{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T06:32:23Z","timestamp":1775543543802,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T00:00:00Z","timestamp":1657670400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T00:00:00Z","timestamp":1657670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11334-022-00461-7","type":"journal-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T08:03:36Z","timestamp":1657699416000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Lightweight CNN-based malware image classification for resource-constrained applications"],"prefix":"10.1007","volume":"21","author":[{"given":"Ashlesha","family":"Hota","sequence":"first","affiliation":[]},{"given":"Subir","family":"Panja","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4408-7307","authenticated-orcid":false,"given":"Amitava","family":"Nag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"issue":"3","key":"461_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3073559","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye Y, Li T, Adjeroh D, Iyengar SS (2017) A survey on malware detection using data mining techniques. ACM Comput Surv (CSUR) 50(3):1\u201340","journal-title":"ACM Comput Surv (CSUR)"},{"key":"461_CR2","unstructured":"Jain M, Andreopoulos W, Stamp M (2021) Cnn vs elm for image-based malware classification. arXiv preprint arXiv:2103.13820"},{"issue":"1","key":"461_CR3","first-page":"100","volume":"15","author":"S-Y Choi","year":"2019","unstructured":"Choi S-Y, Lim CG, Kim Y-M (2019) Automated link tracing for classification of malicious websites in malware distribution networks. J Inf Process Syst 15(1):100\u2013115","journal-title":"J Inf Process Syst"},{"key":"461_CR4","doi-asserted-by":"crossref","unstructured":"Ahmadi M, Ulyanov D, Semenov S, Trofimov M, Giacinto G (2016) Novel feature extraction, selection and fusion for effective malware family classification. In: Proceedings of the sixth ACM conference on data and application security and privacy, pp 183\u2013194","DOI":"10.1145\/2857705.2857713"},{"key":"461_CR5","doi-asserted-by":"crossref","unstructured":"Kalash M, Rochan M, Mohammed N, Bruce ND, Wang Y, Iqbal F (2018) Malware classification with deep convolutional neural networks. In: 2018 9th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, pp 1\u20135","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"461_CR6","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.diin.2018.04.024","volume":"26","author":"Q Le","year":"2018","unstructured":"Le Q, Boydell O, Mac Namee B, Scanlon M (2018) Deep learning at the shallow end: malware classification for non-domain experts. Digit Investig 26:118\u2013126","journal-title":"Digit Investig"},{"issue":"7","key":"461_CR7","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1109\/TII.2018.2822680","volume":"14","author":"Z Cui","year":"2018","unstructured":"Cui Z, Xue F, Cai X, Cao Y, Wang G-G, Chen J (2018) Detection of malicious code variants based on deep learning. IEEE Trans Industr Inf 14(7):3187\u20133196","journal-title":"IEEE Trans Industr Inf"},{"key":"461_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101592","volume":"87","author":"H Yakura","year":"2019","unstructured":"Yakura H, Shinozaki S, Nishimura R, Oyama Y, Sakuma J (2019) Neural malware analysis with attention mechanism. Comput Secur 87:101592","journal-title":"Comput Secur"},{"key":"461_CR9","doi-asserted-by":"crossref","unstructured":"Rezende E, Ruppert G, Carvalho T, Ramos F, De\u00a0Geus P (2017) Malicious software classification using transfer learning of resnet-50 deep neural network. In: 2017 16th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 1011\u20131014","DOI":"10.1109\/ICMLA.2017.00-19"},{"key":"461_CR10","volume":"55","author":"X Gao","year":"2020","unstructured":"Gao X, Hu C, Shan C, Liu B, Niu Z, Xie H (2020) Malware classification for the cloud via semi-supervised transfer learning. J Inf Secur Appl 55:102661","journal-title":"J Inf Secur Appl"},{"key":"461_CR11","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.future.2021.06.032","volume":"125","author":"A Darem","year":"2021","unstructured":"Darem A, Abawajy J, Makkar A, Alhashmi A, Alanazi S (2021) Visualization and deep-learning-based malware variant detection using opcode-level features. Futur Gener Comput Syst 125:314\u2013323","journal-title":"Futur Gener Comput Syst"},{"key":"461_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11416-020-00358-8","volume":"17","author":"N Marastoni","year":"2021","unstructured":"Marastoni N, Giacobazzi R, Dalla Preda M (2021) Data augmentation and transfer learning to classify malware images in a deep learning context. J Comput Virol Hacking Tech 17:1\u201319","journal-title":"J Comput Virol Hacking Tech"},{"key":"461_CR13","doi-asserted-by":"crossref","unstructured":"Yan J, Qi Y, Rao Q (2018) Detecting malware with an ensemble method based on deep neural network. Secur Commun Netw 2018","DOI":"10.1155\/2018\/7247095"},{"issue":"1","key":"461_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11416-018-0324-z","volume":"15","author":"RU Khan","year":"2019","unstructured":"Khan RU, Zhang X, Kumar R (2019) Analysis of resnet and googlenet models for malware detection. J Comput Virol Hacking Tech 15(1):29\u201337","journal-title":"J Comput Virol Hacking Tech"},{"key":"461_CR15","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525\u201341550","journal-title":"IEEE Access"},{"key":"461_CR16","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1016\/j.future.2019.04.044","volume":"110","author":"AP Namanya","year":"2020","unstructured":"Namanya AP, Awan IU, Disso JP, Younas M (2020) Similarity hash based scoring of portable executable files for efficient malware detection in IoT. Futur Gener Comput Syst 110:824\u2013832","journal-title":"Futur Gener Comput Syst"},{"key":"461_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100616","volume":"52","author":"A Darwish","year":"2020","unstructured":"Darwish A, Ezzat D, Hassanien AE (2020) An optimized model based on convolutional neural networks and orthogonal learning particle swarm optimization algorithm for plant diseases diagnosis. Swarm Evol Comput 52:100616","journal-title":"Swarm Evol Comput"},{"key":"461_CR18","first-page":"377","volume":"47","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman S, Alazab M, Vinayakumar R (2019) A hybrid deep learning image-based analysis for effective malware detection. J Inf Secur Appl 47:377\u2013389","journal-title":"J Inf Secur Appl"},{"key":"461_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102133","volume":"102","author":"A \u00c7ay\u0131r","year":"2021","unstructured":"\u00c7ay\u0131r A, \u00dcnal U, Da\u011f H (2021) Random capsnet forest model for imbalanced malware type classification task. Comput Secur 102:102133","journal-title":"Comput Secur"},{"key":"461_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102154","volume":"105","author":"H Naeem","year":"2020","unstructured":"Naeem H, Ullah F, Naeem MR, Khalid S, Vasan D, Jabbar S, Saeed S (2020) Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Netw 105:102154","journal-title":"Ad Hoc Netw"},{"key":"461_CR21","doi-asserted-by":"crossref","unstructured":"Go JH, Jan T, Mohanty M, Patel OP, Puthal D, Prasad M (2020) Visualization approach for malware classification with resnext. In: 2020 IEEE congress on evolutionary computation (CEC). IEEE, pp 1\u20137","DOI":"10.1109\/CEC48606.2020.9185490"},{"key":"461_CR22","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.future.2021.06.029","volume":"125","author":"S Kumar","year":"2021","unstructured":"Kumar S et al (2021) Mcft-cnn: malware classification with fine-tune convolution neural networks using traditional and transfer learning in internet of things. Futur Gener Comput Syst 125:334\u2013351","journal-title":"Futur Gener Comput Syst"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-022-00461-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-022-00461-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-022-00461-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T02:40:27Z","timestamp":1741401627000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-022-00461-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,13]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["461"],"URL":"https:\/\/doi.org\/10.1007\/s11334-022-00461-7","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,13]]},"assertion":[{"value":"1 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}