{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:20:15Z","timestamp":1758248415652,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647830","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Comprehensive Survey on Malware Detection Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7225-308X","authenticated-orcid":false,"given":"Yogesh Kumar","family":"Joshi","sequence":"first","affiliation":[{"name":"Department of CSE, Ujjain Engineering College, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5926-2204","authenticated-orcid":false,"given":"Nirupma","family":"Tiwari","sequence":"additional","affiliation":[{"name":"Advance CSE , Sage University, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003045908"},{"key":"e_1_3_2_1_2_1","first-page":"46","article-title":"A Review on Fileless Malware Analysis Techniques","volume":"9","author":"Vala K.","year":"2020","unstructured":"K. Vala, \u201cA Review on Fileless Malware Analysis Techniques,\u201d International Journal of Engineering Research & Technology (IJERT), vol. 9, no. May-2020, pp. 46-49, 2020.","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"e_1_3_2_1_3_1","first-page":"2088","article-title":"Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis","volume":"8","author":"Rami S.","year":"2018","unstructured":"S. Rami , O. Khairuddin and K. A. Z. Ariffin, \u201cSurvey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis,\u201d International Journal on Advance Science Engineering Information Technology, vol. 8, pp. 2088-5334, 2018.","journal-title":"International Journal on Advance Science Engineering Information Technology"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805783"},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Malware Analysis Using Visualized Image Matrices","volume":"2014","author":"KyoungSoo H.","year":"2014","unstructured":"H. KyoungSoo, K. BooJoong and I. Eul Gyu , \u201cMalware Analysis Using Visualized Image Matrices,\u201d The Scientific World Journal, vol. 2014, pp. 1-15, 2014.","journal-title":"The Scientific World Journal"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.31979\/etd.ez5v-x8jc"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2017.14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2013.6620049"},{"key":"e_1_3_2_1_11_1","volume-title":"Security and Privacy","author":"Schultz M. G.","year":"2001","unstructured":"M. G. Schultz, E. Eleazar and F. Zadok, \u201cData Mining Methods for Detection of New Malicious Executables,\u201d in Security and Privacy, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_29"},{"issue":"4","key":"e_1_3_2_1_13_1","first-page":"122","article-title":"A Survey of Deep Learning Methods for Cyber Security","volume":"10","author":"Berman D. S.","year":"2019","unstructured":"D. S. Berman, A. L. Buczak, J. S. Chavis and C. L. Corbett, \u201cA Survey of Deep Learning Methods for Cyber Security,\u201d MDPI, Vols. 10(4), 122, 2019.","journal-title":"MDPI"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.24018\/ejeng.2021.6.3.2372"},{"issue":"4","key":"e_1_3_2_1_15_1","first-page":"187","article-title":"Malware Detection in Cloud Computing","volume":"5","author":"Hatem S. S.","year":"2014","unstructured":"S. S. Hatem, M. H. Wafy and M. M. El-Khouly, \u201cMalware Detection in Cloud Computing,\u201d (IJACSA) International Journal of Advanced Computer Science and Applications, , vol. 5, no. 4, pp. 187-192, 2014.","journal-title":"(IJACSA) International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.226"},{"key":"e_1_3_2_1_17_1","first-page":"12218","article-title":"Consortium Blockchain-Based Malware Detection in Mobile Devices","volume":"6","author":"Gu J.","year":"2017","unstructured":"J. Gu, B. Sun, X. Du, J. Wang, Y. Zhuang and Z. Wang, \u201cConsortium Blockchain-Based Malware Detection in Mobile Devices,\u201d Special Section on Research Challenges and Opportuinites in Security, vol. 6, pp. 12218-12128, 2017.","journal-title":"Special Section on Research Challenges and Opportuinites in Security"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.18100\/ijamec.526813"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMAI.2017.8073489"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceeding of USENIX Security Symposium.","author":"Christodorescu M.","year":"2005","unstructured":"M. Christodorescu and S. Jha, \u201cStatic Analysis of Executables to Detect Malicious Patterns,\u201d in Proceeding of USENIX Security Symposium., Bellevue, WA,, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0220-0"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0215-x"},{"key":"e_1_3_2_1_23_1","first-page":"351","volume-title":"symposium","volume":"4","author":"Kolbitsch C.","year":"2009","unstructured":"C. Kolbitsch, . P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou and X. Wang, \u201cEffective and efficient malware detection at the end host.,\u201d In USENIX security symposium, vol. 4, no. 1, pp. 351-366, 2009."},{"key":"e_1_3_2_1_24_1","volume-title":"In Proceedings of the 2000 international virus bulletin conference","author":"Arnold W.","year":"2000","unstructured":"W. Arnold and G. Tesauro, \u201cAutomatically generated Win32 heuristic virus detection,\u201d in In Proceedings of the 2000 international virus bulletin conference, 2000."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2037978"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijmsc.2019.03.05"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32759-9_34"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020448"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568881"},{"key":"e_1_3_2_1_30_1","volume-title":"IFIP Advances in Information and Communication Technology","author":"Mosli R.","year":"2017","unstructured":"R. Mosli, . R. Li, . B. Yuan and Y. Pan, \u201cA Behavior-Based Approach for Malware Detection,\u201d in IFIP Advances in Information and Communication Technology , 2017."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.226"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9539-8"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0558-5"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.006"},{"key":"e_1_3_2_1_35_1","first-page":"316","volume-title":"International Conference on Network-Based Information Systems","volume":"1036","author":"Fuji R.","year":"2019","unstructured":"R. Fuji, S. Usuzaki, K. Aburada, H. Yamaba, . T. Katayama, M. Park, . N. Shiratori and N. Okazaki , \u201cBlockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files,\u201d International Conference on Network-Based Information Systems, vol. 1036, p. 305\u2013316, 2019."}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:25:42Z","timestamp":1758216342000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":35,"alternative-id":["10.1145\/3647444.3647830","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647830","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}