{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T18:08:18Z","timestamp":1762625298860,"version":"3.38.0"},"reference-count":50,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.052835","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T08:08:07Z","timestamp":1722586087000},"page":"2917-2939","source":"Crossref","is-referenced-by-count":6,"title":["Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection"],"prefix":"10.32604","volume":"80","author":[{"given":"Islam","family":"Zada","sequence":"first","affiliation":[]},{"given":"Mohammed Naif","family":"Alatawi","sequence":"additional","affiliation":[]},{"given":"Syed Muhammad","family":"Saqlain","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Alshahrani","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Alshamran","sequence":"additional","affiliation":[]},{"given":"Kanwal","family":"Imran","sequence":"additional","affiliation":[]},{"given":"Hessa","family":"Alfraihi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s11416-006-0012-2","article-title":"Dynamic analysis of malicious code","volume":"2","author":"Bayer","year":"2006","journal-title":"J. Comput. Virol."},{"key":"ref2","series-title":"2015 10th Int. Conf. Malicious and Unwanted Softw. (MALWARE)","first-page":"11","article-title":"Deep neural network-based malware detection using two dimensional binary program features","author":"Saxe","year":"2015"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3329786","article-title":"Dynamic malware analysis in the modern era\u2014A state of the art survey","volume":"52","author":"Or-Meir","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/j.procs.2015.06.031","article-title":"A simple method for detection of metamorphic malware using dynamic analysis and text mining","volume":"54","author":"Choudhary","year":"2015","journal-title":"Proc. Comput. Sci."},{"key":"ref5","series-title":"Proc. of the Sixth ACM Conf. on Data and Appl. Security and Privacy, Association for Computing Machinery","first-page":"183","article-title":"Novel feature extraction selection and fusion for effective malware family classification","author":"Ahmadi","year":"2016"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"e346","DOI":"10.7717\/peerj-cs.346","article-title":"Data augmentation-based malware detection using convolutional neural networks","volume":"7","author":"Catak","year":"Jan. 2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1109\/TC.2020.3015584","article-title":"MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning","volume":"69","author":"Vasan","year":"2020","journal-title":"IEEE Trans. Comput."},{"key":"ref8","series-title":"2017 IEEE Nat. Aerospace and Electron. Conf. (NAECON)","first-page":"70","article-title":"Classification of malware programs using autoencoders based deep learning architecture and its application to the microsoft Malware classification challenge (BIG 2015) dataset","author":"Kebede","year":"Jun. 27\u201330, 2017"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.45","article-title":"Toward automated dynamic malware analysis using CW sandbox","volume":"5","author":"Willems","year":"2007","journal-title":"IEEE Security & Privacy"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/s13673-018-0125-x","article-title":"A state-of-the-art survey of malware detection approaches using data mining techniques","volume":"8","author":"Souri","year":"2018","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"ref11","series-title":"Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP)","first-page":"3422","article-title":"Large-scale malware classification using random projections and neural networks","author":"Dahl","year":"May 26\u201331, 2013"},{"key":"ref12","first-page":"56","article-title":"Malware analysis and classification: A survey","volume":"5","author":"Gandotra","year":"2014","journal-title":"J. Inf. Secur."},{"key":"ref13","series-title":"12th Int. Symp.","first-page":"121","article-title":"PE-Miner: Mining structural information to detect malicious executables in realtime","author":"Shafiq","year":"Sep. 2009"},{"key":"ref14","series-title":"IEEE Int. Conf. on Commun. (ICC)","first-page":"1","article-title":"Malware classification method based on word vector of bytes and multilayer perception","author":"Yanchen","year":"Jun. 2020"},{"key":"ref15","article-title":"Polymorphic malware detection using sequence classification methods and ensembles","volume":"2017","author":"Drew","year":"2017","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref16","series-title":"Proc. of the Eighth Australasian Symp. on Parallel and Distrib. Comput.","first-page":"61","article-title":"Classification of malware using structured control flow","volume":"107","author":"Cesare","year":"Jan. 01, 2010"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1007\/s10462-020-09825-6","article-title":"A survey of the recent architectures of deep convolutional neural networks","volume":"53","author":"Khan","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"239","DOI":"10.3390\/app9020239","article-title":"Cross-method-based analysis and classification of malicious behavior by API calls extraction","volume":"9","author":"Ndibanje","year":"2019","journal-title":"Appl. Sci."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"Zhang","year":"Jan. 2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"6446","DOI":"10.3390\/app11146446","article-title":"Visualized malware multi-classification framework using fine-tuned CNN-based transfer learning models","volume":"11","author":"El-Shafai","year":"Jul. 2021","journal-title":"Appl. Sci."},{"key":"ref21","first-page":"100546","article-title":"A survey of malware detection using deep learning","volume":"16","author":"Bensaoud","year":"Jun. 2024","journal-title":"Machine Learn. Appl."},{"key":"ref22","series-title":"Proc. Int. Conf. Data Mining Steering Committee World Congr. Comput. Sci. (DMIN)","first-page":"61","article-title":"DL4MD: A deep learning framework for intelligent malware detection","author":"Hardy","year":"Jul. 2016"},{"key":"ref23","first-page":"176","article-title":"Tools & techniques for malware analysis and classification","volume":"7","author":"Gandotra","year":"2016","journal-title":"Int. J. Next-Generation Comput."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/s00521-017-3077-6","article-title":"Malware detection based on deep learning algorithm","volume":"31","author":"Yuxin","year":"Feb. 2020","journal-title":"Neural Comput. Appl."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"100624","DOI":"10.1016\/j.measen.2022.100624","article-title":"Enhancing the security in cyber-world by detecting the botnets using ensemble classification-based machine learning","volume":"25","author":"Srinivasan","year":"Feb. 2023","journal-title":"Meas. Sens."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"800","DOI":"10.3390\/jcp2040041","article-title":"A survey of the recent trends in deep learning based malware detection","volume":"2","author":"Tayyab","year":"Sep. 2022","journal-title":"J. Cybersecurity Privacy"},{"key":"ref27","series-title":"12th ACM Workshop on Artif. Intel. and Security","first-page":"37","article-title":"Malware detection on highly imbalanced data through sequence modeling","author":"Oak","year":"15 Nov., 2019"},{"key":"ref28","series-title":"ACMSE \u201818: Proc. of the ACM Southeast (ACMSE) 2018 Conf.","first-page":"1","article-title":"Malware classification using deep learning methods","author":"Cakir","year":"Mar. 29\u201331, 2018"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"312","DOI":"10.23940\/ijpe.24.05.p6.312318","article-title":"Analyzing and classifying malware types on windows platform using an ensemble machine learning approach","volume":"20","author":"Verma","year":"2024","journal-title":"Int. J. Performability Eng."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.future.2021.01.004","article-title":"Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics","volume":"118","author":"Usman","year":"May 2021","journal-title":"Future Gener. Comput. Syst."},{"unstructured":"J. Zhang, \u201cMachine learning with feature selection using principal component analysis for malware detection: A case study,\u201d arXiv:1902.03639, 2019.","key":"ref31"},{"key":"ref32","series-title":"10th Int. Conf. on Cyber Conflict","first-page":"371","article-title":"On the effectiveness of machine and deep learning for cyber security","author":"Apruzzese","year":"May 29\u2013Jun. 01, 2018"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.future.2021.06.029","article-title":"MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things","volume":"125","author":"Kumar","year":"Dec. 2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"103121","DOI":"10.1109\/ACCESS.2022.3206445","article-title":"Self-supervised vision transformers for malware detection","volume":"10","author":"Seneviratne","year":"2022","journal-title":"IEEE Access"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1049\/iet-ifs.2012.0289","article-title":"Malware detection method based on the control-flow construct feature of software","volume":"8","author":"Zhao","year":"2014","journal-title":"IET Inf. Secur."},{"key":"ref36","first-page":"99","article-title":"ASSCA: API sequence and statistics features combined architecture for malware detection","volume":"157","author":"Lu","year":"Jul. 2019","journal-title":"Comput. Netw."},{"key":"ref37","first-page":"1","article-title":"Enhancing IoT-based software defect prediction in analytical data management using war strategy optimization and Kernel ELM","volume":"29","author":"Islam","year":"2023","journal-title":"J. Wireless Netw."},{"key":"ref38","doi-asserted-by":"crossref","first-page":"113400","DOI":"10.1016\/j.dss.2020.113400","article-title":"Automated dynamic approach for detecting ransomware using finite-state machine","volume":"138","author":"Ramesh","year":"Nov. 2020","journal-title":"Decis. Support Syst."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"2308","DOI":"10.3390\/sym14112308","article-title":"Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time","volume":"14","author":"Akhtar","year":"2022","journal-title":"Symmetry"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"124379","DOI":"10.1109\/ACCESS.2019.2937347","article-title":"Cyber security threats detection in Internet of Things using deep learning approach","volume":"7","author":"Ullah","year":"2019","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.dcan.2017.10.002","article-title":"Machine learning for Internet of Things data analysis: A survey","volume":"4","author":"Mahdavinejad","year":"2018","journal-title":"Digit. Commun. Netw."},{"key":"ref42","doi-asserted-by":"crossref","first-page":"4329","DOI":"10.1109\/JIOT.2019.2963635","article-title":"Toward edge-based deep learning in industrial Internet of Things","volume":"7","author":"Liang","year":"May 2020","journal-title":"IEEE Internet Things J."},{"key":"ref43","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/s10994-015-5507-y","article-title":"A decomposition of the outlier detection problem into a set of supervised learning problems","volume":"100","author":"Paulheim","year":"2015","journal-title":"Mach. Learn."},{"key":"ref44","doi-asserted-by":"crossref","first-page":"20","DOI":"10.38094\/jastt20165","article-title":"Classification based on decision tree algorithm for machine learning","volume":"2","author":"Charbuty","year":"Mar. 2021","journal-title":"J. Appl. Sci. Technol. Trends."},{"key":"ref45","doi-asserted-by":"crossref","first-page":"361","DOI":"10.7717\/peerj-cs.361","article-title":"On the classification of microsoft-windows ransomware using hardware profile","volume":"7","author":"Aurangzeb","year":"Feb. 2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref46","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1587\/transinf.2019INI0003","article-title":"A survey on mobile malware detection techniques","volume":"E103","author":"Kouliaridis","year":"2020","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref47","first-page":"1","article-title":"ERNN: Error-resilient RNN for encrypted traffic detection towards network-induced phenomena","author":"Zhao","year":"Feb. 2023","journal-title":"IEEE Transac. Depend. Secure Computing."},{"key":"ref48","first-page":"1","article-title":"Classification of software failure incidents using SVM","volume":"2","author":"Zada","year":"Sep. 2021","journal-title":"The Sciencetech"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"3835","DOI":"10.1007\/s40747-022-00848-w","article-title":"BugPre: An intelligent software version-to-version bug prediction system using graph convolutional neural networks","volume":"9","author":"Wang","year":"Aug. 2023","journal-title":"Complex Intell. Syst."},{"key":"ref50","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1002\/spy2.355","article-title":"Botnet-based IoT network traffic analysis using deep learning","volume":"7","author":"Singh","year":"Mar. 2024","journal-title":"Secur. Privacy."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-80-2\/TSP_CMC_52835\/TSP_CMC_52835.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T12:21:25Z","timestamp":1741263685000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v80n2\/57629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":50,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.052835","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]}}}