{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T23:35:25Z","timestamp":1778801725194,"version":"3.51.4"},"reference-count":74,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"vor","delay-in-days":50,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>The portable executable header (PEH) information is commonly used as a feature for malware detection systems to train and validate machine learning (ML) or deep learning (DL) classifiers. We propose to extract the deep features from the PEH information through hidden layers of a feed\u2010forward deep neural network (FFDNN). The extraction of deep features of hidden layers represents the dataset with a better generalization for malware detection. While feeding the deep feature of one hidden layer to the succeeding layer, the Gaussian error linear unit (GeLU) activation function is applied. The FFDNN is trained with the GeLU activation function using the deep features of individual layers as well as concatenated deep features of all hidden layers. Similarly, the ML classifiers are also trained and validated in with individual layer deep features and concatenated features. Three highly effective ML classifiers, random forest (RF), support vector machine (SVM), and <jats:italic>k<\/jats:italic>\u2010nearest neighbour (k\u2010NN) have been investigated. The performance of the proposed model is demonstrated using a statically significant large dataset. The obtained results are interesting and encouraging in terms of classification accuracy. The classification accuracy reaches 99.15% with the internal discriminative deep feature for the proposed FFDNN\u2010ML classifier with the GeLU activation function.<\/jats:p>","DOI":"10.1155\/2023\/9544481","type":"journal-article","created":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T02:35:20Z","timestamp":1676946920000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Feed\u2010Forward Deep Neural Network (FFDNN)\u2010Based Deep Features for Static Malware Detection"],"prefix":"10.1155","volume":"2023","author":[{"given":"Priyanka","family":"Singh","sequence":"first","affiliation":[]},{"given":"Samir Kumar","family":"Borgohain","sequence":"additional","affiliation":[]},{"given":"Achintya Kumar","family":"Sarkar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3381-2764","authenticated-orcid":false,"given":"Jayendra","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Lakhan Dev","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2023,2,20]]},"reference":[{"key":"e_1_2_12_1_2","unstructured":"http:\/\/aiweb.techfak.uni-bielefeld.de\/content\/bworld-robot-control-software\/."},{"key":"e_1_2_12_2_2","unstructured":"http:\/\/aiweb.techfak.uni-bielefeld.de\/content\/bworld-robot-control-software\/."},{"key":"e_1_2_12_3_2","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.247"},{"key":"e_1_2_12_4_2","volume-title":"Cybersecurity Think Tank","author":"Scott J.","year":"2017"},{"key":"e_1_2_12_5_2","volume-title":"Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software","author":"Sikorski M.","year":"2012"},{"key":"e_1_2_12_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-010-0148-y"},{"key":"e_1_2_12_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.01.003"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0309-3"},{"key":"e_1_2_12_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"e_1_2_12_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.002"},{"key":"e_1_2_12_12_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6992"},{"key":"e_1_2_12_13_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8195395"},{"key":"e_1_2_12_14_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym14112304"},{"key":"e_1_2_12_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4586-0"},{"key":"e_1_2_12_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992752"},{"key":"e_1_2_12_17_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3578695"},{"key":"e_1_2_12_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00346-7"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025436"},{"key":"e_1_2_12_20_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781420011449"},{"key":"e_1_2_12_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42235-020-0049-9"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_2_12_23_2","volume-title":"Data Mining: Concepts and Techniques","author":"Han J.","year":"2011"},{"key":"e_1_2_12_24_2","unstructured":"NilssonN. J. Introduction to machine learning 2020 https:\/\/ai.stanford.edu\/%20nilsson\/MLBOOK.pdf."},{"key":"e_1_2_12_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5559-3_42"},{"key":"e_1_2_12_26_2","doi-asserted-by":"crossref","unstructured":"TayebiM.andKafhaliS. E. Hyperparameter Optimization Using Genetic Algorithms to Detect Frauds Transactions Proceedings of the International Conference on Artificial Intelligence and Computer Vision April 2021 Cairo Egypt AICV.","DOI":"10.1007\/978-3-030-76346-6_27"},{"key":"e_1_2_12_27_2","article-title":"Performance analysis of metaheuristics based hyperparameters optimization for fraud transactions detection","author":"Tayebi M.","year":"2022","journal-title":"Evolutionary Intelligence"},{"key":"e_1_2_12_28_2","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.314156"},{"key":"e_1_2_12_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01359-2"},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/su12125037"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02967-7"},{"key":"e_1_2_12_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978629"},{"key":"e_1_2_12_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_2_12_34_2","first-page":"195","volume-title":"Computation. IWANN 1995","author":"Han J.","year":"1995"},{"key":"e_1_2_12_35_2","unstructured":"NwankpaC. IjomahW. GachaganA. andMarshallS. Activation Functions: Comparison of Trends in Practice and Research for Deep Learning 2018 http:\/\/arxiv.org\/abs\/1811.03378."},{"key":"e_1_2_12_36_2","unstructured":"NairV.andHintonG. E. Rectified linear units improve restricted Boltzmann machines Proceedings of the International Conference on International Conference on Machine Learning June 2010 Pittsburgh Pennsylvania USA 807\u2013814."},{"key":"e_1_2_12_37_2","doi-asserted-by":"crossref","unstructured":"YueZ. ChristensenH. andBarkerJ. Autoencoder bottleneck features with multi-task optimisation for improved continuous dysarthric speech recognition Proceedings of the Interspeech July 2020 Shanghai China 4581\u20134585.","DOI":"10.21437\/Interspeech.2020-2746"},{"key":"e_1_2_12_38_2","doi-asserted-by":"crossref","unstructured":"RamsayD. B. KilgourK. RoblekD. andSharifiM. Low-dimensional bottleneck features for on-device continuous speech recognition Proceedings of the Interspeech April 2019 Incheon Korea 3456\u20133459.","DOI":"10.21437\/Interspeech.2019-2193"},{"key":"e_1_2_12_39_2","doi-asserted-by":"crossref","unstructured":"DengJ. GuoJ. XueN. andZafeiriouS. Arcface: additive angular margin loss for deep face recognition Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) June 2019 Nashville TN USA 4685\u20134694.","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_2_12_40_2","unstructured":"ChenT. KornblithS. NorouziM. andHintonG. A simple framework for contrastive learning of visual representations Proceedings of the International Conference on Machine Learning July 2020 Atlanta GA USA 1597\u20131607."},{"key":"e_1_2_12_41_2","doi-asserted-by":"crossref","unstructured":"ZeilerM. RanzatoM. MongaR. MaoM. YangK. LeQ. NguyenP. SeniorA. VanhouckeV. DeanJ. andHintonG. On rectified linear units for speech processing Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) June 2013 Rhodes Island 3517\u20133521.","DOI":"10.1109\/ICASSP.2013.6638312"},{"key":"e_1_2_12_42_2","doi-asserted-by":"crossref","unstructured":"DahlG. E. SainathT. N. andHintonG. E. Improving deep neural net-works for lvcsr using rectified linear units and dropout Proceedings of the Of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) June 2013 Greece 8609\u20138613.","DOI":"10.1109\/ICASSP.2013.6639346"},{"key":"e_1_2_12_43_2","unstructured":"HendrycksD.andGimpelK. Bridging Nonlinearities and Stochastic Regularizers with Gaussian Error Linear Units 2018 https:\/\/arxiv.org\/abs\/1606.08415."},{"key":"e_1_2_12_44_2","doi-asserted-by":"crossref","unstructured":"SaxeJ.andBerlinK. Deep neural network based malware detection using two dimensional binary program features Proceedings of the 2015 10th International Conference on Malicious and Unwanted Software (MALWARE) October 2015 Puerto Rico 11\u201320 https:\/\/doi.org\/10.1109\/MALWARE.2015.7413680 2-s2.0-84969833614.","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"e_1_2_12_45_2","unstructured":"HardyW. ChenL. HouS. YeY. andLiX. DL4MD: a deep learning framework for intelligent malware detection Proceedings of the International Conference on Data Mining (DMIN\u201916) July 2016 Las Vegas NV USA 61\u201367."},{"key":"e_1_2_12_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3077-6"},{"key":"e_1_2_12_47_2","doi-asserted-by":"crossref","unstructured":"LauM. M.andLimK. H. Investigation of activation functions in deep belief network Proceedings of the 2017 2nd International Conference on Control and Robotics Engineering (ICCRE) April 2017 Bangkok Thailand 201\u2013206 https:\/\/doi.org\/10.1109\/ICCRE.2017.7935070 2-s2.0-85021800060.","DOI":"10.1109\/ICCRE.2017.7935070"},{"key":"e_1_2_12_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.10.006"},{"key":"e_1_2_12_49_2","unstructured":"AndersonH. S.andRotP. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models 2018 https:\/\/arxiv.org\/abs\/1804.04637."},{"key":"e_1_2_12_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1058-9"},{"key":"e_1_2_12_51_2","unstructured":"CiaburroG. AyyadevaraV. K. andPerrierA. Get Hands-On Machine Learning on Google Cloud Platform now with the O\u2019Reilly learning platform 2021 https:\/\/www.oreilly.com\/library\/view\/hands-on-machine-learning\/9781788393485\/f73852fe-4f59-44e5-b154-1bc7b2de1375.xhtml."},{"key":"e_1_2_12_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04780-1_28"},{"key":"e_1_2_12_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.04.064"},{"key":"e_1_2_12_54_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-90923-y"},{"key":"e_1_2_12_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906934"},{"key":"e_1_2_12_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-020-01588-1"},{"key":"e_1_2_12_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036491"},{"key":"e_1_2_12_58_2","doi-asserted-by":"crossref","unstructured":"UlinskiP. Fundamentals of Computational Neuroscience 2003 40 no. 5 OUP Oxford Oxford UK https:\/\/doi.org\/10.5860\/choice.40-2778.","DOI":"10.5860\/CHOICE.40-2778"},{"key":"e_1_2_12_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/6.4520"},{"key":"e_1_2_12_60_2","volume-title":"Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms","author":"Paperback N. B.","year":"2017"},{"key":"e_1_2_12_61_2","volume-title":"Hands-on Machine Learning with Scikit-Learn, Keras and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems","author":"G\u00e9ron A.","year":"2019"},{"key":"e_1_2_12_62_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(97)00061-0"},{"key":"e_1_2_12_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.08.038"},{"key":"e_1_2_12_64_2","volume-title":"Deep Learning Essentials: Your Hands-On Guide to the Fundamentals of Deep Learning and Neural Network Modeling","author":"Bhardwaj A.","year":"2018"},{"key":"e_1_2_12_65_2","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"key":"e_1_2_12_66_2","doi-asserted-by":"publisher","DOI":"10.1002\/sce.37303405110"},{"key":"e_1_2_12_67_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.79.8.2554"},{"key":"e_1_2_12_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(96)00200-9"},{"key":"e_1_2_12_69_2","unstructured":"ClevertD. A. UnterthinerT. andHochreiterS. Fast and accurate deep network learning by exponential linear units (eLUs) Proceedings of the 4th International Conference on Learning Representations May 2016 Puerto Rico https:\/\/doi.org\/10.48550\/arXiv.1511.07289."},{"key":"e_1_2_12_70_2","unstructured":"HendrycksD.andGimpelK. Gaussian Error Linear Units 2016 https:\/\/arxiv.org\/abs\/1606.08415 https:\/\/doi.org\/10.48550\/arXiv.1606.08415."},{"key":"e_1_2_12_71_2","unstructured":"Tinyurl.com Mastering-Machine-Learning-for-Penetration-Testing 2009 https:\/\/tinyurl.com\/wcbuchdt."},{"key":"e_1_2_12_72_2","unstructured":"KingmaD. P.andBaarJ. Adam: a method for stochastic optimization Proceedings of the 3rd International Conference for Learning Representations (ICLR) May 2015 San Diego CA USA https:\/\/doi.org\/10.48550\/arXiv.1412.6980."},{"key":"e_1_2_12_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2016.10.007"},{"key":"e_1_2_12_74_2","volume-title":"Python Machine Learning: Macine Learning and Deep Learning with Python, Scikit-Learn, and TensorFlow 2","author":"Raschka S.","year":"2018"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/9544481.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/9544481.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2023\/9544481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:23:25Z","timestamp":1735622605000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2023\/9544481"}},"subtitle":[],"editor":[{"given":"Said","family":"El Kafhali","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1155\/2023\/9544481"],"URL":"https:\/\/doi.org\/10.1155\/2023\/9544481","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2022-10-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9544481"}}