{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:06:37Z","timestamp":1772726797230,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10226049","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T13:26:12Z","timestamp":1693315572000},"page":"196-201","source":"Crossref","is-referenced-by-count":4,"title":["Feature Selection for High-Dimensional Imbalanced Malware Data Using Filter and Wrapper Selection Methods"],"prefix":"10.1109","author":[{"given":"Mai","family":"Abujazoh","sequence":"first","affiliation":[{"name":"University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Duha","family":"Al-Darras","sequence":"additional","affiliation":[{"name":"University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Nesreen","family":"A. Hamad","sequence":"additional","affiliation":[{"name":"Al-zaytoonah University of Jordan,Department of Artificial Intelligence,Amman,Jordan"}]},{"given":"Saleh","family":"Al-Sharaeh","sequence":"additional","affiliation":[{"name":"University of Jordan,Department of Computer Science,Amman,Jordan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.11.012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(00)00122-2"},{"key":"ref12","article-title":"Malware static and dynamic features VxHeaven and Virus Total","year":"2019","journal-title":"UCI Machine Learning Repository"},{"key":"ref23","first-page":"4102","article-title":"Review of data preprocessing techniques in data mining","volume":"12","author":"alasadi","year":"2017","journal-title":"Journal of Engineering and Applied Sciences"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.06.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2818-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/en14071867"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.10.243"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-813314-9.00010-4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.11.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100462"},{"key":"ref1","first-page":"13","article-title":"A comparative study of classification techniques in data mining algorithms","volume":"8","author":"nikam","year":"2015","journal-title":"Oriental Journal of Computer Science & Technology"},{"key":"ref17","article-title":"Perfor-mance evaluation of various ensemble classifiers for malware detection","author":"dhanya","year":"0","journal-title":"Materials Today Proceedings"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2150","DOI":"10.3390\/s22062150","article-title":"FILM: Filtering and Machine Learning for Malware Detection in Edge Computing","volume":"22","author":"kim","year":"2022","journal-title":"SENSORS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02907-5"},{"key":"ref8","author":"kingston","year":"2004","journal-title":"A statistical input pruning method for artificial neural networks used in environmental modelling"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745366"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056407"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1504\/IJBDI.2016.073903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.111"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","location":"Amman, Jordan","start":{"date-parts":[[2023,8,9]]},"end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10226049.pdf?arnumber=10226049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T13:43:40Z","timestamp":1695044620000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10226049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10226049","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}