{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:55:41Z","timestamp":1776977741813,"version":"3.51.4"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472033","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Malware Detection: A Unified ML-Driven Solution for Threat Detection in Files and URLs"],"prefix":"10.1109","author":[{"given":"S.","family":"Lokeshwaran","sequence":"first","affiliation":[{"name":"IFET College Of Engineering,Computer Science and Engineering,Villupuram,India"}]},{"given":"T. Ananth","family":"Kumar","sequence":"additional","affiliation":[{"name":"IFET College Of Engineering,Computer Science and Engineering,Villupuram,India"}]},{"given":"Sunday Adeola","family":"Ajagbe","sequence":"additional","affiliation":[{"name":"University of Zululand,Department of Computer Science,Kwadlangezwa,South Africa,3886"}]},{"given":"Adekunle O.","family":"Ejidokun","sequence":"additional","affiliation":[{"name":"Kampala International University,Department of Computer Sciences,Uganda"}]},{"given":"P.","family":"Kanimozhi","sequence":"additional","affiliation":[{"name":"IFET College Of Engineering,Computer Science and Engineering,Villupuram,India"}]},{"given":"Pragasen","family":"Mudali","sequence":"additional","affiliation":[{"name":"University of Zululand,Department of Computer Science,Kwadlangezwa,South Africa,3886"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","first-page":"327","article-title":"Android Malware Detection and Classification Using Machine Learning Algorithm","volume":"16","author":"Sonya","year":"2024","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125546"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3412331"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-69986-3_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104182"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.59407\/jdaics.v1i2.717"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3673660.3655042"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30161"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.12700\/APH.21.11.2024.11.14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2174\/9789815079661124010006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICOA62581.2024.10753854"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT61001.2024.10724442"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSNS62112.2024.10690879"},{"key":"ref14","first-page":"1","article-title":"Decoding Cyber Threats: Advanced Techniques In Malware Detection, Analysis, and URL Detection","author":"Padole","year":"2024","journal-title":"Research Square"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3501277"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03414-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT61902.2024.10672781"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.102164"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51664.2024.10454810"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-024-00531-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/AFRICON55910.2023.10293525"},{"issue":"2","key":"ref22","first-page":"250","article-title":"Predictive Analytics for Supply Chain","volume":"12","author":"Sadiku","year":"2025","journal-title":"International Journal of Trend in Research and Development (IJTRD)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.9734\/jerr\/2025\/v27i41456"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472033.pdf?arnumber=11472033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:57:42Z","timestamp":1776974262000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472033","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}