{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:09:19Z","timestamp":1766491759160,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756843","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"35-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fortifying the Future: A Hybrid Machine Learning Model Against Evolving Malware Threats"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5523-052X","authenticated-orcid":false,"given":"Anshika","family":"Sharma","sequence":"first","affiliation":[{"name":"Chitkara Institute of Engineering and Technology, Chitkara University, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8474-9435","authenticated-orcid":false,"given":"Shalli","family":"Rani","sequence":"additional","affiliation":[{"name":"Chitkara Institute of Engineering and Technology, Chitkara University, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4906-6495","authenticated-orcid":false,"given":"Muhammad Azeem","family":"Akbar","sequence":"additional","affiliation":[{"name":"Department of Software Engineering LUT University, Lappeenranta, Finland"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC49089.2020.9215232"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Shoaib Akhtar and Tao Feng. 2022. Malware Analysis and Detection Using Machine Learning Algorithms. Symmetry 14 11 (2022) 2304.","DOI":"10.3390\/sym14112304"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Mohammad\u00a0Nazmul Alam Dhiman Sarma Farzana\u00a0Firoz Lima Ishita Saha Rubaiath\u00a0E. Ulfath and Sohrab Hossain. 2020. Phishing attacks detection using machine learning approach. Proceedings of the 3rd International Conference on Smart Systems and Inventive Technology ICSSIT 2020 1173\u20131179. 10.1109\/ICSSIT48917.2020.9214225","DOI":"10.1109\/ICSSIT48917.2020.9214225"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT58056.2023.10226130"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Iman Almomani Aala Alkhayer and Walid El-Shafai. 2022. An automated vision-based deep learning model for efficient detection of android malware attacks. IEEE Access 10 (2022) 2700\u20132720.","DOI":"10.1109\/ACCESS.2022.3140341"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Muhammad Azeem Danish Khan Saman Iftikhar Shaikhan Bawazeer and Mohammed Alzahrani. 2024. Analyzing and comparing the effectiveness of malware detection: A study of machine learning approaches. Heliyon 10 1 (2024).","DOI":"10.1016\/j.heliyon.2023.e23574"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Parnika Bhat Sunny Behal and Kamlesh Dutta. 2023. A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning. Computers & Security 130 (2023) 103277.","DOI":"10.1016\/j.cose.2023.103277"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Emilie Bout Valeria Loscri and Antoine Gallais. 2021. How Machine Learning changes the nature of cyberattacks on IoT networks: A survey. IEEE Communications Surveys & Tutorials 24 1 (2021) 248\u2013279.","DOI":"10.1109\/COMST.2021.3127267"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Jannatul Ferdous Rafiqul Islam Arash Mahboubi and Md\u00a0Zahidul Islam. 2023. A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism. IEEE Access (2023).","DOI":"10.1109\/ACCESS.2023.3328351"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Esraa Odat and Qussai\u00a0M Yaseen. 2023. A novel machine learning approach for android malware detection based on the co-existence of features. IEEE Access 11 (2023) 15471\u201315484.","DOI":"10.1109\/ACCESS.2023.3244656"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Abhishek Raghuvanshi Umesh\u00a0Kumar Singh Guna\u00a0Sekha Sajja Harikumar Pallathadka Evans Asenso Mustafa Kamal Abha Singh and Khongdet Phasinam. 2022. Intrusion detection using machine learning for risk mitigation in IoT-enabled smart irrigation in smart farming. Journal of Food Quality 2022 (2022) 1\u20138.","DOI":"10.1155\/2022\/3955514"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Aqib Rashid and Jose Such. 2023. Malprotect: Stateful defense against adversarial query attacks in ml-based malware detection. IEEE Transactions on Information Forensics and Security (2023).","DOI":"10.1109\/TIFS.2023.3293959"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Shailendra Rathore and Jong\u00a0Hyuk Park. 2018. Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing Journal 72 (11 2018) 79\u201389. 10.1016\/j.asoc.2018.05.049","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"S Sasikala and Sengathir Janakiraman. 2023. A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments. Wireless Personal Communications 132 3 (2023) 1961\u20131974.","DOI":"10.1007\/s11277-023-10693-w"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Kumar Thummapudi Palden Lama and Rajendra\u00a0V Boppana. 2023. Detection of ransomware attacks using processor and disk usage data. IEEE Access 11 (2023) 51395\u201351407.","DOI":"10.1109\/ACCESS.2023.3279819"}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","acronym":"EASE Companion '25","location":"Istanbul Turkiye"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:07:36Z","timestamp":1766491656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":15,"alternative-id":["10.1145\/3727967.3756843","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756843","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}