{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:30:08Z","timestamp":1772303408591,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02516-3","type":"journal-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T13:02:51Z","timestamp":1704718971000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach"],"prefix":"10.1007","volume":"5","author":[{"given":"Praful R.","family":"Pardhi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5295-1110","authenticated-orcid":false,"given":"Jitendra Kumar","family":"Rout","sequence":"additional","affiliation":[]},{"given":"Niranjan Kumar","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Santosh Kumar","family":"Sahu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,8]]},"reference":[{"key":"2516_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101682","volume":"89","author":"X Liu","year":"2020","unstructured":"Liu X, Lin Y, Li H, Zhang J. A novel method for malware detection on ml-based visualization technique. Comp Secur. 2020;89:101682.","journal-title":"Comp Secur"},{"key":"2516_CR2","doi-asserted-by":"crossref","unstructured":"Agarkar S, Ghosh S. Malware detection & classification using machine learning. In: IEEE International Symposium on Sustainable Energy. Signal Processing and Cyber Security (iSSSC). 2020;2020:1\u20136.","DOI":"10.1109\/iSSSC50941.2020.9358835"},{"key":"2516_CR3","doi-asserted-by":"crossref","unstructured":"Priyadarshan P, Sarangi P, Rath A, Panda G. Machine learning based improved malware detection schemes. In: 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2021; pp. 925\u2013931.","DOI":"10.1109\/Confluence51648.2021.9377123"},{"issue":"3","key":"2516_CR4","doi-asserted-by":"publisher","first-page":"4182","DOI":"10.1007\/s11227-021-04020-y","volume":"78","author":"S Li","year":"2022","unstructured":"Li S, Zhou Q, Zhou R, Lv Q. Intelligent malware detection based on graph convolutional network. J Supercomput. 2022;78(3):4182\u201398.","journal-title":"J Supercomput"},{"key":"2516_CR5","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s11265-020-01588-1","volume":"93","author":"X Huang","year":"2021","unstructured":"Huang X, Ma L, Yang W, Zhong Y. A method for windows malware detection based on deep learning. J Signal Process Syst. 2021;93:265\u201373.","journal-title":"J Signal Process Syst"},{"key":"2516_CR6","doi-asserted-by":"crossref","unstructured":"Kumar AA, Anoosh G, Abhishek M, Shraddha C. An effective machine learning-based file malware detection-a survey. In: Proceedings of International Conference on Communication, Computing and Electronics Systems (ICCCES 2019), 2020; pp. 355\u2013360.","DOI":"10.1007\/978-981-15-2612-1_34"},{"issue":"10","key":"2516_CR7","doi-asserted-by":"publisher","first-page":"5183","DOI":"10.1007\/s00521-020-05309-4","volume":"33","author":"A Mahindru","year":"2021","unstructured":"Mahindru A, Sangal A. Mldroid-framework for android malware detection using machine learning techniques. Neural Comput Appl. 2021;33(10):5183\u2013240.","journal-title":"Neural Comput Appl"},{"key":"2516_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-020-3132-2","volume":"2","author":"HM \u00dcnver","year":"2020","unstructured":"\u00dcnver HM, Bakour K. Android malware detection based on image-based features and machine learning techniques. SN Appl Sci. 2020;2:1\u201315.","journal-title":"SN Appl Sci"},{"issue":"1","key":"2516_CR9","doi-asserted-by":"publisher","first-page":"2007327","DOI":"10.1080\/08839514.2021.2007327","volume":"36","author":"L Meijin","year":"2022","unstructured":"Meijin L, Zhiyang F, Junfeng W, Luyu C, Qi Z, Tao Y, Yinwei W, Jiaxuan G. A systematic overview of android malware detection. Appl Artif Intell. 2022;36(1):2007327.","journal-title":"Appl Artif Intell"},{"key":"2516_CR10","doi-asserted-by":"crossref","unstructured":"Mareschal B, Kaur M, Kharat V, Sakhare SS. Convergence of smart technologies for digital transformation. Tehni\u010dki glasnik 2021;15(1):II\u2013IV.","DOI":"10.31803\/tg-20210225102651"},{"key":"2516_CR11","doi-asserted-by":"crossref","unstructured":"Baghirov E. Techniques of malware detection: Research review. In: 2021 IEEE 15th International Conference on Application of Information and Communication Technologies (AICT), 2021; pp. 1\u20136.","DOI":"10.1109\/AICT52784.2021.9620415"},{"key":"2516_CR12","doi-asserted-by":"crossref","unstructured":"Wen L, Yu H. An android malware detection system based on machine learning. AIP Confer Proc. 2017;1864(1):020136.","DOI":"10.1063\/1.4992953"},{"issue":"4","key":"2516_CR13","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1089\/big.2020.0201","volume":"9","author":"SK Sahu","year":"2021","unstructured":"Sahu SK, Mohapatra DP, Rout JK, Sahoo KS, Luhach AK. An ensemble-based scalable approach for intrusion detection using big data framework. Big Data. 2021;9(4):303\u201321.","journal-title":"Big Data"},{"key":"2516_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101655","volume":"89","author":"AN Jahromi","year":"2020","unstructured":"Jahromi AN, Hashemi S, Dehghantanha A, Choo KKR, Karimipour H, Newton DE, Parizi RM. An improved two-hidden-layer extreme learning machine for malware hunting. Comput Secur. 2020;89:101655.","journal-title":"Comput Secur"},{"key":"2516_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.05.026","volume":"535","author":"S Jeon","year":"2020","unstructured":"Jeon S, Moon J. Malware-detection method with a convolutional recurrent neural network using opcode sequences. Inf Sci. 2020;535:1\u201315.","journal-title":"Inf Sci"},{"issue":"2021","key":"2516_CR16","first-page":"311","volume":"1","author":"P Agrawal","year":"2020","unstructured":"Agrawal P, Trivedi B. Machine learning classifiers for android malware detection. Data Manage Anal Innov Proc ICDMAI. 2020;1(2021):311\u201322.","journal-title":"Data Manage Anal Innov Proc ICDMAI"},{"key":"2516_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113022","volume":"143","author":"M Wadkar","year":"2020","unstructured":"Wadkar M, Troia FD, Stamp M. Detecting malware evolution using support vector machines. Expert Syst Appl. 2020;143:113022.","journal-title":"Expert Syst Appl."},{"issue":"1","key":"2516_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-017-0124-3","volume":"8","author":"A Souri","year":"2018","unstructured":"Souri A, Hosseini R. A state-of-the-art survey of malware detection approaches using data mining techniques. Human-centric Comput Inform Sci. 2018;8(1):1\u201322.","journal-title":"Human-centric Comput Inform Sci"},{"key":"2516_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A Damodaran","year":"2017","unstructured":"Damodaran A, Troia FD, Visaggio CA, Austin TH, Stamp M. A comparison of static, dynamic, and hybrid analysis for malware detection. J Comp Virol Hack Tech. 2017;13:1\u201312.","journal-title":"J Comp Virol Hack Tech"},{"issue":"4","key":"2516_CR20","first-page":"6031","volume":"29","author":"MVR Kumar","year":"2020","unstructured":"Kumar MVR, Kumar A, Bando A, Shah H, Reddy SC. A survey of deep learning techniques for malware analysis. Int J Adv Sci Technol. 2020;29(4):6031\u201342.","journal-title":"Int J Adv Sci Technol"},{"key":"2516_CR21","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11416-018-0322-1","volume":"15","author":"A Raghavan","year":"2019","unstructured":"Raghavan A, Troia FD, Stamp M. Hidden markov models with random restarts versus boosting for malware detection. J Comput Virol Hack Tech. 2019;15:97\u2013107.","journal-title":"J Comput Virol Hack Tech"},{"issue":"1","key":"2516_CR22","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s42979-021-00979-w","volume":"3","author":"AV Chandak","year":"2022","unstructured":"Chandak AV, Ray NK. IOT data classifications for smart home deployment. SN Comput Sci. 2022;3(1):95.","journal-title":"SN Comput Sci"},{"issue":"6","key":"2516_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5173","volume":"32","author":"H Darabian","year":"2020","unstructured":"Darabian H, Dehghantanha A, Hashemi S, Homayoun S, Choo KKR. An opcode-based technique for polymorphic internet of things malware detection. Concurr Comput Pract Exp. 2020;32(6):e5173.","journal-title":"Concurr Comput Pract Exp."},{"key":"2516_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-019-1124-x","volume":"1","author":"K Bakour","year":"2019","unstructured":"Bakour K, \u00dcnver HM, Ghanem R. The android malware detection systems between hope and reality. SN Appl Sci. 2019;1:1\u201342.","journal-title":"SN Appl Sci"},{"issue":"6","key":"2516_CR25","first-page":"1253","volume":"9","author":"MA Abbadi","year":"2020","unstructured":"Abbadi MA, Al-Bustanji AM, Al-kasassbeh M. Robust intelligent malware detection using lightgbm algorithm. Int J Innov Technol Explo Eng. 2020;9(6):1253\u201360.","journal-title":"Int J Innov Technol Explo Eng"},{"issue":"1","key":"2516_CR26","doi-asserted-by":"publisher","first-page":"2007327","DOI":"10.1080\/08839514.2021.2007327","volume":"36","author":"L Meijin","year":"2022","unstructured":"Meijin L, Zhiyang F, Junfeng W, Luyu C, Qi Z, Tao Y, Yinwei W, Jiaxuan G. A systematic overview of android malware detection. Appl Artif Intell. 2022;36(1):2007327. https:\/\/doi.org\/10.1080\/08839514.2021.2007327.","journal-title":"Appl Artif Intell"},{"key":"2516_CR27","unstructured":"Ren Z, Chen G, Lu W. Malware visualization methods based on deep convolution neural networks. Multimedia Tools Appl 2020;79;10-975\u201310-993."},{"key":"2516_CR28","volume":"54","author":"R Surendran","year":"2020","unstructured":"Surendran R, Thomas T, Emmanuel S. A tan based hybrid model for android malware detection. J Inform Secur Appl. 2020;54:102483.","journal-title":"J Inform Secur Appl"},{"key":"2516_CR29","unstructured":"Subhadeep C. Android malware detection. https:\/\/www.kaggle.com\/dsv\/4987461. 2023. Accessed 15 July 2023."},{"key":"2516_CR30","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.jnca.2017.11.007","volume":"103","author":"G Aceto","year":"2018","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e9 A. Multi-classification approaches for classifying mobile app traffic. J Netw Comput Appl. 2018;103:131\u201345.","journal-title":"J Netw Comput Appl"},{"key":"2516_CR31","doi-asserted-by":"crossref","unstructured":"Baldwin J, Dehghantanha A. Leveraging support vector machine for opcode density based detection of crypto-ransomware. Cyber Threat Intell 2018;107\u2013136.","DOI":"10.1007\/978-3-319-73951-9_6"},{"issue":"6","key":"2516_CR32","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/s42979-022-01387-4","volume":"3","author":"MK Pandey","year":"2022","unstructured":"Pandey MK, Singh MK, Pal S, Tiwari BB. Prediction of phishing websites using stacked ensemble method and hybrid features selection method. SN Comp Sci. 2022;3(6):488.","journal-title":"SN Comp Sci"},{"issue":"3","key":"2516_CR33","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.3233\/JIFS-169424","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar R, Soman K, Poornachandran P, Sachin Kumar S. Detecting android malware using long short-term memory (lstm). J Intell Fuzzy Syst. 2018;34(3):1277\u201388.","journal-title":"J Intell Fuzzy Syst."},{"key":"2516_CR34","doi-asserted-by":"crossref","unstructured":"Akhtar N, Mian A. Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 2018;6:14-410\u201314-430.","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"2516_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee MK, Yerima SY, Sezer S. Dl-droid: Deep learning based android malware detection using real devices. Comp Secur. 2020;89:101663.","journal-title":"Comp Secu."},{"key":"2516_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107720","volume":"99","author":"SK Sahu","year":"2022","unstructured":"Sahu SK, Mohapatra DP, Rout JK, Sahoo KS, Pham QV, Dao NN. A LSTM-FCNN based multi-class intrusion detection using scalable framework. Compu Electr Eng. 2022;99:107720.","journal-title":"Compu Electr Eng."}],"updated-by":[{"DOI":"10.1007\/s42979-024-02669-9","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T00:00:00Z","timestamp":1707523200000}}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02516-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02516-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02516-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T15:17:01Z","timestamp":1707578221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02516-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["2516"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02516-3","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s42979-024-02669-9","asserted-by":"object"}]},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,8]]},"assertion":[{"value":"15 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2024","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s42979-024-02669-9","URL":"https:\/\/doi.org\/10.1007\/s42979-024-02669-9","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This is to acknowledge that, this manuscript is original, has not been published before and is not currently being considered for publication elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"162"}}