{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T19:59:27Z","timestamp":1764014367535,"version":"3.45.0"},"reference-count":85,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100009392","name":"Prince Sattam bin Abdulaziz University","doi-asserted-by":"publisher","award":["PSAU\/2025\/R\/1446"],"award-info":[{"award-number":["PSAU\/2025\/R\/1446"]}],"id":[{"id":"10.13039\/100009392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007471","name":"Northern Borders University","doi-asserted-by":"publisher","award":["NBU-FFR-2025-2443-01"],"award-info":[{"award-number":["NBU-FFR-2025-2443-01"]}],"id":[{"id":"10.13039\/501100007471","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-025-00567-z","type":"journal-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T16:49:20Z","timestamp":1752684560000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multiscale and Kolmogorov entropies as effective features for malware detection"],"prefix":"10.1007","volume":"21","author":[{"given":"Mahdieh","family":"Abazar","sequence":"first","affiliation":[]},{"given":"Farnoush","family":"Manavi","sequence":"additional","affiliation":[]},{"given":"May","family":"Altulyan","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ayari","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Boostani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,16]]},"reference":[{"key":"567_CR1","doi-asserted-by":"publisher","first-page":"103503","DOI":"10.1016\/j.cose.2023.103503","volume":"136","author":"M Wang","year":"2024","unstructured":"Wang, M., Zhang, Y., Wen, W.: Improved capsule networks based on Nash equilibrium for malicious code classification. Comput. Secur. 136, 103503 (2024)","journal-title":"Comput. Secur."},{"key":"567_CR2","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.future.2023.02.014","volume":"144","author":"C Liu","year":"2023","unstructured":"Liu, C., Lu, J., Feng, W., Du, E., Di, L., Song, Z.: MOBIPCR: Efficient, accurate, and strict ML-based mobile malware detection. Futur Gener Comput. Syst. 144, 140\u2013150 (2023)","journal-title":"Futur Gener Comput. Syst."},{"key":"567_CR3","doi-asserted-by":"publisher","first-page":"103523","DOI":"10.1016\/j.adhoc.2024.103523","volume":"161","author":"F Nawshin","year":"2024","unstructured":"Nawshin, F., Unal, D., Hammoudeh, M., Suganthan, P.N.: AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Netw. 161, 103523 (2024)","journal-title":"Ad Hoc Netw."},{"key":"567_CR4","doi-asserted-by":"publisher","first-page":"109233","DOI":"10.1016\/j.compeleceng.2024.109233","volume":"117","author":"F Nawshin","year":"2024","unstructured":"Nawshin, F., Gad, R., Unal, D., Al-Ali, A.K., Suganthan, P.N.: Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey. Comput. Electr. Eng. 117, 109233 (2024)","journal-title":"Comput. Electr. Eng."},{"key":"567_CR5","doi-asserted-by":"publisher","first-page":"103788","DOI":"10.1016\/j.cose.2024.103788","volume":"140","author":"P Feng","year":"2024","unstructured":"Feng, P., Gai, L., Yang, L., Wang, Q., Li, T., Xi, N., Ma, J.: DawnGNN: documentation augmented windows malware detection using graph neural network. Comput. Secur. 140, 103788 (2024)","journal-title":"Comput. Secur."},{"key":"567_CR6","doi-asserted-by":"publisher","first-page":"100529","DOI":"10.1016\/j.cosrev.2022.100529","volume":"47","author":"M Gopinath","year":"2023","unstructured":"Gopinath, M., Sethuraman, S.C.: A comprehensive survey on deep learning based malware detection techniques. Comput. Sci. Rev. 47, 100529 (2023)","journal-title":"Comput. Sci. Rev."},{"key":"567_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3638552","volume":"56","author":"MG Gaber","year":"2024","unstructured":"Gaber, M.G., Ahmed, M., Janicke, H.: Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Comput. Surv. 56, 1\u201333 (2024)","journal-title":"ACM Comput. Surv."},{"key":"567_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-021-00414-x","volume":"18","author":"F Manavi","year":"2022","unstructured":"Manavi, F., Hamzeh, A.: A novel approach for ransomware detection based on PE header using graph embedding. J. Comput. Virol. Hack. Tech. 18, 1\u201312 (2022)","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"567_CR9","doi-asserted-by":"publisher","first-page":"110138","DOI":"10.1016\/j.comnet.2023.110138","volume":"239","author":"M Cen","year":"2024","unstructured":"Cen, M., Jiang, F., Qin, X., Jiang, Q., Doss, R.: Ransomware early detection: A survey. Comput. Networks. 239, 110138 (2024)","journal-title":"Comput. Networks"},{"key":"567_CR10","first-page":"181","volume":"14","author":"F Manavi","year":"2022","unstructured":"Manavi, F., Hamzeh, A.: Ransomware detection based on pe header using convolutional neural networks. ISeCure 14, 181 (2022)","journal-title":"ISeCure"},{"key":"567_CR11","doi-asserted-by":"crossref","unstructured":"Manavi, F., Hamzeh, A.: Static detection of ransomware using LSTM network and PE header. In: 2021 26th International Computer Conference, Computer Society of Iran (CSICC). pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/CSICC52343.2021.9420580"},{"key":"567_CR12","doi-asserted-by":"publisher","first-page":"119133","DOI":"10.1016\/j.eswa.2022.119133","volume":"214","author":"I Kara","year":"2023","unstructured":"Kara, I.: Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges. Expert Syst. Appl. 214, 119133 (2023)","journal-title":"Expert Syst. Appl."},{"key":"567_CR13","first-page":"103451","volume":"74","author":"M Alaeiyan","year":"2023","unstructured":"Alaeiyan, M., Parsa, S., Vinod, P.: Sober: Explores for invasive behaviour of malware. J. Inf. Secur. Appl. 74, 103451 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"567_CR14","doi-asserted-by":"publisher","first-page":"32397","DOI":"10.1007\/s11042-023-14445-7","volume":"82","author":"N Dwivedi","year":"2023","unstructured":"Dwivedi, N., Singh, D.K., Kushwaha, D.S.: A novel approach for suspicious activity detection with deep learning. Multimed Tools Appl. 82, 32397\u201332420 (2023)","journal-title":"Multimed Tools Appl."},{"key":"567_CR15","doi-asserted-by":"publisher","first-page":"107143","DOI":"10.1016\/j.compeleceng.2021.107143","volume":"92","author":"SA Roseline","year":"2021","unstructured":"Roseline, S.A., Geetha, S.: A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks. Comput. Electr. Eng. 92, 107143 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"567_CR16","doi-asserted-by":"publisher","first-page":"28685","DOI":"10.1109\/ACCESS.2022.3157812","volume":"10","author":"J Pattee","year":"2022","unstructured":"Pattee, J., Anik, S.M., Lee, B.K.: Performance monitoring counter based intelligent malware detection and design alternatives. IEEE Access. 10, 28685\u201328692 (2022)","journal-title":"IEEE Access."},{"key":"567_CR17","doi-asserted-by":"publisher","first-page":"96899","DOI":"10.1109\/ACCESS.2020.2995887","volume":"8","author":"J Jeon","year":"2020","unstructured":"Jeon, J., Park, J.H., Jeong, Y.-S.: Dynamic analysis for IoT malware detection with convolution neural network model. IEEE Access. 8, 96899\u201396911 (2020)","journal-title":"IEEE Access."},{"key":"567_CR18","doi-asserted-by":"publisher","first-page":"103595","DOI":"10.1016\/j.cose.2023.103595","volume":"137","author":"J Geng","year":"2024","unstructured":"Geng, J., Wang, J., Fang, Z., Zhou, Y., Wu, D., Ge, W.: A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Comput. Secur. 137, 103595 (2024)","journal-title":"Comput. Secur."},{"key":"567_CR19","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11416-023-00505-x","volume":"20","author":"MT Nguyen","year":"2024","unstructured":"Nguyen, M.T., Nguyen, V.H., Shone, N.: Using deep graph learning to improve dynamic analysis-based malware detection in PE files. J. Comput. Virol. Hacking Tech. 20, 153\u2013172 (2024)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"567_CR20","first-page":"103721","volume":"82","author":"J Tang","year":"2024","unstructured":"Tang, J., Xu, W., Peng, T., Zhou, S., Pi, Q., He, R., Hu, X.: Android malware detection based on a novel mixed bytecode image combined with attention mechanism. J. Inf. Secur. Appl. 82, 103721 (2024)","journal-title":"J. Inf. Secur. Appl."},{"key":"567_CR21","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.cose.2017.11.016","volume":"73","author":"P Burnap","year":"2018","unstructured":"Burnap, P., French, R., Turner, F., Jones, K.: Malware classification using self organising feature maps and machine activity data. Comput. Secur. 73, 399\u2013410 (2018)","journal-title":"Comput. Secur."},{"key":"567_CR22","doi-asserted-by":"publisher","first-page":"102627","DOI":"10.1016\/j.cose.2022.102627","volume":"115","author":"A Sharma","year":"2022","unstructured":"Sharma, A., Gupta, B.B., Singh, A.K., Saraswat, V.K.: Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense. Comput. Secur. 115, 102627 (2022)","journal-title":"Comput. Secur."},{"key":"567_CR23","doi-asserted-by":"publisher","first-page":"6249","DOI":"10.1109\/ACCESS.2019.2963724","volume":"8","author":"OA Aslan","year":"2020","unstructured":"Aslan, O.A., Samet, R.: A comprehensive review on malware detection approaches. IEEE access. 8, 6249\u20136271 (2020)","journal-title":"IEEE access."},{"key":"567_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_2","author":"A Shalaginov","year":"2018","unstructured":"Shalaginov, A., Banin, S., Dehghantanha, A., Franke, K.: Machine learning aided static malware analysis: a survey and tutorial. Cyber Threat Intell. (2018). https:\/\/doi.org\/10.1007\/978-3-319-73951-9_2","journal-title":"Cyber Threat Intell."},{"key":"567_CR25","doi-asserted-by":"publisher","first-page":"51041","DOI":"10.1109\/ACCESS.2022.3171775","volume":"10","author":"Y-S Jeong","year":"2022","unstructured":"Jeong, Y.-S., Lee, S.-M., Kim, J.-H., Woo, J., Kang, A.R.: Malware detection using byte streams of different file formats. IEEE Access. 10, 51041\u201351047 (2022)","journal-title":"IEEE Access."},{"key":"567_CR26","doi-asserted-by":"publisher","first-page":"8485365","DOI":"10.1155\/2019\/8485365","volume":"2019","author":"Y-S Jeong","year":"2019","unstructured":"Jeong, Y.-S., Woo, J., Kang, A.R.: Malware detection on byte streams of pdf files using convolutional neural networks. Secur. Commun. Netw. 2019, 8485365 (2019)","journal-title":"Secur. Commun. Netw."},{"key":"567_CR27","doi-asserted-by":"publisher","first-page":"8925","DOI":"10.1038\/s41598-023-36088-2","volume":"13","author":"Y-S Jeong","year":"2023","unstructured":"Jeong, Y.-S., Mswahili, M.E., Kang, A.R.: File-level malware detection using byte streams. Sci. Rep. 13, 8925 (2023)","journal-title":"Sci. Rep."},{"key":"567_CR28","doi-asserted-by":"crossref","unstructured":"Ling, Y.T., Phang, P., Chiew, K.L., Zhang, X.: Malware detection with structural entropy features using multilayer perceptron neural network. In: 2022 International Conference on Digital Transformation and Intelligence (ICDI). pp. 1\u20137. IEEE (2022)","DOI":"10.1109\/ICDI57181.2022.10007419"},{"key":"567_CR29","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s11416-016-0274-2","volume":"13","author":"B David","year":"2017","unstructured":"David, B., Filiol, E., Gallienne, K.: Structural analysis of binary executable headers for malware detection optimization. J. Comput. Virol. Hacking Tech. 13, 87\u201393 (2017)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"567_CR30","first-page":"102876","volume":"60","author":"T Rezaei","year":"2021","unstructured":"Rezaei, T., Manavi, F., Hamzeh, A.: A PE header-based method for malware detection using clustering and deep embedding techniques. J. Inf. Secur. Appl. 60, 102876 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"567_CR31","doi-asserted-by":"publisher","first-page":"103265","DOI":"10.1016\/j.cose.2023.103265","volume":"130","author":"CC Moreira","year":"2023","unstructured":"Moreira, C.C., Moreira, D.C., de Sales, C. Jr.: Improving ransomware detection based on portable executable header using xception convolutional neural network. Comput. Secur. 130, 103265 (2023)","journal-title":"Comput. Secur."},{"key":"567_CR32","doi-asserted-by":"publisher","first-page":"18855","DOI":"10.1109\/ACCESS.2023.3247344","volume":"11","author":"H Lee","year":"2023","unstructured":"Lee, H., Kim, S., Baek, D., Kim, D., Hwang, D.: Robust IoT Malware Detection and Classification Using Opcode Category Features on Machine Learning. IEEE Access. 11, 18855\u201318867 (2023)","journal-title":"IEEE Access."},{"key":"567_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A Damodaran","year":"2017","unstructured":"Damodaran, A., Troia, F., Di, Visaggio, C.A., Austin, T.H., Stamp, M.: A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech. 13, 1\u201312 (2017)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"567_CR34","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.future.2021.06.032","volume":"125","author":"A Darem","year":"2021","unstructured":"Darem, A., Abawajy, J., Makkar, A., Alhashmi, A., Alanazi, S.: Visualization and deep-learning-based malware variant detection using OpCode-level features. Futur Gener Comput. Syst. 125, 314\u2013323 (2021)","journal-title":"Futur Gener Comput. Syst."},{"key":"567_CR35","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.cose.2019.02.007","volume":"83","author":"W Han","year":"2019","unstructured":"Han, W., Xue, J., Wang, Y., Huang, L., Kong, Z., Mao, L.: MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. Comput. Secur. 83, 208\u2013233 (2019)","journal-title":"Comput. Secur."},{"key":"567_CR36","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.icte.2020.04.005","volume":"6","author":"Q-D Ngo","year":"2020","unstructured":"Ngo, Q.-D., Nguyen, H.-T., Le, V.-H., Nguyen, D.-H.: A survey of IoT malware and detection methods based on static features. ICT express. 6, 280\u2013286 (2020)","journal-title":"ICT express"},{"key":"567_CR37","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","volume":"1","author":"D Bilar","year":"2007","unstructured":"Bilar, D.: Opcodes as predictor for malware. Int. J. Electron. Secur. Digit. forensics. 1, 156\u2013168 (2007)","journal-title":"Int. J. Electron. Secur. Digit. forensics"},{"key":"567_CR38","doi-asserted-by":"crossref","unstructured":"Manavi, F., Hamzeh, A.: A new method for malware detection using opcode visualization. In: 2017 Artificial Intelligence and Signal Processing Conference (AISP). pp. 96\u2013102. IEEE (2017)","DOI":"10.1109\/AISP.2017.8324117"},{"key":"567_CR39","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1007\/s10207-023-00699-7","volume":"22","author":"R Wang","year":"2023","unstructured":"Wang, R., Gao, J., Huang, S.: AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph. Int. J. Inf. Secur. 22, 1423\u20131443 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"567_CR40","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s41125-019-00039-8","volume":"4","author":"A Zimba","year":"2019","unstructured":"Zimba, A., Chishimba, M.: On the Economic Impact of Crypto-ransomware Attacks: The State of the Art on Enterprise Systems. Eur. J. Secur. Res. 4, 3\u201331 (2019)","journal-title":"Eur. J. Secur. Res."},{"key":"567_CR41","first-page":"462","volume":"44","author":"K Tamura","year":"2017","unstructured":"Tamura, K., Ichimura, T.: Classifying of time series using local sequence alignment and its performance evaluation. IAENG Int. J. Comput. Sci. 44, 462\u2013470 (2017)","journal-title":"IAENG Int. J. Comput. Sci."},{"key":"567_CR42","doi-asserted-by":"crossref","unstructured":"Manavi, F., Hamzeh, A.: A new approach for malware detection based on evolutionary algorithm. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion. pp. 1619\u20131624 (2019)","DOI":"10.1145\/3319619.3326811"},{"key":"567_CR43","doi-asserted-by":"publisher","first-page":"111543","DOI":"10.1016\/j.knosys.2024.111543","volume":"290","author":"A Bensaoud","year":"2024","unstructured":"Bensaoud, A., Kalita, J.: CNN-LSTM and transfer learning models for malware classification based on opcodes and API calls. Knowl-Based Syst 290, 111543 (2024)","journal-title":"Knowl-Based Syst"},{"key":"567_CR44","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.future.2019.09.025","volume":"110","author":"B Zhang","year":"2019","unstructured":"Zhang, B., Xiao, W., Xiao, X., Sangaiah, A.K., Zhang, W., Zhang, J.: Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes. Future Gener. Comput. Syst. 110, 708 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"567_CR45","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1016\/j.dt.2020.09.001","volume":"17","author":"Y Li","year":"2021","unstructured":"Li, Y., Jiao, S., Gao, X.: A novel signal feature extraction technology based on empirical wavelet transform and reverse dispersion entropy. Def. Technol. 17, 1625\u20131635 (2021)","journal-title":"Def. Technol."},{"key":"567_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00079-5","volume":"4","author":"C Yang","year":"2021","unstructured":"Yang, C., Xu, J., Liang, S., Wu, Y., Wen, Y., Zhang, B., Meng, D.: DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecurity. 4, 1\u201314 (2021)","journal-title":"Cybersecurity"},{"key":"567_CR47","doi-asserted-by":"publisher","first-page":"116363","DOI":"10.1109\/ACCESS.2020.3002842","volume":"8","author":"Y Pan","year":"2020","unstructured":"Pan, Y., Ge, X., Fang, C., Fan, Y.: A systematic literature review of android malware detection using static analysis. IEEE Access. 8, 116363\u2013116379 (2020)","journal-title":"IEEE Access."},{"key":"567_CR48","doi-asserted-by":"publisher","first-page":"58488","DOI":"10.1109\/ACCESS.2022.3179384","volume":"10","author":"D Demirci","year":"2022","unstructured":"Demirci, D., Acarturk, C.: Static malware detection using stacked BiLSTM and GPT-2. IEEE Access. 10, 58488\u201358502 (2022)","journal-title":"IEEE Access."},{"key":"567_CR49","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Xiao, X., Mercaldo, F., Ni, S., Martinelli, F., Sangaiah, A.K.: Classification of ransomware families with machine learning based on N-gram of opcodes. Futur Gener Comput. Syst. 90, 211\u2013221 (2019)","journal-title":"Futur Gener Comput. Syst."},{"key":"567_CR50","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.future.2019.07.070","volume":"102","author":"M Amin","year":"2020","unstructured":"Amin, M., Tanveer, T.A., Tehseen, M., Khan, M., Khan, F.A., Anwar, S.: Static malware detection and attribution in android byte-code through an end-to-end deep system. Futur Gener Comput. Syst. 102, 112\u2013126 (2020)","journal-title":"Futur Gener Comput. Syst."},{"key":"567_CR51","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-73951-9_6","volume-title":"Cyber Threat Intelligence","author":"J Baldwin","year":"2018","unstructured":"Baldwin, J., Dehghantanha, A.: Leveraging support vector machine for opcode density based detection of crypto-ransomware. In: Cyber Threat Intelligence, pp. 107\u2013136. Springer, Cham (2018)"},{"key":"567_CR52","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.future.2021.01.004","volume":"118","author":"N Usman","year":"2021","unstructured":"Usman, N., Usman, S., Khan, F., Jan, M.A., Sajid, A., Alazab, M., Watters, P.: Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics. Futur Gener Comput. Syst. 118, 124\u2013141 (2021)","journal-title":"Futur Gener Comput. Syst."},{"key":"567_CR53","doi-asserted-by":"publisher","first-page":"101861","DOI":"10.1016\/j.sysarc.2020.101861","volume":"112","author":"J Singh","year":"2021","unstructured":"Singh, J., Singh, J.: A survey on machine learning-based malware detection in executable files. J. Syst. Archit. 112, 101861 (2021)","journal-title":"J. Syst. Archit."},{"key":"567_CR54","doi-asserted-by":"publisher","first-page":"102686","DOI":"10.1016\/j.cose.2022.102686","volume":"116","author":"C Li","year":"2022","unstructured":"Li, C., Lv, Q., Li, N., Wang, Y., Sun, D., Qiao, Y.: A novel deep framework for dynamic malware detection based on API sequence intrinsic features. Comput. Secur. 116, 102686 (2022)","journal-title":"Comput. Secur."},{"key":"567_CR55","doi-asserted-by":"publisher","first-page":"101760","DOI":"10.1016\/j.cose.2020.101760","volume":"92","author":"E Amer","year":"2020","unstructured":"Amer, E., Zelinka, I.: A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence. Comput. Secur. 92, 101760 (2020)","journal-title":"Comput. Secur."},{"key":"567_CR56","first-page":"4754","volume":"35","author":"Y Chai","year":"2022","unstructured":"Chai, Y., Du, L., Qiu, J., Yin, L., Tian, Z.: Dynamic prototype network based on sample adaptation for few-shot malware detection. IEEE Trans. Knowl. Data Eng. 35, 4754\u20134766 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"567_CR57","doi-asserted-by":"publisher","first-page":"5183","DOI":"10.1007\/s00521-020-05309-4","volume":"33","author":"A Mahindru","year":"2021","unstructured":"Mahindru, A., Sangal, A.L.: MLDroid-framework for Android malware detection using machine learning techniques. Neural Comput. Appl. 33, 5183\u20135240 (2021)","journal-title":"Neural Comput. Appl."},{"key":"567_CR58","doi-asserted-by":"publisher","first-page":"141045","DOI":"10.1109\/ACCESS.2023.3256979","volume":"11","author":"NZ Gorment","year":"2023","unstructured":"Gorment, N.Z., Selamat, A., Cheng, L.K., Krejcar, O.: Machine learning algorithm for malware detection: taxonomy, current challenges and future directions. IEEE Access 11, 141045 (2023)","journal-title":"IEEE Access"},{"key":"567_CR59","doi-asserted-by":"publisher","first-page":"106030","DOI":"10.1016\/j.engappai.2023.106030","volume":"122","author":"K Shaukat","year":"2023","unstructured":"Shaukat, K., Luo, S., Varadharajan, V.: A novel deep learning-based approach for malware detection. Eng. Appl. Artif. Intell. 122, 106030 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"567_CR60","doi-asserted-by":"publisher","first-page":"2023764","DOI":"10.1080\/17517575.2021.2023764","volume":"17","author":"A Gaurav","year":"2023","unstructured":"Gaurav, A., Gupta, B.B., Panigrahi, P.K.: A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterp. Inf. Syst. 17, 2023764 (2023)","journal-title":"Enterp. Inf. Syst."},{"key":"567_CR61","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TETCI.2023.3281833","volume":"7","author":"L Shu","year":"2023","unstructured":"Shu, L., Dong, S., Su, H., Huang, J.: Android malware detection methods based on convolutional neural network: a survey. IEEE Trans. Emerg. Top. Comput. Intell. 7, 1330 (2023)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"567_CR62","doi-asserted-by":"publisher","first-page":"108601","DOI":"10.1016\/j.compeleceng.2023.108601","volume":"106","author":"J Singh","year":"2023","unstructured":"Singh, J., Sharma, K., Wazid, M., Das, A.K.: SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme. Comput. Electr. Eng. 106, 108601 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"567_CR63","doi-asserted-by":"publisher","first-page":"2678","DOI":"10.1016\/j.matpr.2021.07.012","volume":"80","author":"A-AM Majid","year":"2023","unstructured":"Majid, A.-A.M., Alshaibi, A.J., Kostyuchenko, E., Shelupanov, A.: A review of artificial intelligence based malware detection using deep learning. Mater. Today Proc. 80, 2678\u20132683 (2023)","journal-title":"Mater. Today Proc."},{"key":"567_CR64","doi-asserted-by":"publisher","first-page":"110389","DOI":"10.1016\/j.asoc.2023.110389","volume":"143","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y., Feng, F., Liao, Z., Li, Z., Yao, S.: Universal backdoor attack on deep neural networks for malware detection. Appl. Soft Comput. 143, 110389 (2023)","journal-title":"Appl. Soft Comput."},{"key":"567_CR65","doi-asserted-by":"publisher","first-page":"110676","DOI":"10.1016\/j.asoc.2023.110676","volume":"146","author":"S Kumar","year":"2023","unstructured":"Kumar, S., Panda, K.: SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification. Appl. Soft Comput. 146, 110676 (2023)","journal-title":"Appl. Soft Comput."},{"key":"567_CR66","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/MSP.2021.3130549","volume":"39","author":"E Bjornson","year":"2022","unstructured":"Bjornson, E., Wymeersch, H., Matthiesen, B., Popovski, P., Sanguinetti, L., De Carvalho, E.: Reconfigurable intelligent surfaces: A signal processing perspective with wireless applications. IEEE Signal. Process. Mag. 39, 135\u2013158 (2022)","journal-title":"IEEE Signal. Process. Mag"},{"key":"567_CR67","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2020.3016905","volume":"38","author":"V Monga","year":"2021","unstructured":"Monga, V., Li, Y., Eldar, Y.C.: Algorithm unrolling: Interpretable, efficient deep learning for signal and image processing. IEEE Signal. Process. Mag. 38, 18\u201344 (2021)","journal-title":"IEEE Signal. Process. Mag"},{"key":"567_CR68","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/LCSYS.2023.3282445","volume":"7","author":"RA Gonzalez","year":"2023","unstructured":"Gonzalez, R.A., Rojas, C.R., Pan, S., Welsh, J.S.: On the relation between discrete and continuous-time refined instrumental variable methods. IEEE Control Syst. Lett. 7, 2233 (2023)","journal-title":"IEEE Control Syst. Lett."},{"key":"567_CR69","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10916-008-9231-z","volume":"34","author":"DP Subha","year":"2010","unstructured":"Subha, D.P., Joseph, P.K., Acharya, U., Lim, R.: EEG signal analysis: a survey. J. Med. Syst. 34, 195\u2013212 (2010)","journal-title":"J. Med. Syst."},{"key":"567_CR70","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s42979-024-02773-w","volume":"5","author":"R Sharma","year":"2024","unstructured":"Sharma, R., Meena, H.K.: Emerging trends in EEG signal processing: A systematic review. SN Comput. Sci. 5, 415 (2024)","journal-title":"SN Comput. Sci."},{"key":"567_CR71","first-page":"100546","volume":"16","author":"A Bensaoud","year":"2024","unstructured":"Bensaoud, A., Kalita, J., Bensaoud, M.: A survey of malware detection using deep learning. Mach. Learn. Appl. 16, 100546 (2024)","journal-title":"Mach. Learn. Appl."},{"key":"567_CR72","doi-asserted-by":"publisher","first-page":"H2039","DOI":"10.1152\/ajpheart.2000.278.6.H2039","volume":"278","author":"JS Richman","year":"2000","unstructured":"Richman, J.S., Moorman, J.R.: Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol. Circ. Physiol. 278, H2039\u2013H2049 (2000)","journal-title":"Am. J. Physiol. Circ. Physiol."},{"key":"567_CR73","first-page":"12060","volume":"1732","author":"X Zeng","year":"2021","unstructured":"Zeng, X., Wan, L., Liu, H.: Comparative analysis of three distribution entropy methods for chaos recognition. J. Phys.: Conf. Ser. 1732, 12060 (2021)","journal-title":"J. Phys.: Conf. Ser."},{"key":"567_CR74","doi-asserted-by":"publisher","first-page":"425","DOI":"10.3390\/e20060425","volume":"20","author":"Z Chen","year":"2018","unstructured":"Chen, Z., Li, Y., Liang, H., Yu, J.: Hierarchical cosine similarity entropy for feature extraction of ship-radiated noise. Entropy. 20, 425 (2018)","journal-title":"Entropy"},{"key":"567_CR75","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.compbiomed.2018.01.009","volume":"95","author":"X Liu","year":"2018","unstructured":"Liu, X., Wang, X., Zhou, X., Jiang, A.: Appropriate use of the increment entropy for electrophysiological time series. Comput. Biol. Med. 95, 13\u201323 (2018)","journal-title":"Comput. Biol. Med."},{"key":"567_CR76","doi-asserted-by":"publisher","first-page":"2338","DOI":"10.1103\/PhysRevA.14.2338","volume":"14","author":"G Benettin","year":"1976","unstructured":"Benettin, G., Galgani, L., Strelcyn, J.-M.: Kolmogorov entropy and numerical experiments. Phys. Rev. A. 14, 2338 (1976)","journal-title":"Phys. Rev. A"},{"key":"567_CR77","doi-asserted-by":"publisher","first-page":"105006","DOI":"10.1088\/1361-6579\/ab499e","volume":"40","author":"A Rohila","year":"2019","unstructured":"Rohila, A., Sharma, A.: Phase entropy: A new complexity measure for heart rate variability. Physiol. Meas. 40, 105006 (2019)","journal-title":"Physiol. Meas."},{"key":"567_CR78","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.ymssp.2016.12.040","volume":"91","author":"Y Li","year":"2017","unstructured":"Li, Y., Yang, Y., Li, G., Xu, M., Huang, W.: A fault diagnosis scheme for planetary gearboxes using modified multi-scale symbolic dynamic entropy and mRMR feature selection. Mech. Syst. Signal. Process. 91, 295\u2013312 (2017)","journal-title":"Mech. Syst. Signal. Process."},{"key":"567_CR79","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/LSP.2016.2542881","volume":"23","author":"M Rostaghi","year":"2016","unstructured":"Rostaghi, M., Azami, H.: Dispersion entropy: A measure for time-series analysis. IEEE Signal. Process. Lett. 23, 610\u2013614 (2016)","journal-title":"IEEE Signal. Process. Lett."},{"key":"567_CR80","doi-asserted-by":"publisher","first-page":"21906","DOI":"10.1103\/PhysRevE.71.021906","volume":"71","author":"M Costa","year":"2005","unstructured":"Costa, M., Goldberger, A.L., Peng, C.-K.: Multiscale entropy analysis of biological signals. Phys. Rev. E. 71, 21906 (2005)","journal-title":"Phys. Rev. E"},{"key":"567_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep00315","volume":"2","author":"RM Bryce","year":"2012","unstructured":"Bryce, R.M., Sprague, K.B.: Revisiting detrended fluctuation analysis. Sci. Rep. 2, 1\u20136 (2012)","journal-title":"Sci. Rep."},{"key":"567_CR82","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1088\/1741-2560\/1\/4\/004","volume":"1","author":"R Boostani","year":"2004","unstructured":"Boostani, R., Moradi, M.H.: A new approach in the BCI research based on fractal dimension as feature and Adaboost as classifier. J. Neural Eng. 1, 212 (2004)","journal-title":"J. Neural Eng."},{"key":"567_CR83","doi-asserted-by":"publisher","first-page":"66114","DOI":"10.1103\/PhysRevE.84.066114","volume":"84","author":"J Qi","year":"2011","unstructured":"Qi, J., Yang, H.: Hurst exponents for short time series. Phys. Rev. E. 84, 66114 (2011)","journal-title":"Phys. Rev. E"},{"key":"567_CR84","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.3390\/e15031069","volume":"15","author":"S-D Wu","year":"2013","unstructured":"Wu, S.-D., Wu, C.-W., Lin, S.-G., Wang, C.-C., Lee, K.-Y.: Time series analysis using composite multiscale entropy. Entropy. 15, 1069\u20131084 (2013)","journal-title":"Entropy"},{"key":"567_CR85","doi-asserted-by":"publisher","first-page":"2872","DOI":"10.1109\/TBME.2017.2679136","volume":"64","author":"H Azami","year":"2017","unstructured":"Azami, H., Rostaghi, M., Abasolo, D., Escudero, J.: Refined composite multiscale dispersion entropy and its application to biomedical signals. IEEE Trans. Biomed. Eng. 64, 2872\u20132879 (2017)","journal-title":"IEEE Trans. Biomed. Eng."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00567-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-025-00567-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00567-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T19:03:02Z","timestamp":1764010982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-025-00567-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":85,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["567"],"URL":"https:\/\/doi.org\/10.1007\/s11416-025-00567-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2025,7,16]]},"assertion":[{"value":"26 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"20"}}