},{"issue":"1","key":"11366_CR16","first-page":"1","volume":"4","author":"S Gupta","year":"2013","unstructured":"Gupta, S. (2013). Types of malwares and its analysis. International Journal of Scientific and Engineering Research, 4(1), 1\u201313.","journal-title":"International Journal of Scientific and Engineering Research"},{"key":"11366_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2020.104926","volume":"119","author":"R Sharma","year":"2020","unstructured":"Sharma, R., Kamble, S. S., Gunasekaran, A., Kumar, V., & Kumar, A. (2020). A systematic literature review on machine learning applications for sustainable agriculture supply chain performance. Computers & Operations Research, 119, 104926.","journal-title":"Computers & Operations Research"},{"key":"11366_CR18","doi-asserted-by":"publisher","first-page":"3035","DOI":"10.1007\/s12652-018-0803-6","volume":"10","author":"W Wang","year":"2019","unstructured":"Wang, W., Zhao, M., & Wang, J. (2019). Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. Journal of Ambient Intelligence and Humanized Computing, 10, 3035\u20133043.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11366_CR19","doi-asserted-by":"publisher","first-page":"24019","DOI":"10.1109\/ACCESS.2020.2970279","volume":"8","author":"BH Khudayer","year":"2020","unstructured":"Khudayer, B. H., Anbar, M., Hanshi, S. M., & Wan, T. C. (2020). Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access, 8, 24019\u201324032.","journal-title":"IEEE Access"},{"key":"11366_CR20","unstructured":"Lu, R. (2019). Malware detection with LSTM using opcode language."},{"issue":"7","key":"11366_CR21","doi-asserted-by":"publisher","first-page":"4830","DOI":"10.1109\/TII.2021.3119778","volume":"18","author":"J Jeon","year":"2022","unstructured":"Jeon, J., Jeong, B., Baek, S., & Jeong, Y.-S. (2022). Hybrid malware detection based on bi-lstm and spp-net for smart iot. IEEE Transactions on Industrial Informatics, 18(7), 4830\u20134837. https:\/\/doi.org\/10.1109\/TII.2021.3119778","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"11366_CR22","doi-asserted-by":"crossref","unstructured":"Faysal, J. A., Mostafa, S. T., Tamanna, J. S., Mumenin, K. M., Arifin, M. M., Awal, M. A., Shome, A., & Mostafa, S. S. (2022). Xgb-rf: A hybrid machine learning approach for iot intrusion detection. Telecom, 3, 52\u201369. MDPI","DOI":"10.3390\/telecom3010003"},{"key":"11366_CR23","doi-asserted-by":"crossref","unstructured":"Sihwail, R., Omar, K., & Ariffin, K. Z. (2018). A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis. International Journal on Advanced Science, Engineering and Information Technology, 8(4\u20132), 1662\u20131671 (2018)","DOI":"10.18517\/ijaseit.8.4-2.6827"},{"key":"11366_CR24","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.ins.2020.08.082","volume":"546","author":"S Yoo","year":"2021","unstructured":"Yoo, S., Kim, S., Kim, S., & Kang, B. B. (2021). Ai-hydra: Advanced hybrid approach using random forest and deep learning for malware classification. Information Sciences, 546, 420\u2013435.","journal-title":"Information Sciences"},{"key":"11366_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee, M. K., Yerima, S. Y., & Sezer, S. (2020). Dl-droid: Deep learning based android malware detection using real devices. Computers & Security, 89, 101663.","journal-title":"Computers & Security"},{"key":"11366_CR26","doi-asserted-by":"crossref","unstructured":"Shukla, S., Kolhe, G., Sai Manoj, P. D. & Rafatirad, S. (2019). Rnn-based classifier to detect stealthy malware using localized features and complex symbolic sequence. In 2019 18th IEEE international conference on machine learning and applications (ICMLA), pp. 406\u2013409. IEEE.","DOI":"10.1109\/ICMLA.2019.00076"},{"key":"11366_CR27","doi-asserted-by":"publisher","first-page":"46717","DOI":"10.1109\/ACCESS.2019.2906934","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., & Venkatraman, S. (2019). Robust intelligent malware detection using deep learning. IEEE Access, 7, 46717\u201346738.","journal-title":"IEEE Access"},{"key":"11366_CR28","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.jisa.2019.06.006","volume":"47","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman, S., Alazab, M., & Vinayakumar, R. (2019). A hybrid deep learning image-based analysis for effective malware detection. Journal of Information Security and Applications, 47, 377\u2013389.","journal-title":"Journal of Information Security and Applications"},{"key":"11366_CR29","doi-asserted-by":"crossref","unstructured":"Maniriho, P., Mahmood, A. N., & Chowdhury, M. J. M. (2024). Memaldet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations. Computers & Security, 103864.","DOI":"10.1016\/j.cose.2024.103864"},{"issue":"3","key":"11366_CR30","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3390\/computers13030059","volume":"13","author":"RB Aguila","year":"2024","unstructured":"Aguila, R. B., P\u00e9rez, C. D. C., Silva-Trujillo, A. G., Cuevas-Tello, J. C., & Nunez-Varela, J. (2024). Static malware analysis using low-parameter machine learning models. Computers, 13(3), 59.","journal-title":"Computers"},{"issue":"1","key":"11366_CR31","doi-asserted-by":"publisher","first-page":"57","DOI":"10.54216\/JISIoT.120105","volume":"12","author":"T Bikku","year":"2024","unstructured":"Bikku, T., Chandolu, S. B., Praveen, S. P., Tirumalasetti, N. R., Swathi, K., & Sirisha, U. (2024). Enhancing real-time malware analysis with quantum neural networks. Journal of Intelligent Systems and Internet of Things, 12(1), 57\u201377.","journal-title":"Journal of Intelligent Systems and Internet of Things"},{"key":"11366_CR32","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s11277-024-11128-w","volume":"135","author":"P Kumar","year":"2024","unstructured":"Kumar, P., & Singh, S. (2024). An efficient security testing for android application based on behavior and activities using improved pca and dnn-knn classifier. Wireless Personal Communications, 135, 1285\u20131314.","journal-title":"Wireless Personal Communications"},{"key":"11366_CR33","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s11277-024-10880-3","volume":"134","author":"C Gupta","year":"2024","unstructured":"Gupta, C., Kumar, A., & Jain, N. K. (2024). An enhanced hybrid intrusion detection based on crow search analysis optimizations and artificial neural network. Wireless Personal Communications, 134, 43\u201368.","journal-title":"Wireless Personal Communications"},{"key":"11366_CR34","doi-asserted-by":"publisher","first-page":"907","DOI":"10.7717\/peerj-cs.907","volume":"8","author":"WF Elsersy","year":"2022","unstructured":"Elsersy, W. F., Feizollah, A., & Anuar, N. B. (2022). The rise of obfuscated android malware and impacts on detection methods. PeerJ Computer Science, 8, 907.","journal-title":"PeerJ Computer Science"},{"issue":"15","key":"11366_CR35","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.3390\/electronics11152354","volume":"11","author":"CS Yadav","year":"2022","unstructured":"Yadav, C. S., Singh, J., Yadav, A., Pattanayak, H. S., Kumar, R., Khan, A. A., Haq, M. A., Alhussen, A., & Alharby, A. (2022). Malware analysis in iot and android systems with defensive mechanism. Electronics, 11(15), 2354.","journal-title":"Electronics"},{"key":"11366_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103385","volume":"133","author":"SH Khan","year":"2023","unstructured":"Khan, S. H., Alahmadi, T. J., Ullah, W., Iqbal, J., Rahim, A., Alkahtani, H. K., & Almagrabi, A. O. (2023). A new deep boosted cnn and ensemble learning based iot malware detection. Computers & Security, 133, 103385.","journal-title":"Computers & Security"},{"issue":"19","key":"11366_CR37","doi-asserted-by":"publisher","first-page":"4025","DOI":"10.3390\/electronics12194025","volume":"12","author":"J Lu","year":"2023","unstructured":"Lu, J., Ren, X., Zhang, J., & Wang, T. (2023). Cpl-net: A malware detection network based on parallel cnn and lstm feature fusion. Electronics, 12(19), 4025.","journal-title":"Electronics"},{"key":"11366_CR38","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1016\/j.procs.2024.03.239","volume":"233","author":"G Karat","year":"2024","unstructured":"Karat, G., Kannimoola, J. M., Nair, N., Vazhayil, A., Sujadevi, V. G., & Poornachandran, P. (2024). Cnn-lstm hybrid model for enhanced malware analysis and detection. Procedia Computer Science, 233, 492\u2013503.","journal-title":"Procedia Computer Science"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11366-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11366-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11366-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T16:29:02Z","timestamp":1720110542000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11366-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["11366"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11366-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"11 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no financial or non-financial Conflict of interest, and also in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}