{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:40:07Z","timestamp":1743068407401,"version":"3.40.3"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T00:00:00Z","timestamp":1734393600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T00:00:00Z","timestamp":1734393600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,17]]},"DOI":"10.1109\/icca62237.2024.10928153","type":"proceedings-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:16:27Z","timestamp":1743041787000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Malware Detection and Identification Methods"],"prefix":"10.1109","author":[{"given":"Fahad","family":"Mira","sequence":"first","affiliation":[{"name":"University of Bedfordshire,Department of Computer Science and Technology,United Kingdom"}]}],"member":"263","reference":[{"journal-title":"McafeeandLab, 2013Threats Predictions","year":"2013","key":"ref1"},{"journal-title":"DataMalwareReport.","year":"2010","author":"Berkenkopf","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1557019"},{"journal-title":"MalheurA novel tool for malware analysis","year":"2012","author":"Rieck","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.127"},{"journal-title":"Malware Detection Based on Hybrid Signature","author":"Ahmed","key":"ref6"},{"issue":"3","key":"ref7","first-page":"283","volume":"9","year":"2012","journal-title":"BehaviourApplicationProgrammingInterfaceCall Graph.AmencanJournalofAppliedSciences"},{"issue":"3","key":"ref8","article-title":"Metamorphic Malware Detection Using Statistical Analysis","volume":"2","author":"Kevadia Kaushal","year":"2012","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3087316"},{"first-page":"32","volume-title":"Semantics-AwareMalware Detection, in Proceedings of the 2005 IEEE Symposium onSecurity andPrivacy","author":"Christodorescu","key":"ref10"},{"first-page":"116","volume-title":"Panorama: capturing system-wide information flow for malware detection and analysis, in Proceedings of the 14th ACM conference on Computer and communications security","author":"Yin","key":"ref11"},{"journal-title":"Survey on MalwareDetection Methods","year":"2009","author":"Vinod","key":"ref12"},{"journal-title":"whatiscloudAnti-Virusandhowitdoes work","author":"Zeltser","key":"ref13"},{"key":"ref14","first-page":"198","article-title":"\u201cOut-of-the-box\u201d monitoring of VM-based high-interaction honeypots","volume-title":"International Workshop on Recent Advances in Intrusion Detection","author":"Jiang","year":"2007"},{"journal-title":"Automateddynamicbinaryanalysis","year":"2007","key":"ref15"},{"journal-title":"Data Science: From Research to","article-title":"Static signature-based malware detection using opcode and binary information","author":"Azadeh","key":"ref16"},{"journal-title":"Application. SpringerInternationalPublishing","year":"2020","key":"ref17"},{"first-page":"351","volume-title":"Effective and efficient malware detection at the end host, in Proceedings of the 18th conference on USENIX security symposium","author":"Kolbitsch","key":"ref18"},{"journal-title":"A review of cloud-based malware detection system: Opportunities, advances and challenges","author":"Omer","key":"ref19"},{"key":"ref20","first-page":"1","volume":"3","year":"2021","journal-title":"European JournalofEngineeringandTechnologyResearch6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00579-6"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"118073","DOI":"10.1016\/j.eswa.2022.118073","article-title":"Identification of malware families using stacking of textural features and machine learning","volume":"208","author":"Kumar","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"ref23","first-page":"260","volume-title":"Multi-agentPeer-to-PeerIntrusion Detection Computer Network Security","author":"Gorodetsky","year":"2007"},{"journal-title":"AnAgent-Based Framework for Distributed Intrusion Detections","year":"2009","author":"Ye","key":"ref24"},{"first-page":"670","volume-title":"Agent-Basedimmunityfor computer virus: abstraction from dendritic cell algorithm with danger theory, in Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing","author":"Ou","key":"ref25"},{"first-page":"177","volume-title":"Intrusion detection in open peer-to-peermulti-agentsystems,inProceedingsofthe5th International conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and services","author":"Bijani","key":"ref26"},{"volume-title":"Research on adaptive distributed intrusion detection system model based on Multi-Agent.in Computer Science and Automation Engineering (CSAE)","author":"Dong","key":"ref27"},{"key":"ref28","article-title":"Multiagent-based computer virus detection systems","volume-title":"abstraction from dendritic cell algorithm with danger theory","author":"Ou","year":"2011"},{"journal-title":"A Temporal Logic Based Approachto Multi-Agent Intrusion Detection andPrevention","year":"2012","author":"Paritosh Das","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"key":"ref31","article-title":"Mechanisms of Polymorphic and Metamorphic Viruses","volume-title":"Intelligence and Security Informatics Conference (EISIC)","author":"Xufang","year":"2011"},{"journal-title":"STATE OF MALWARE: FAMILY TIES","year":"2010","author":"EroCarrera","key":"ref32"},{"issue":"2","key":"ref33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2089125.2089126","article-title":"A survey on automated dynamic malware-analysis techniques and tools","volume":"44","author":"Egele","year":"2008","journal-title":"ACM Comput. Surv."},{"journal-title":"ASurveyofMalware Detection Techniques","year":"2007","author":"Idika","key":"ref34"},{"journal-title":"DissectingSpam\u2019sPurportedHarms","year":"2003","author":"Goldman","key":"ref35"},{"key":"ref36","article-title":"Algebraic specification of computer viruses and their environments","volume-title":"Selected Papers from the First onference on Algebra and Coalgebra in Computer Science Young Researchers Workshop (CALCO-jnr 2005)","author":"Webster","year":"2005"},{"key":"ref37","article-title":"Malicious Mobile Code: Virus Protection for Windows","author":"Grimes","year":"2001","journal-title":"O\u2019Reilly Media"},{"key":"ref38","article-title":"Detection of anomalous computer session activity. in Security and Privacy","volume-title":"1989. Proceedings., 1989 IEEE Symposium on","author":"Vaccaro","year":"1989"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63857"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63859"},{"key":"ref41","article-title":"A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks (1990)","volume-title":"Proceeding. 13 th National Computer SecurityConference","author":"Winkler","year":"1990"},{"key":"ref42","first-page":"22351","article-title":"Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS 2017 dataset","volume":"9","author":"Ziadoon Kamil","year":"2021","journal-title":"IEEEaccess"},{"key":"ref43","article-title":"APHRODITE: an Anomaly-based Architecture for False Positive Reduction","author":"Bolzoni","year":"2006","journal-title":"Centre for Telematics and Information Technology, University of Twente: Enschede"}],"event":{"name":"2024 International Conference on Computer and Applications (ICCA)","start":{"date-parts":[[2024,12,17]]},"location":"Cairo, Egypt","end":{"date-parts":[[2024,12,19]]}},"container-title":["2024 International Conference on Computer and Applications (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10927736\/10927741\/10928153.pdf?arnumber=10928153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:42:56Z","timestamp":1743064976000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10928153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,17]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/icca62237.2024.10928153","relation":{},"subject":[],"published":{"date-parts":[[2024,12,17]]}}}