{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:50Z","timestamp":1773615530241,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700810","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:50Z","timestamp":1741962170000},"page":"1180-1191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Mechanisms for Extracting Signs of File Modification in Dynamic Virus Analysis"],"prefix":"10.3103","volume":"58","author":[{"given":"S. G.","family":"Fomicheva","sequence":"first","affiliation":[]},{"given":"O. D.","family":"Gayduk","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7780_CR1","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/fi14080217","volume":"14","author":"A. Alazab","year":"2024","unstructured":"Alazab, A., Khraisat, A., Alazab, M., and Singh, S., Detection of obfuscated malicious JavaScript code, Future Internet, 2024, vol. 14, no. 8, p. 217. https:\/\/doi.org\/10.3390\/fi14080217","journal-title":"Future Internet"},{"key":"7780_CR2","doi-asserted-by":"publisher","unstructured":"Kumar, A., Abhishek, K., Shah, K., Patel, D., Jain, Ya., Chheda, H., and Nerurkar, P., Malware detection using machine learning, Knowledge Graphs and Semantic Web, Villaz\u00f3n-Terrazas, B., Ortiz-Rodr\u00edguez, F., Tiwari, S.M., and Shandilya, S.K., Eds., Communications in Computer and Information Science, vol. 1232, Cham: Springer, 2020, pp. 61\u201371. https:\/\/doi.org\/10.1007\/978-3-030-65384-2_5","DOI":"10.1007\/978-3-030-65384-2_5"},{"key":"7780_CR3","unstructured":"Fomicheva, S.G., Teoriya potokovykh sistem zashchity informatsii. Monografiya (Theory of Streaming Systems of Information Protection: Monograph), Norilsk: NII, 2007."},{"key":"7780_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.36724\/2072-8735-2023-178-45-55","volume":"17","author":"S.G. Fomicheva","year":"2023","unstructured":"Fomicheva, S.G., Impact of attack indicator ranking on the quality of machine learning models in agent-based continuous authentication systems, T-Comm: Telekommunikatsii i Transport, 2023, vol. 17, no. 8, pp. 45\u201355. https:\/\/doi.org\/10.36724\/2072-8735-2023-178-45-55","journal-title":"T-Comm: Telekommunikatsii i Transport"},{"key":"7780_CR5","doi-asserted-by":"publisher","unstructured":"Rathore, H., Agarwal, S., Sahay, S.K., and Sewak, M., Malware detection using machine learning and deep learning, Big Data Analytics, Mondal, A., Gupta, H., Srivastava, J., Reddy, P., and Somayajulu, D., Eds., Lecture Notes in Computer Science, vol. 11297, Cham: Springer, 2018, pp. 402\u2013411. https:\/\/doi.org\/10.1007\/978-3-030-04780-1_28","DOI":"10.1007\/978-3-030-04780-1_28"},{"key":"7780_CR6","unstructured":"PhishingJS: A deep learning model for JavaScript-based phishing detection. https:\/\/unit42.paloaltonetworks.com\/javascript-based-phishing\/. Cited January 20, 2024."},{"key":"7780_CR7","unstructured":"2023 Unit 42 Ransomware and Extortion Report. https:\/\/start.paloaltonetworks.com\/2023-unit42-ransomware-extortion-report. Cited January 20, 2024."},{"key":"7780_CR8","unstructured":"JS.Muldrop, Dr.WEB. https:\/\/vms.drweb.ru\/virus\/?i=24943074. Cited January 20, 2024."},{"key":"7780_CR9","unstructured":"Anatomy of viruses, Dr.WEB. https:\/\/vms.drweb.ru\/virus+anatomy\/. Cited January 20, 2024."},{"key":"7780_CR10","unstructured":"Chizhevskii, A.L., Virusy i antivirusy (Viruses and Antiviruses), Moscow: BKhV-Peterburg, 2019."},{"key":"7780_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1186\/s13677-020-00200-y","volume":"9","author":"J. Sun","year":"2020","unstructured":"Sun, J., Luo, X., Gao, H., Wang, W., Gao, Ya., and Yang, X., Categorizing malware via a Word2Vec-based temporal convolutional network scheme, J. Cloud Comput., 2020, vol. 9, no. 1, p. 53. https:\/\/doi.org\/10.1186\/s13677-020-00200-y","journal-title":"J. Cloud Comput."},{"key":"7780_CR12","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10207-021-00553-8","volume":"21","author":"M. Mimura","year":"2022","unstructured":"Mimura, M. and Ito, R., Applying NLP techniques to malware detection in a practical environment, Int. J. Inf. Secur., 2022, vol. 21, no. 2, pp. 279\u2013291. https:\/\/doi.org\/10.1007\/s10207-021-00553-8","journal-title":"Int. J. Inf. Secur."},{"key":"7780_CR13","doi-asserted-by":"publisher","unstructured":"Luming, F., Yanpeng, C., and Jianwei, H., Detection and classification of malware based on FastText, IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS), Dalian, China, 2020, IEEE, 2020, pp. 126\u2013130. https:\/\/doi.org\/10.1109\/ICAIIS49377.2020.9194806","DOI":"10.1109\/ICAIIS49377.2020.9194806"},{"key":"7780_CR14","doi-asserted-by":"publisher","unstructured":"Hendler, D., Kels, Sh., and Rubin, A., AMSI-based detection of malicious PowerShell code using contextual embeddings, ASIA CCS \u201920: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, 2020, New York: Association for Computing Machinery, 2020, pp. 679\u2013693. https:\/\/doi.org\/10.1145\/3320269.3384742","DOI":"10.1145\/3320269.3384742"},{"key":"7780_CR15","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.3390\/electronics11193142","volume":"11","author":"Q. Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija, Q., Odeh, A., and Qattous, H., PDF malware detection based on optimizable decision trees, Electronics, 2022, vol. 11, no. 19, p. 3142. https:\/\/doi.org\/10.3390\/electronics11193142","journal-title":"Electronics"},{"key":"7780_CR16","doi-asserted-by":"publisher","first-page":"435","DOI":"10.11591\/ijeecs.v16.i1.pp435-440","volume":"16","author":"N.S. Selamat","year":"2019","unstructured":"Selamat, N.S. and Ali, F.H.M., Comparison of malware detection techniques using machine learning algorithm, Indonesian Journal of Electrical Engineering and Computer Science, 2019, vol. 16, no. 1, pp. 435\u2013440. https:\/\/doi.org\/10.11591\/ijeecs.v16.i1.pp435-440","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"key":"7780_CR17","doi-asserted-by":"publisher","unstructured":"Bezzateev, S.V., Fomicheva, S.G., and Zhemelev, G.A., Agent-based ZeroLogon vulnerability detection, 2021 Wave Electronics and Its Application in Information and Telecommunication Systems (WECONF), St. Petersburg, 2021, IEEE, 2021, pp. 1\u20135. https:\/\/doi.org\/10.1109\/weconf51603.2021.9470548","DOI":"10.1109\/weconf51603.2021.9470548"},{"key":"7780_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.36724\/2072-8735-2023-17-10-28-42","volume":"17","author":"S.G. Fomicheva","year":"2023","unstructured":"Fomicheva, S.G. and Bezzateev, S.V., Defenses for machine learning models from adversarial attacks, T-Comm: Telekommunikatsii i Transport, 2023, vol. 17, no. 10, pp. 28\u201342. https:\/\/doi.org\/10.36724\/2072-8735-2023-17-10-28-42","journal-title":"T-Comm: Telekommunikatsii i Transport"},{"key":"7780_CR19","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.3103\/s0146411623080035","volume":"57","author":"S.V. Bezzateev","year":"2023","unstructured":"Bezzateev, S.V., Fomicheva, S.G., and Suprun, A.F., Improving the efficiency of multiagent information security systems by post-quantum cryptography methods, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp.\u00a01005\u20131017. https:\/\/doi.org\/10.3103\/s0146411623080035","journal-title":"Autom. Control Comput. Sci."},{"key":"7780_CR20","unstructured":"Dr.Web Link Checker. https:\/\/free.drweb.ru\/linkchecker\/. Cited January 20, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700810.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700810","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700810.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:12Z","timestamp":1773612072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700810"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7780"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700810","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"5 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}