{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:05:29Z","timestamp":1773615929246,"version":"3.50.1"},"reference-count":28,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700779","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:12Z","timestamp":1741962192000},"page":"1147-1155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Malware Using Deep Neural Networks"],"prefix":"10.3103","volume":"58","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Volkovskii","sequence":"additional","affiliation":[]},{"given":"A. S.","family":"Makarov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7776_CR1","unstructured":"Global stats. https:\/\/gs.statcounter.com. Cited May 8, 2022."},{"key":"7776_CR2","unstructured":"Statistics by Av-Test. https:\/\/www.av-test.org\/en\/statistics\/malware. Cited February 14, 2023."},{"key":"7776_CR3","doi-asserted-by":"publisher","unstructured":"Ovasapyan, T., Moskvin, D., and Tsvetkov, A., Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators, 13th International Conference on Security of Information and Networks, Merkez, Turkey, 2020, \u00d6rs, B. and El\u00e7i, A., Eds., New York: Association for Computing Machinery, 2020, p. 3. https:\/\/doi.org\/10.1145\/3433174.3433611","DOI":"10.1145\/3433174.3433611"},{"key":"7776_CR4","unstructured":"Zhukovskiy, E.V. and Zegzhda, D.P., Analysis of malware with dangerous trigger-based behavior, Zashchita Informatsii. Insaid, 2019, no. 3, pp. 60\u201363."},{"key":"7776_CR5","unstructured":"Zhukovskiy, E.V., Detection malicious functionality in software with self-protection mechanisms, Zashchita Informatsii. Insaid, 2019, no. 4, pp. 68\u201373."},{"key":"7776_CR6","unstructured":"Radare2 disassemble tool. https:\/\/rada.re\/n\/. Cited February 14, 2023."},{"key":"7776_CR7","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., and Polosukhin, I., Attention is all you need, 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, 2017, 2017."},{"key":"7776_CR8","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7776_CR9","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K., BERT: Pretraining of deep bidirectional transformers for language understanding, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019, vol. 1, pp. 4171\u20134186.","DOI":"10.18653\/v1\/N19-1423"},{"key":"7776_CR10","doi-asserted-by":"publisher","first-page":"963","DOI":"10.3103\/s0146411619080108","volume":"53","author":"D.V. Ivanov","year":"2019","unstructured":"Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Detection of security threats to modern websites, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 963\u2013968. https:\/\/doi.org\/10.3103\/s0146411619080108","journal-title":"Autom. Control Comput. Sci."},{"key":"7776_CR11","unstructured":"Softmax function. https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.Softmax.html. Cited February 14, 2023."},{"key":"7776_CR12","doi-asserted-by":"publisher","unstructured":"Li, X., Qu, Yu., and Yin, H., PalmTree: Learning an assembly language model for instruction embedding, CCS \u201921: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, New York: Association for Computing Machinery, 2021, pp. 3236\u20133251. https:\/\/doi.org\/10.1145\/3460120.3484587","DOI":"10.1145\/3460120.3484587"},{"key":"7776_CR13","doi-asserted-by":"publisher","unstructured":"Cahuantzi, R., Chen, X., and G\u00fcttel, S., A comparison of LSTM and GRU networks for learning symbolic sequences, Intelligent Computing. SAI 2023, Lecture Notes in Networks and Systems, vol. 739, Cham: Springer, 2023, pp. 771\u2013785. https:\/\/doi.org\/10.1007\/978-3-031-37963-5_53","DOI":"10.1007\/978-3-031-37963-5_53"},{"key":"7776_CR14","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3103\/s0146411617080090","volume":"51","author":"D.V. Ivanov","year":"2017","unstructured":"Ivanov, D.V., Moskvin, D.A., Myasnikov, A.V., and Suprun, A.F., Applying NFC for automated replication of user data, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 855\u2013859. https:\/\/doi.org\/10.3103\/s0146411617080090","journal-title":"Autom. Control Comput. Sci."},{"key":"7776_CR15","first-page":"296","volume":"17","author":"A.F. Suprun","year":"2014","unstructured":"Suprun, A.F., Approach to assessment of measures sufficiency of confidential information protection, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 296\u2013300.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7776_CR16","unstructured":"Machine learning for malware detection. https:\/\/media.kaspersky.com\/en\/enterprise-security\/Kaspersky-Lab-Whitepaper-Machine-Learning.pdf. Cited February 14, 2023."},{"key":"7776_CR17","doi-asserted-by":"publisher","unstructured":"Sun, Yi. and Sundararajan, M., Axiomatic attribution for multilinear functions, Proceedings of the 12th ACM conference on Electronic commerce, San Jose, CA, 2011, New York: Association for Computing Machinery, 2011, pp. 177\u2013178. https:\/\/doi.org\/10.1145\/1993574.1993601","DOI":"10.1145\/1993574.1993601"},{"key":"7776_CR18","unstructured":"VirusTotal database. https:\/\/www.virustotal.com. Cited February 14, 2023."},{"key":"7776_CR19","unstructured":"VirusShare database. https:\/\/virusshare.com. Cited February 14, 2023."},{"key":"7776_CR20","doi-asserted-by":"publisher","first-page":"918","DOI":"10.3103\/s0146411618080278","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., Lavrova, D.S., and Zaitseva, E.A., A use case analysis of heterogeneous semistructured objects in information security problems, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 918\u2013930. https:\/\/doi.org\/10.3103\/s0146411618080278","journal-title":"Autom. Control Comput. Sci."},{"key":"7776_CR21","doi-asserted-by":"publisher","first-page":"932","DOI":"10.3103\/s014641162108023x","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Automated search for vulnerabilities in ARM software using dynamic symbolic execution, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 932\u2013940. https:\/\/doi.org\/10.3103\/s014641162108023x","journal-title":"Autom. Control Comput. Sci."},{"key":"7776_CR22","unstructured":"Pearson correlation criterium. https:\/\/medstatistic.ru\/methods\/methods8.html. Cited February 14, 2023."},{"key":"7776_CR23","doi-asserted-by":"publisher","unstructured":"van Dongen, S. and Enright, A.J., Metric distances derived from cosine similarity and Pearson and Spearman correlations, arXiv Preprint, 2012. https:\/\/doi.org\/10.48550\/arXiv.1208.3145","DOI":"10.48550\/arXiv.1208.3145"},{"key":"7776_CR24","volume-title":"Principles and Methods of Statistics","author":"R.E. Chaddock","year":"1925","unstructured":"Chaddock, R.E., Principles and Methods of Statistics, Cambridge: The Riverside Press, 1925."},{"key":"7776_CR25","doi-asserted-by":"publisher","unstructured":"Suprun, A., Anisimov, V., Anisimov, E., Saurenko, T., and Manciu, I., Models and method of decision support for the formation of cybersecurity systems, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp.\u00a0357\u2013367. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_29","DOI":"10.1007\/978-3-030-93872-7_29"},{"key":"7776_CR26","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.3103\/s0146411618080400","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P., Moskvin, D.A., and Myasnikov, A.V., Assurance of cyber resistance of the distributed data storage systems using the blockchain technology, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1111\u20131116. https:\/\/doi.org\/10.3103\/s0146411618080400","journal-title":"Autom. Control Comput. Sci."},{"key":"7776_CR27","unstructured":"Cross validation. https:\/\/neerc.ifmo.ru\/wiki\/index.php?title=Kross-validatsiya. Cited February 14, 2023."},{"key":"7776_CR28","doi-asserted-by":"publisher","first-page":"991","DOI":"10.3103\/s0146411621080241","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Danilov, V.D., and Moskvin, D.A., Application of synthetic data generation methods to the detection of network attacks on Internet of Things devices, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp.\u00a0991\u2013998. https:\/\/doi.org\/10.3103\/s0146411621080241","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700779.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700779","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700779.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:07:25Z","timestamp":1773612445000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7776"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700779","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"10 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}