{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T19:15:50Z","timestamp":1776194150764,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/bigdata52589.2021.9671434","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:39:16Z","timestamp":1642106356000},"page":"5369-5377","source":"Crossref","is-referenced-by-count":69,"title":["Malware Detection and Prevention using Artificial Intelligence Techniques"],"prefix":"10.1109","author":[{"given":"Md Jobair","family":"Hossain Faruk","sequence":"first","affiliation":[]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Valero","sequence":"additional","affiliation":[]},{"given":"Farhat Lamia","family":"Barsha","sequence":"additional","affiliation":[]},{"given":"Shahriar","family":"Sobhan","sequence":"additional","affiliation":[]},{"given":"Md Abdullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Whitman","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"Cuzzocrea","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Akond","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Bayesian hyperparameter optimization for deep neural networkbased network intrusion detection","author":"mohammad","year":"2021","journal-title":"IEEE International Conference on Big Data"},{"key":"ref38","article-title":"Intrusion detection system using ai and machine learning algorithm","author":"repalle","year":"2017"},{"key":"ref33","article-title":"Sourcefinder: Finding malware source-code from publicly available repositories","author":"rokon","year":"2020","journal-title":"RAID"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare7020056"},{"key":"ref31","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007","journal-title":"Keele University and Durham University Joint Report Technical Report EBSE-2007-01"},{"key":"ref30","first-page":"593","article-title":"Impact of malware in modern society","volume":"2","year":"2019","journal-title":"Journal of Scientific Research and Development"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757060"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5220\/0007470705280535"},{"key":"ref35","first-page":"333","author":"sharma","year":"2019","journal-title":"Detection of Advanced Malware by Machine Learning Techniques Proceedings of SoCTA 2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6014-9_66"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI44817.2019.9002996"},{"key":"ref27","year":"0","journal-title":"Number of worldwide internet hosts in the domain name system (DNS) from 1993 to 2019"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"33","DOI":"10.5121\/ijnsa.2012.4603","article-title":"Malware detection, supportive software agents and its classification schemes","volume":"4","author":"adebayo","year":"2012","journal-title":"International journal of Network Security &amp; Its Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5937\/IJCRSEE1601009A"},{"key":"ref1","first-page":"335","article-title":"On the emergence of new computer technologies","volume":"9","author":"asaolu","year":"2006","journal-title":"Educational Technology Society"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2019.8858791"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1142\/1\/012012"},{"key":"ref21","author":"cranage","year":"2019","journal-title":"Getting smart about artificial intelligence"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14421\/ijid.2020.09101","article-title":"Malware in computer systems: Problems and solutions","volume":"9","author":"ahmad","year":"2020","journal-title":"IJID (International J Informatics Dev"},{"key":"ref23","author":"ayodele","year":"2010","journal-title":"An Overview Machine Learning"},{"key":"ref26","article-title":"Types of malware and its analysis","volume":"4","author":"gupta","year":"2013","journal-title":"International Journal of Scientific Engineering Research"},{"key":"ref25","first-page":"58","article-title":"History of malware","volume":"1","author":"milosevic","year":"2013","journal-title":"Digital Forensics Magazine"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1063\/1.4992953"},{"key":"ref10","article-title":"An overview of computer viruses in a research environment","author":"bishop","year":"1991","journal-title":"Tech Rep"},{"key":"ref11","article-title":"A study of past, present computer virus perfor- mance of selected security tools","author":"patil","year":"2012","journal-title":"South Econom J"},{"key":"ref40","article-title":"Signature based network intrusion detection system using feature selection on android","volume":"11","author":"onyedeke","year":"2020","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref12","author":"terekhov","year":"0","journal-title":"History of the antivirus"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDH52753.2021.00054"},{"key":"ref14","article-title":"Ehr data management: Hyperledger fabric-based health data storing and sharing","author":"hossain faruk","year":"2021","journal-title":"The Fall 2021 Symposium of Student Scholars"},{"key":"ref15","article-title":"Ride-hailing for autonomous vehicles: Hyperledger fabric-based secure and decentralize blockchain platform","author":"ryan","year":"2021","journal-title":"IEEE International Conference on Big Data"},{"key":"ref16","author":"vigna","year":"2020","journal-title":"How ai will help in the fight against malware"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/ai1020008"},{"key":"ref18","author":"nones","year":"2019","journal-title":"Journal of Artificial Intelligence (AI)"},{"key":"ref19","year":"2020","journal-title":"Journal of Artificial Intelligence Reasoning"},{"key":"ref4","article-title":"Smart connected aircraft: Towards security, privacy, and ethical hacking","author":"md jobair","year":"2022","journal-title":"International Conference on Security of Information and Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.13189\/ujer.2014.020206"},{"key":"ref6","article-title":"The program with a personality: Analysis of elk cloner, the first personal computer virus","author":"levy","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/45.969588"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00067"},{"key":"ref7","article-title":"History of malware","author":"milosevic","year":"2013"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04020-y"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/07419051211280036"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2013.6620049"},{"key":"ref45","article-title":"Fuzzy data mining and genetic algorithms applied to intrusion detection","author":"bridges","year":"2002"},{"key":"ref48","article-title":"A virtual machine introspection based architecture for intrusion detection","volume":"3","author":"garfinkel","year":"2003","journal-title":"NDSS"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757060"},{"key":"ref42","article-title":"Diverse methods for signature based intrusion detection schemes adopted","author":"jyoti","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557167"},{"key":"ref44","volume":"abs cs 604026","author":"bolzoni","year":"2006","journal-title":"Aphrodite an anomaly-based architecture for false positive reduction"},{"key":"ref43","author":"veeramreddy","year":"2019","journal-title":"A review of anomaly based intrusion detection systems"}],"event":{"name":"2021 IEEE International Conference on Big Data (Big Data)","location":"Orlando, FL, USA","start":{"date-parts":[[2021,12,15]]},"end":{"date-parts":[[2021,12,18]]}},"container-title":["2021 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9671263\/9671273\/09671434.pdf?arnumber=9671434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:21Z","timestamp":1652201721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9671434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/bigdata52589.2021.9671434","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}