{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:43:40Z","timestamp":1774021420317,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,8,28]],"date-time":"2018-08-28T00:00:00Z","timestamp":1535414400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572115"],"award-info":[{"award-number":["61572115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11416-018-0324-z","type":"journal-article","created":{"date-parts":[[2018,8,28]],"date-time":"2018-08-28T04:56:41Z","timestamp":1535432201000},"page":"29-37","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":196,"title":["Analysis of ResNet and GoogleNet models for malware detection"],"prefix":"10.1007","volume":"15","author":[{"given":"Riaz Ullah","family":"Khan","sequence":"first","affiliation":[]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rajesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,28]]},"reference":[{"key":"324_CR1","doi-asserted-by":"publisher","unstructured":"Nataraj, L., Yegneswaran, V., Porras, P., Zhang, J.: A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp. 21\u201330 (2011). \n                    https:\/\/doi.org\/10.1145\/2046684.2046689","DOI":"10.1145\/2046684.2046689"},{"key":"324_CR2","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M. Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Mane, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Viegas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., Zheng, X.: TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems (2016). \n                    arXiv:1603.04467"},{"key":"324_CR3","unstructured":"Dahl, G., Stokes, J., Deng, L.: Large-scale malware classification using random projections and neural networks. Acoust. Speech (2013). \n                    http:\/\/ieeexplore.ieee.org\/abstract\/document\/6638293\/"},{"issue":"4","key":"324_CR4","first-page":"152","volume":"10","author":"OS Adebayo","year":"2015","unstructured":"Adebayo, O.S., Aziz, N.A.: Static code analysis of permission based features for android malware classification using a priori algorithm with particle swarm optimization. J. Inf. Assur. Secur. 10(4), 152\u2013163 (2015)","journal-title":"J. Inf. Assur. Secur."},{"key":"324_CR5","doi-asserted-by":"publisher","unstructured":"Bennasar, H., Bendahmane, A., Essaaidi, M.: An Overview of the State-of-the-Art of Cloud Computing Cyber-Security, pp. 56\u201367. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-55589-8_4","DOI":"10.1007\/978-3-319-55589-8_4"},{"key":"324_CR6","unstructured":"Barrera, D., Kayacik, H.G., van Oorschot, P.C.: A methodology for empirical analysis of permission-based security models and its application to android. 17th Proceedings (2010). \n                    http:\/\/dl.acm.org\/citation.cfm?id=1866317"},{"key":"324_CR7","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: 16th ACM Conference on Computer (2009). \n                    http:\/\/dl.acm.org\/citation.cfm?id=1653691"},{"key":"324_CR8","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Conference on Web Application (2011)"},{"key":"324_CR9","unstructured":"Afifi, F., Anuar, N.B., Shamshirband, S., Choo, K.K.R.: DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware. PLoS ONE (2016). \n                    http:\/\/journals.plos.org\/plosone\/article?id=10.1371\/journal.pone.0162627"},{"key":"324_CR10","unstructured":"Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. (2017). \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S074373151630140X"},{"key":"324_CR11","unstructured":"Hardy, W., Chen, L., Hou, S., Ye, Y., Li, X.: DL4MD: A Deep Learning Framework for Intelligent Malware Detection"},{"key":"324_CR12","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp. 11\u201320. IEEE (2015). \n                    http:\/\/ieeexplore.ieee.org\/document\/7413680\/"},{"key":"324_CR13","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: Android Malware Characterization and Detection Using Deep Learning. Tsinghua Science and Technology (2016). \n                    http:\/\/ieeexplore.ieee.org\/abstract\/document\/7399288\/"},{"key":"324_CR14","unstructured":"Abou-Assaleh, T., Cercone, N., Keselj, V.: N-Gram-based Detection of New Malicious Code. ieeexplore.ieee.org (2004). \n                    http:\/\/ieeexplore.ieee.org\/abstract\/document\/1342667\/"},{"key":"324_CR15","unstructured":"Reddy, D., Pujari, A.: N-gram analysis for computer virus detection. J. Comput. Virol. (2006). \n                    http:\/\/www.springerlink.com\/index\/9H321858271V2720.pdf"},{"key":"324_CR16","unstructured":"Moskovitch, R., Feher, C., Tzachar, N., Berger, E.: Unknown Malcode Detection Using Opcode Representation. Springer, Berlin (2008). \n                    http:\/\/www.springerlink.com\/index\/B6H4KR787186P460.pdf"},{"key":"324_CR17","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images. Proceedings of the 8th International Symposium on Visualization for Cyber Security\u2014VizSec\u201911, pp. 1\u20137 (2011). \n                    http:\/\/dl.acm.org\/citation.cfm?id=2016904.2016908"},{"key":"324_CR18","unstructured":"Zhang, X., Zhao, J., LeCun, Y.: Character-Level Convolutional Networks for Text Classification. papers.nips.cc. \n                    http:\/\/papers.nips.cc\/paper\/5782-character-level-convolutional-networks-fo"},{"key":"324_CR19","doi-asserted-by":"publisher","unstructured":"Damshenas, M., Dehghantanha, A., Choo, K.-K.R., Mahmud, R.: M0Droid: An android behavioral-based malware detection model. J. Inf. Privacy Secur. 11(3), 141\u2013157 (2015). \n                    https:\/\/doi.org\/10.1080\/15536548.2015.1073510","DOI":"10.1080\/15536548.2015.1073510"},{"key":"324_CR20","unstructured":"Milosevic, N., Dehghantanha, A., Choo, K.K.R.: Machine learning aided Android malware classification. Comput. Electr. (2017). \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0045790617303087"},{"key":"324_CR21","unstructured":"Siddiqui, M., Wang, M.C., Lee, J.: Detecting internet worms using data mining techniques. J. Syst. Cybern. (2009). \n                    http:\/\/www.iiisci.org\/Journal\/CV%7B$%7D\/sci\/pdfs\/QI505RM.pdf"},{"key":"324_CR22","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. (CSUR) (2012). \n                    http:\/\/dl.acm.org\/citation.cfm?id=2089126"},{"key":"324_CR23","unstructured":"Kong, D., Yan, G.: Discriminant malware distance learning on structural information for automated malware classification. In: Proceedings of the 19th ACM SIGKDD International (2013). \n                    http:\/\/dl.acm.org\/citation.cfm?id=2488219"},{"key":"324_CR24","unstructured":"Tian, R., Batten, L.M., Versteeg, S.C.: Function length as a tool for malware classification. In: 3rd International Conference on Malicious and Unwanted Software (MALWARE 2008), pp. 69\u201376 (2008). \n                    http:\/\/ieeexplore.ieee.org\/abstract\/document\/4690860\/"},{"key":"324_CR25","unstructured":"Tian, R., Batten, L., Islam, R., Versteeg, S.: An automated classification system based on the strings of trojan and virus families. In: 2009 4th International Conference on Malicious and Unwanted Software (MALWARE 2009), pp. 23\u201330 (2009). \n                    http:\/\/ieeexplore.ieee.org\/abstract\/document\/5403021\/"},{"key":"324_CR26","unstructured":"Hall, M., Holmes, F.E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.A.: The WEKA data mining software: an update. SIGKDD Explor. 11(1) (2009). \n                    http:\/\/dl.acm.org\/citation.cfm?id=1656278"},{"key":"324_CR27","unstructured":"Santos, I., Laorden, C., Bringas, P.G.: Collective classification for unknown malware detection. The International Conference (2011). \n                    http:\/\/ieeexplore.ieee.org\/abstract\/document\/6732395\/"},{"key":"324_CR28","doi-asserted-by":"publisher","unstructured":"Santos, I. Devesa, J., Brezo, F., Nieves, J.: Opem: a static-dynamic approach for machine-learning-based malware detection. Joint Conference CISIS (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-33018-6_28","DOI":"10.1007\/978-3-642-33018-6_28"},{"key":"324_CR29","unstructured":"Zolkipli, M.F., Jantan, A.: An approach for malware behavior identification and classification. Comput. Res. Dev. (2011). \n                    http:\/\/ieeexplore.ieee.org\/abstract\/document\/5764001\/"},{"issue":"2","key":"324_CR30","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2007.45","volume":"5","author":"C Willems","year":"2007","unstructured":"Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Secur. Privacy 5(2), 32\u201339 (2007)","journal-title":"IEEE Secur. Privacy"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-018-0324-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-018-0324-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-018-0324-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T19:42:43Z","timestamp":1569008563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-018-0324-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,28]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["324"],"URL":"https:\/\/doi.org\/10.1007\/s11416-018-0324-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,28]]},"assertion":[{"value":"6 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}