{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T22:41:16Z","timestamp":1768603276948,"version":"3.49.0"},"reference-count":0,"publisher":"Slovenian Association Informatika","issue":"37","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJCAI"],"abstract":"<jats:p>In a digital landscape where malicious software evolves faster than traditional defenses, intelligent andproactive detection has become essential. This study presents a machine learning framework for staticmalware detection based on the analysis of 138,047 Portable Executable samples, including both malwareand benign files. The dataset comprises 56 static structural features extracted without code execution.Four supervised classifiers\u2014Backpropagation Neural Network, Decision Tree, Random Forest,and Support Vector Machine\u2014were evaluated following the Knowledge Discovery in Databases process.Ensemble-based feature selection methods (Random Forest and Extra Trees) were applied to identify themost informative attributes, while random undersampling was used to mitigate class imbalance. Experimentalresults show that the Random Forest classifier achieved the best performance, reaching 99.45%accuracy and a 0.9909 F1-score on imbalanced data, and 99.32% accuracy on the balanced dataset. Thesefindings highlight the reliability and scalability of tree-based models for static malware detection. Overall,the proposed framework demonstrates that careful feature selection and balance adjustment can significantlyenhance the performance and interpretability of cybersecurity classification systems.<\/jats:p>","DOI":"10.31449\/inf.v49i37.10728","type":"journal-article","created":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:56:42Z","timestamp":1768564602000},"source":"Crossref","is-referenced-by-count":0,"title":["Static Malware Detection through Ensemble Feature Selection and Supervised Classification"],"prefix":"10.31449","volume":"49","author":[{"given":"Isai","family":"Moreno-Lara","sequence":"first","affiliation":[]},{"given":"Alejandra","family":"Silva-Trujillo","sequence":"additional","affiliation":[]},{"given":"Juan C.","family":"Cuevas-Tello","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Nunez-Varela","sequence":"additional","affiliation":[]}],"member":"16141","published-online":{"date-parts":[[2025,12,25]]},"container-title":["Informatica"],"original-title":[],"link":[{"URL":"https:\/\/www.informatica.si\/index.php\/informatica\/article\/download\/10728\/6393","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.informatica.si\/index.php\/informatica\/article\/download\/10728\/6393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:56:42Z","timestamp":1768564602000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.informatica.si\/index.php\/informatica\/article\/view\/10728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,25]]},"references-count":0,"journal-issue":{"issue":"37","published-online":{"date-parts":[[2026,1,11]]}},"URL":"https:\/\/doi.org\/10.31449\/inf.v49i37.10728","relation":{},"ISSN":["1854-3871","0350-5596"],"issn-type":[{"value":"1854-3871","type":"electronic"},{"value":"0350-5596","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12,25]]}}}