{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:28Z","timestamp":1773655888953,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.3103\/s0146411622080120","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T14:03:23Z","timestamp":1677593003000},"page":"852-864","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Malicious Executable Files Based on Static\u2013Dynamic Analysis Using Machine Learning"],"prefix":"10.3103","volume":"56","author":[{"given":"R. A.","family":"Ognev","sequence":"first","affiliation":[]},{"given":"E. V.","family":"Zhukovskii","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]},{"given":"A. N.","family":"Kiselev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2023,2,28]]},"reference":[{"key":"7540_CR1","volume-title":"A survey of malware detection techniques","author":"N. Idika","year":"2007","unstructured":"Idika, N. and Mathur, A.P., A survey of malware detection techniques, Purdue Univ., 2007."},{"key":"7540_CR2","doi-asserted-by":"publisher","first-page":"983","DOI":"10.3103\/S014641162008012X","volume":"54","author":"A.D. Fatin","year":"2020","unstructured":"Fatin, A.D., Pavlenko, E.Yu., and Poltavtseva, M.A., A survey of mathematical methods for security analysis of cyberphysical systems, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 983\u2013987. \u00a0https:\/\/doi.org\/10.3103\/S014641162008012X","journal-title":"Autom. Control Comput. Sci."},{"key":"7540_CR3","doi-asserted-by":"publisher","first-page":"164428","DOI":"10.1109\/ACCESS.2020.3021743","volume":"8","author":"T.N. Witte","year":"2020","unstructured":"Witte, T.N., Phantom malware: conceal malicious actions from malware detection techniques by imitating user activity, IEEE Access, 2020, vol. 8, pp. 164428\u2013164452. \u00a0https:\/\/doi.org\/10.1109\/ACCESS.2020.3021743","journal-title":"IEEE Access"},{"key":"7540_CR4","doi-asserted-by":"publisher","unstructured":"Tian, R., Islam, R., Batten, L., and Versteeg, S., Differentiating malware from cleanware using behavioural analysis, 5th Int. Conf. on Malicious and Unwanted Software, Nancy, France, 2010, IEEE, 2010, pp. 23\u201330. \u00a0https:\/\/doi.org\/10.1109\/MALWARE.2010.5665796","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"7540_CR5","doi-asserted-by":"publisher","first-page":"906","DOI":"10.3103\/S014641161808014X","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Yu., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0906\u2013911. \u00a0https:\/\/doi.org\/10.3103\/S014641161808014X","journal-title":"Autom. Control Comput. Sci."},{"key":"7540_CR6","doi-asserted-by":"publisher","unstructured":"Salehi, Z., Ghiasi, M., and Sami, A., A miner for malware detection based on API function calls and their arguments, The 16th CSI Int. Symp. on Artificial Intelligence and Signal Processing (AISP 2012), Shiraz, Iran, 2012, IEEE, 2012, pp. 563\u2013568. \u00a0https:\/\/doi.org\/10.1109\/AISP.2012.6313810","DOI":"10.1109\/AISP.2012.6313810"},{"key":"7540_CR7","doi-asserted-by":"publisher","first-page":"907","DOI":"10.3103\/S0146411620080295","volume":"54","author":"E.A. Popova","year":"2020","unstructured":"Popova, E.A. and Platonov, V.V., Reduction of the number of analyzed parameters in network attack detection systems, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 907\u2013914. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080295","journal-title":"Autom. Control Comput. Sci."},{"key":"7540_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11416-011-0152-x","volume":"7","author":"B. Anderson","year":"2011","unstructured":"Anderson, B., Quist, D., Neil, J., Storlie, C., and Lane, T., Graph-based malware detection using dynamic analysis, J. Comput. Virol., 2011, vol. 7, pp. 247\u2013258. \u00a0https:\/\/doi.org\/10.1007\/s11416-011-0152-x","journal-title":"J. Comput. Virol."},{"key":"7540_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A. Damodaran","year":"2017","unstructured":"Damodaran, A., Di Troia, F., Visaggio, C.A., Austin, T.H., and Stamp, M., A comparison of static, dynamic, and hybrid analysis for malware detection, J. Comput. Virol. Hacking Tech., 2017, vol. 13, pp. 1\u201312. \u00a0https:\/\/doi.org\/10.1007\/s11416-015-0261-z","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"7540_CR10","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.5897\/SRE12.001","volume":"7","author":"A. Altaher","year":"2012","unstructured":"Altaher, A., Supriyanto, Almomani, A., Anbar, M., and Ramadass, S., Malware detection based on evolving clustering method for classification, Sci. Res. Essays, 2012, vol. 7, no. 22, pp. 2031\u20132036. \u00a0https:\/\/doi.org\/10.5897\/SRE12.001","journal-title":"Sci. Res. Essays"},{"key":"7540_CR11","doi-asserted-by":"publisher","first-page":"101760","DOI":"10.1016\/j.cose.2020.101760","volume":"92","author":"E. Amer","year":"2020","unstructured":"Amer, E. and Zelinka, I., A dynamic windows malware detection and prediction method based on contextual understanding of API call sequence, Comput. Secur., 2020, vol. 92, p.\u00a0101760. https:\/\/doi.org\/10.1016\/j.cose.2020.101760","journal-title":"Comput. Secur."},{"key":"7540_CR12","doi-asserted-by":"publisher","unstructured":"Kalinin, M.O. and Krundyshev, V.M., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, Fifth World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118\u2013122. \u00a0https:\/\/doi.org\/10.1109\/WorldS451998.2021.9514004","DOI":"10.1109\/WorldS451998.2021.9514004"},{"key":"7540_CR13","unstructured":"Endgame Malware BEnchmark for Research, 2018. https:\/\/github.com\/elastic\/ember."},{"key":"7540_CR14","unstructured":"O\u2019Connel, R., Binary hashing: Motivations and algorithms, 2019. https:\/\/www.riverloopsecurity.com\/blog\/ 2019\/11\/binary-hashing-intro. Cited October 11, 2021."},{"key":"7540_CR15","doi-asserted-by":"publisher","unstructured":"Busygin, A. and Kalinin, M. Criterion of blockchain vulnerability to majority attack based on hashing power distribution assessment, Futuristic Trends in Network and Communication Technologies. FTNCT 2020, Singh, P.K., Veselov, G., Vyatkin, V., Pljonkin, A., Dodero, J.M., and Kumar, Y., Eds., Communications in Computer and Information Science, vol. 1395. Singapore: Springer, 2020, pp. 68\u201377. https:\/\/doi.org\/10.1007\/978-981-16-1480-4_6","DOI":"10.1007\/978-981-16-1480-4_6"},{"key":"7540_CR16","unstructured":"Koret, J., A new control flow graph based heuristic for Diaphora, 2018. http:\/\/joxeankoret.com\/blog\/2018\/ 11\/04\/new-cfg-based-heuristic-diaphora."},{"key":"7540_CR17","unstructured":"Diaphora, 2020. https:\/\/github.com\/joxeankoret\/diaphora."},{"key":"7540_CR18","unstructured":"An implementation of the Koret\u2013Karamitas (KOKA) CFGs hashing algorithm, 2019. https:\/\/github.com\/ j-oxeankoret\/diaphora\/blob\/master\/jkutils\/graph_hashes."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080120.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411622080120","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080120.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:40Z","timestamp":1773612220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411622080120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["7540"],"URL":"https:\/\/doi.org\/10.3103\/s0146411622080120","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"7 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}