{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T22:24:50Z","timestamp":1770675890099,"version":"3.49.0"},"reference-count":29,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2016,7,22]]},"DOI":"10.3233\/jifs-169015","type":"journal-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T09:55:14Z","timestamp":1469526914000},"page":"837-847","source":"Crossref","is-referenced-by-count":7,"title":["Malware classification using dynamic features and Hidden Markov Model"],"prefix":"10.1177","volume":"31","author":[{"given":"Mohammad","family":"Imran","sequence":"first","affiliation":[]},{"given":"Muhammad Tanvir","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Muhammad Abdul","family":"Qadir","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/JIFS-169015_ref1","first-page":"1","article-title":"Hidden Markov models for malware classification","author":"Annachhatre","year":"2014","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"10.3233\/JIFS-169015_ref2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11416-008-0105-1","article-title":"Profile hidden Markov models and metamorphic virus detection","volume":"5","author":"Attaluri","year":"2009","journal-title":"Journal in Computer Virology"},{"key":"10.3233\/JIFS-169015_ref3","doi-asserted-by":"crossref","first-page":"5039","DOI":"10.1109\/HICSS.2013.217","article-title":"Exploring hidden Markov models for virus analysis: A semantic approach","author":"Austin","year":"2013","journal-title":"In 2013 46th Hawaii International Conference on System Sciences (HICSS), IEEE"},{"key":"10.3233\/JIFS-169015_ref4","first-page":"8","volume-title":"Scalable, behavior-based malware clustering","author":"Bayer","year":"2009"},{"key":"10.3233\/JIFS-169015_ref5","doi-asserted-by":"crossref","first-page":"2281","DOI":"10.1016\/S0031-3203(04)00162-1","article-title":"Similarity-based classification of sequences using hidden Markov models","volume":"37","author":"Bicego","year":"2004","journal-title":"Pattern Recognition"},{"key":"10.3233\/JIFS-169015_ref6","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2089125.2089126","article-title":"A survey on automated dynamic malware-analysis techniques and tools","volume":"44","author":"Egele","year":"2012","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.3233\/JIFS-169015_ref7","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.cose.2014.07.004","article-title":"Enhancing the detection of metamorphic malware using call graphs","volume":"46","author":"Elhadi","year":"2014","journal-title":"Computers & Security"},{"key":"10.3233\/JIFS-169015_ref8","first-page":"57","article-title":"Weka: The waikato environment for knowledge analysis, Citeseer","author":"Garner","year":"1995","journal-title":"In Proceedings of the New Zealand Computer Science Research Students Conference"},{"key":"10.3233\/JIFS-169015_ref9","doi-asserted-by":"crossref","unstructured":"Imran M. , Afzal M.T. and Qadir M.A. , Similarity-based malware classification using hidden Markov model, In Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2015), IEEE, 2015, To appear.","DOI":"10.1109\/CyberSec.2015.33"},{"key":"10.3233\/JIFS-169015_ref10","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/FSKD.2015.7382048","article-title":"Using hidden Markov model for dynamic malware analysis: First impressions","author":"Imran","year":"2015","journal-title":"In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), IEEE"},{"key":"10.3233\/JIFS-169015_ref11","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","article-title":"Classification of malware based on integrated static and dynamic features","volume":"36","author":"Islam","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"10.3233\/JIFS-169015_ref12","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1006\/jmbi.1994.1104","article-title":"Hidden Markov models in computational biology: Applications to protein modeling","volume":"235","author":"Krogh","year":"1994","journal-title":"Journal of Molecular Biology"},{"key":"10.3233\/JIFS-169015_ref13","doi-asserted-by":"crossref","unstructured":"Kuge N. , Yamamura T. , Shimoyama O. and Liu A. , A driver behavior recognition method based on a driver model framework, Tech. rep, SAE Technical Paper, 2000.","DOI":"10.4271\/2000-01-0349"},{"key":"10.3233\/JIFS-169015_ref14","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TPDS.2014.2308221","article-title":"Performance analysis and optimization for SpMV on GPU using probabilistic modeling","volume":"26","author":"Li","year":"2015","journal-title":"IEEE Transactions on Parallel and Distributed System"},{"key":"10.3233\/JIFS-169015_ref15","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/ACSAC.2007.21","article-title":"Limits of static analysis for malware detection","author":"Moser","year":"2007","journal-title":"In 2007 Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), IEEE"},{"key":"10.3233\/JIFS-169015_ref16","doi-asserted-by":"crossref","first-page":"1785","DOI":"10.1007\/s00521-014-1669-y","article-title":"Hybrid particle swarm optimization for parameter estimation of Muskingum model","volume":"25","author":"Ouyang","year":"2014","journal-title":"Neural Computing and Applications"},{"key":"10.3233\/JIFS-169015_ref17","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","article-title":"A tutorial on hidden Markov models and selected applications in speech recognition","volume":"77","author":"Rabiner","year":"1989","journal-title":"Proceedings of the IEEE"},{"key":"10.3233\/JIFS-169015_ref18","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","article-title":"An introduction to hidden Markov models","volume":"3","author":"Rabiner","year":"1986","journal-title":"ASSP Magazine, IEEE"},{"key":"10.3233\/JIFS-169015_ref19","first-page":"195","article-title":"Behavior-based Malware analysis using profile hidden Markov models","author":"Ravi","year":"2013","journal-title":"In 2013 International Conference on Security and Cryptography (SECRYPT), IEEE"},{"key":"10.3233\/JIFS-169015_ref20","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","volume-title":"In Detection of Intrusions and Malware, and Vulnerability Assessment 2008 (DIMVA 2008)","author":"Rieck","year":"2008"},{"key":"10.3233\/JIFS-169015_ref21","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","article-title":"Automatic analysis of malware behavior using machine learning","volume":"19","author":"Rieck","year":"2011","journal-title":"Journal of Computer Security"},{"key":"10.3233\/JIFS-169015_ref22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/SECPRI.2001.924286","article-title":"Data mining methods for detection of new malicious executables","author":"Schultz","year":"2001","journal-title":"In Proceedings of 2001 IEEE Symposium on Security and Privacy, (S&P 2001), IEEE"},{"key":"10.3233\/JIFS-169015_ref23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.ins.2010.11.014","article-title":"Multiple sequence alignment using the Hidden Markov Model trained by an improved quantum-behaved particle swarm optimization","volume":"182","author":"Sun","year":"2012","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-169015_ref24","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/VIZSEC.2009.5375540","article-title":"Visual analysis of malware behavior using treemaps and thread graphs","author":"Trinius","year":"2009","journal-title":"In 2009 6th International Workshop on Visualization for Cyber Security (VizSec 2009), IEEE"},{"key":"10.3233\/JIFS-169015_ref25","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/SECPRI.1999.766910","article-title":"Detecting intrusions using system calls: Alternative data models","author":"Warrender","year":"1999","journal-title":"In Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE"},{"key":"10.3233\/JIFS-169015_ref26","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.45","article-title":"Toward automated dynamic malware analysis using cwsandbox","volume":"5","author":"Willems","year":"2007","journal-title":"IEEE Security and Privacy"},{"key":"10.3233\/JIFS-169015_ref27","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11416-006-0028-7","article-title":"Hunting for metamorphic engines","volume":"2","author":"Wong","year":"2006","journal-title":"Journal in Computer Virology"},{"key":"10.3233\/JIFS-169015_ref28","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/1835804.1835820","article-title":"Automatic malware categorization using cluster ensemble","author":"Ye","year":"2010","journal-title":"In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM"},{"key":"10.3233\/JIFS-169015_ref29","first-page":"395","article-title":"GPU-Accelerated HMM for Speech Recognition","author":"Yu","year":"2014","journal-title":"In 2014 43rd International Conference on Parallel Processing Workshops (ICCPW), IEEE Computer Society"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-169015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T05:24:27Z","timestamp":1770614667000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-169015"}},"subtitle":[],"editor":[{"given":"Zheng","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Kenli","family":"Li","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2016,7,22]]},"references-count":29,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jifs-169015","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,22]]}}}