{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:46Z","timestamp":1773615526520,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.3103\/s0146411623080333","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T15:02:20Z","timestamp":1709218940000},"page":"968-974","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Features of Detecting Malicious Installation Files Using Machine Learning Algorithms"],"prefix":"10.3103","volume":"57","author":[{"given":"P. E.","family":"Yugai","sequence":"first","affiliation":[]},{"given":"E. V.","family":"Zhukovskii","sequence":"additional","affiliation":[]},{"given":"P. O.","family":"Semenov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"7657_CR1","unstructured":"Fadilpashich, S., Fake Windows 11 upgrade installers are infected with malware, www.techradar.com, 2022. https:\/\/www.techradar.com\/news\/these-fake-windows-11-upgrade-installers-just-infect-you-with-malware."},{"key":"7657_CR2","unstructured":"Tulas, B., Malicious Notepad++ installers push StrongPity malware, 2021. https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-notepad-plus-plus-installers-push-strongpity-malware\/."},{"key":"7657_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_26","volume-title":"Using graph theory for cloud system security modeling, Computer Network Security. MMM-ACNS 2012","author":"P.D. Zegzhda","year":"2012","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Nikolskiy, A.V., Using graph theory for cloud system security modeling, Computer Network Security. MMM-ACNS 2012, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 7531, Berlin: Springer, 2012, pp. 309\u2013318. https:\/\/doi.org\/10.1007\/978-3-642-33704-8_26"},{"key":"7657_CR4","volume-title":"Kiberbezopasnost\u2019 tsifrovoi industrii. Teoriya i praktika funktsional\u2019noi ustoichivosti k kiberatakam (Cybersecurity of Digital Industry: Theory and Practice of Functional Stability to Cyber Attacks)","author":"D.P. Zegzhda","year":"2021","unstructured":"Zegzhda, D.P., Aleksandrova, E.B., Kalinin, M.O., et al., Kiberbezopasnost\u2019 tsifrovoi industrii. Teoriya i praktika funktsional\u2019noi ustoichivosti k kiberatakam (Cybersecurity of Digital Industry: Theory and Practice of Functional Stability to Cyber Attacks), Zegzhda, D.P., Ed., Moscow: Goryachaya Liniya-Telekom, 2021."},{"key":"7657_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14706-7_27","volume-title":"Clarifying integrity control at the trusted information environment, Computer Network Security. MMM-ACNS 2010","author":"D.P. Zegzhda","year":"2010","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Computer Network Security. MMM-ACNS 2010, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 6258, Berlin: Springer, 2010, pp. 337\u2013344. https:\/\/doi.org\/10.1007\/978-3-642-14706-7_27"},{"key":"7657_CR6","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, 2019 IEEE Int. Black Sea Conf. on Communications and Networking (BlackSeaCom), Sochi, 2019, IEEE, 2019. https:\/\/doi.org\/10.1109\/blackseacom.2019.8812818","DOI":"10.1109\/blackseacom.2019.8812818"},{"key":"7657_CR7","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.3390\/sym13122453","volume":"13","author":"D. Zegzhda","year":"2021","unstructured":"Zegzhda, D., Pavlenko, E., and Aleksandrova, E., Modelling artificial immunization processes to counter cyberthreats, Symmetry, 2021, vol. 13, no. 12, p. 2453. https:\/\/doi.org\/10.3390\/sym13122453","journal-title":"Symmetry"},{"key":"7657_CR8","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, 2019 Third World Conf. on Smart Trends in Systems Security and Sustainablity (WorldS4), London, 2019, IEEE, 2019, pp. 129\u2013135. https:\/\/doi.org\/10.1109\/worlds4.2019.8904022","DOI":"10.1109\/worlds4.2019.8904022"},{"key":"7657_CR9","doi-asserted-by":"publisher","unstructured":"Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology, Proc. 8th Int. Conf. on Security of Information and Networks, Sochi, 2015, New York: Association for Computing Machinery, 2015, pp. 127\u2013130. https:\/\/doi.org\/10.1145\/2799979.2800023","DOI":"10.1145\/2799979.2800023"},{"key":"7657_CR10","unstructured":"Lukach, Yu.S., Structure of executable files in Win32 and Win64. http:\/\/cs.usu.edu.ru\/docs\/pe\/."},{"key":"7657_CR11","doi-asserted-by":"publisher","unstructured":"Adamov, A. and Saprykin, A., The problem of Trojan inclusions in software and hardware, 2010 East-West Design & Test Symp. (EWDTS), St. Petersburg, 2010, IEEE, 2010, pp. 449\u2013451. https:\/\/doi.org\/10.1109\/ewdts.2010.5742081","DOI":"10.1109\/ewdts.2010.5742081"},{"key":"7657_CR12","unstructured":"Pal, M. and Mather, P.M., Decision tree based classification of remotely sensed data, 22nd Asian Conf. on Remote Sensing, Singapore, 2014, pp. 9\u201316."},{"key":"7657_CR13","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 Int. Russian Automation Conf. (RusAutoCon), Sochi, 2018, IEEE, 2018, pp. 1\u20137. https:\/\/doi.org\/10.1109\/rusautocon.2018.8501783","DOI":"10.1109\/rusautocon.2018.8501783"},{"key":"7657_CR14","doi-asserted-by":"publisher","first-page":"397","DOI":"10.33581\/1561-4085-2020-23-4-397-404","volume":"23","author":"M. Kalinin","year":"2020","unstructured":"Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the internet of things, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 397\u2013404. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-397-404","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7657_CR15","volume-title":"Comparative study of decision tree ID3 and C4.5","author":"B. Khsina","year":"2014","unstructured":"Khsina, B., Merbukha, A., Ezzikuri, Kh., and Erritali, M., Comparative study of decision tree ID3 and C4.5, Mezhdunarodnyi Zh. Peredovykh Komp\u2019yuternykh Nauk Prilozhenii, 2014, pp. 3\u20137."},{"key":"7657_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.14529\/ctcr150304","volume":"15","author":"I.L. Kaftannikov","year":"2015","unstructured":"Kaftannikov, I.L. and Parasich, A.V., Decision tree\u2019s features of application in classification problems, Vestn. Yuzhno-Ural. Gos. Univ. Ser.: Komp\u2019yuternye Tekhnol., Upr., \n               Radioelektron., 2015, vol. 15, no. 3, pp. 26\u201332. https:\/\/doi.org\/10.14529\/ctcr150304","journal-title":"Radioelektron."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080333.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623080333","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080333.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:09Z","timestamp":1773612069000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623080333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["7657"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623080333","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"1 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}