{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T13:16:53Z","timestamp":1774617413823,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1145\/3454127.3457631","type":"proceedings-article","created":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T05:13:07Z","timestamp":1637989987000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["TRANSFER LEARNING AND SMOTE ALGORITHM FOR IMAGE-BASED MALWARE CLASSIFICATION"],"prefix":"10.1145","author":[{"given":"Prima","family":"Bouchaib","sequence":"first","affiliation":[{"name":"Abdelmalek Essaadi University, Morocco"}]},{"given":"Mohammed","family":"Bouhorma","sequence":"additional","affiliation":[{"name":"Abdelmalek Essaadi University, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2021,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fabio Di Troia, and Mark Stamp","author":"Bhodia Niket","year":"2019","unstructured":"Niket Bhodia , Pratikkumar Prajapati , Fabio Di Troia, and Mark Stamp . 2019 . Transfer Learning for Image-based Malware Classification: In Proceedings of the 5th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications, Prague, Czech Republic , 719\u2013726. DOI:https:\/\/doi.org\/10.5220\/0007701407190726 10.5220\/0007701407190726 Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, and Mark Stamp. 2019. Transfer Learning for Image-based Malware Classification: In Proceedings of the 5th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications, Prague, Czech Republic, 719\u2013726. DOI:https:\/\/doi.org\/10.5220\/0007701407190726"},{"key":"e_1_3_2_1_2_1","volume-title":"Global Security, Safety and Sustainability - The Security Challenges of the Connected World, Hamid Jahankhani, Alex Carlile, David Emm, Amin Hosseinian-Far","author":"Bounouh Tewfik","unstructured":"Tewfik Bounouh , Zakaria Brahimi , Ameer Al-Nemrat , and Chafika Benzaid . 2016. A Scalable Malware Classification Based on Integrated Static and Dynamic Features . In Global Security, Safety and Sustainability - The Security Challenges of the Connected World, Hamid Jahankhani, Alex Carlile, David Emm, Amin Hosseinian-Far , Guy Brown, Graham Sexton and Arshad Jamal (eds.). Springer International Publishing , Cham , 113\u2013124. DOI:https:\/\/doi.org\/10.1007\/978-3-319-51064-4_10 10.1007\/978-3-319-51064-4_10 Tewfik Bounouh, Zakaria Brahimi, Ameer Al-Nemrat, and Chafika Benzaid. 2016. A Scalable Malware Classification Based on Integrated Static and Dynamic Features. In Global Security, Safety and Sustainability - The Security Challenges of the Connected World, Hamid Jahankhani, Alex Carlile, David Emm, Amin Hosseinian-Far, Guy Brown, Graham Sexton and Arshad Jamal (eds.). Springer International Publishing, Cham, 113\u2013124. DOI:https:\/\/doi.org\/10.1007\/978-3-319-51064-4_10"},{"key":"e_1_3_2_1_3_1","volume-title":"SMOTE: Synthetic Minority Over-sampling Technique. jair 16, (June","author":"Chawla N. V.","year":"2002","unstructured":"N. V. Chawla , K. W. Bowyer , L. O. Hall , and W. P. Kegelmeyer . 2002 . SMOTE: Synthetic Minority Over-sampling Technique. jair 16, (June 2002), 321\u2013357. DOI:https:\/\/doi.org\/10.1613\/jair.953 10.1613\/jair.953 N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. jair 16, (June 2002), 321\u2013357. DOI:https:\/\/doi.org\/10.1613\/jair.953"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-018-0323-0"},{"key":"e_1_3_2_1_7_1","unstructured":"Deguang Kong and Guanhua Yan. Discriminant malware distance learning on structural information for automated malware classification. 9.  Deguang Kong and Guanhua Yan. Discriminant malware distance learning on structural information for automated malware classification. 9."},{"key":"e_1_3_2_1_8_1","unstructured":"Andreas Moser Christopher Kruegel and Engin Kirda. Limits of Static Analysis for Malware Detection. 10.  Andreas Moser Christopher Kruegel and Engin Kirda. Limits of Static Analysis for Malware Detection. 10."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 8th International Symposium on Visualization for Cyber Security - VizSec \u201911","author":"Nataraj L.","year":"2016","unstructured":"L. Nataraj , S. Karthikeyan , G. Jacob , and B. S. Manjunath . 2011. Malware images: visualization and automatic classification . In Proceedings of the 8th International Symposium on Visualization for Cyber Security - VizSec \u201911 , ACM Press, Pittsburgh, Pennsylvania, 1\u20137. DOI:https:\/\/doi.org\/10.1145\/ 2016 904.2016908 10.1145\/2016904.2016908 L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath. 2011. Malware images: visualization and automatic classification. In Proceedings of the 8th International Symposium on Visualization for Cyber Security - VizSec \u201911, ACM Press, Pittsburgh, Pennsylvania, 1\u20137. DOI:https:\/\/doi.org\/10.1145\/2016904.2016908"},{"key":"#cr-split#-e_1_3_2_1_10_1.1","doi-asserted-by":"crossref","unstructured":"B. Prima and M. Bouhorma. 2020. USING TRANSFER LEARNING FOR MALWARE CLASSIFICATION. Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci. XLIV-4\/W3-2020 (November 2020) 343-349. DOI:https:\/\/doi.org\/10.5194\/isprs-archives-XLIV-4-W3-2020-343-2020 10.5194\/isprs-archives-XLIV-4-W3-2020-343-2020","DOI":"10.5194\/isprs-archives-XLIV-4-W3-2020-343-2020"},{"key":"#cr-split#-e_1_3_2_1_10_1.2","doi-asserted-by":"crossref","unstructured":"B. Prima and M. Bouhorma. 2020. USING TRANSFER LEARNING FOR MALWARE CLASSIFICATION. Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci. XLIV-4\/W3-2020 (November 2020) 343-349. DOI:https:\/\/doi.org\/10.5194\/isprs-archives-XLIV-4-W3-2020-343-2020","DOI":"10.5194\/isprs-archives-XLIV-4-W3-2020-343-2020"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Ronen Royi","year":"2018","unstructured":"Royi Ronen , Marian Radu , Corina Feuerstein , Elad Yom-Tov , and Mansour Ahmadi . 2018 . Microsoft Malware Classification Challenge. arXiv:1802.10135 [cs] (February 2018) . Retrieved February 20, 2021 from http:\/\/arxiv.org\/abs\/1802.10135 Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, and Mansour Ahmadi. 2018. Microsoft Malware Classification Challenge. arXiv:1802.10135 [cs] (February 2018). Retrieved February 20, 2021 from http:\/\/arxiv.org\/abs\/1802.10135"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Talukder Sajedul","year":"2020","unstructured":"Sajedul Talukder . 2020 . Tools and Techniques for Malware Detection and Analysis. arXiv:2002.06819 [cs] (June 2020) . Retrieved February 20, 2021 from http:\/\/arxiv.org\/abs\/2002.06819 Sajedul Talukder. 2020. Tools and Techniques for Malware Detection and Analysis. arXiv:2002.06819 [cs] (June 2020). Retrieved February 20, 2021 from http:\/\/arxiv.org\/abs\/2002.06819"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101748"},{"key":"e_1_3_2_1_15_1","volume-title":"Fabio Di Troia, and Mark Stamp.","author":"Yajamanam Sravani","year":"2018","unstructured":"Sravani Yajamanam , Vikash Raja Samuel Selvin , Fabio Di Troia, and Mark Stamp. 2018 . Deep Learning versus Gist Descriptors for Image-based Malware Classification: In Proceedings of the 4th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications, Funchal, Madeira, Portugal , 553\u2013561. DOI:https:\/\/doi.org\/10.5220\/0006685805530561 10.5220\/0006685805530561 Sravani Yajamanam, Vikash Raja Samuel Selvin, Fabio Di Troia, and Mark Stamp. 2018. Deep Learning versus Gist Descriptors for Image-based Malware Classification: In Proceedings of the 4th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications, Funchal, Madeira, Portugal, 553\u2013561. DOI:https:\/\/doi.org\/10.5220\/0006685805530561"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Yue Songqing","year":"2017","unstructured":"Songqing Yue . 2017 . Imbalanced Malware Images Classification: a CNN based Approach. arXiv:1708.08042 [cs, stat] (August 2017) . Retrieved February 20, 2021 from http:\/\/arxiv.org\/abs\/1708.08042 Songqing Yue. 2017. Imbalanced Malware Images Classification: a CNN based Approach. arXiv:1708.08042 [cs, stat] (August 2017). Retrieved February 20, 2021 from http:\/\/arxiv.org\/abs\/1708.08042"},{"key":"e_1_3_2_1_17_1","unstructured":"2020. Global Threat Landscape Report. (2020) 16. Retrieved from https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/threat-report-h1-2020.pdf  2020. Global Threat Landscape Report. (2020) 16. Retrieved from https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/threat-report-h1-2020.pdf"},{"key":"e_1_3_2_1_18_1","volume-title":"juillet","author":"McAfee","year":"2020","unstructured":"McAfee Labs \u2014 Rapport sur le paysage des menaces li\u00e9es au COVID-19 , juillet 2020 . 40. McAfee Labs \u2014 Rapport sur le paysage des menaces li\u00e9es au COVID-19, juillet 2020. 40."},{"key":"e_1_3_2_1_19_1","unstructured":"Keras. Retrieved February 20 2021 from https:\/\/keras.io  Keras. Retrieved February 20 2021 from https:\/\/keras.io"},{"key":"e_1_3_2_1_20_1","unstructured":"scikit-learn. Retrieved February 20 2021 from https:\/\/scikit-learn.org\/stable\/user_guide.html  scikit-learn. Retrieved February 20 2021 from https:\/\/scikit-learn.org\/stable\/user_guide.html"},{"key":"e_1_3_2_1_21_1","unstructured":"tensorflow. Retrieved February 20 2021 from https:\/\/www.tensorflow.org\/  tensorflow. Retrieved February 20 2021 from https:\/\/www.tensorflow.org\/"}],"event":{"name":"NISS2021: The 4th International Conference on Networking, Information Systems & Security.","location":"KENITRA AA Morocco","acronym":"NISS2021"},"container-title":["Proceedings of the 4th International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3454127.3457631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3454127.3457631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:52Z","timestamp":1750268992000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3454127.3457631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":22,"alternative-id":["10.1145\/3454127.3457631","10.1145\/3454127"],"URL":"https:\/\/doi.org\/10.1145\/3454127.3457631","relation":{},"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"2021-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}