{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:10Z","timestamp":1776926350217,"version":"3.51.2"},"reference-count":32,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063046","type":"journal-article","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T07:24:21Z","timestamp":1753169061000},"page":"5995-6014","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["OMD-RAS: Optimizing Malware Detection through Comprehensive Approach to Real-Time and Adaptive Security"],"prefix":"10.32604","volume":"84","author":[{"given":"Farah","family":"Mohammad","sequence":"first","affiliation":[]},{"given":"Saad","family":"Al-Ahmadi","sequence":"additional","affiliation":[]},{"given":"Jalal","family":"Al-Muhtadi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.aej.2024.06.009","article-title":"Dynamic behaviors of a modified computer virus model: insights into parameters and network attributes","volume":"103","author":"Ahmad","year":"2024","journal-title":"Alex Eng J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3706573","article-title":"Adversarial binaries: AI-guided instrumentation methods for malware detection evasion","volume":"57","author":"Koch","year":"2025","journal-title":"ACM Comput Surv"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4060","DOI":"10.3390\/s23084060","article-title":"Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure","volume":"23","author":"Riggs","year":"2023","journal-title":"Sensors"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s10586-024-04723-w","article-title":"Deep learning fusion for effective malware detection: leveraging visual features","volume":"28","author":"Johny","year":"2025","journal-title":"Clust Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s13198-023-02017-9","article-title":"Signature based ransomware detection based on optimizations approaches using RandomClassifier and CNN algorithms","volume":"15","author":"Sangher","year":"2024","journal-title":"Int J Syst Assur Eng Manag"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3605775","article-title":"Deep learning for zero-day malware detection and classification: a survey","volume":"56","author":"Deldar","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.aej.2024.11.068","article-title":"HGDetector: a hybrid Android malware detection method using network traffic and function call graph","volume":"114","author":"Feng","year":"2025","journal-title":"Alex Eng J"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"677","DOI":"10.3390\/sym15030677","article-title":"Artificial intelligence-based malware detection, analysis, and mitigation","volume":"15","author":"Djenna","year":"2023","journal-title":"Symmetry"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1016\/j.procs.2023.11.093","article-title":"Design of computer network security intrusion prevention strategy and evaluation algorithm analysis technology","volume":"228","author":"Wang","year":"2023","journal-title":"Procedia Comput Sci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"104379","DOI":"10.1016\/j.cose.2025.104379","article-title":"MOSDroid: Obfuscation-resilient Android malware detection using multisets of encoded opcode sequences","volume":"5","author":"Sharma","year":"2025","journal-title":"Comput Secur"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1002\/rnc.7777","article-title":"Resilient formation tracking for networked swarm systems under malicious data deception attacks","volume":"35","author":"Liu","year":"2025","journal-title":"Int J Robust Nonlinear Control"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"89363","DOI":"10.1109\/ACCESS.2024.3419068","article-title":"A survey on enterprise network security: asset behavioral monitoring and distributed attack detection","volume":"12","author":"Lyu","year":"2024","journal-title":"IEEE Access"},{"key":"ref13","unstructured":"Yan S, Wang S, Duan Y, Hong H, Lee K, Kim D, et al. An LLM-assisted easy-to-trigger backdoor attack on code completion models: injecting disguised vulnerabilities against strong detection. arXiv:2406.06822. 2024."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"119133","DOI":"10.1016\/j.eswa.2022.119133","article-title":"Fileless malware threats: recent advances, analysis approach through memory forensics and research challenges","volume":"214","author":"Kara","year":"2023","journal-title":"Expert Syst Appl"},{"key":"ref15","first-page":"9435","article-title":"Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspective","volume":"81","author":"Krishna","year":"2023","journal-title":"Inf Technol People"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"107801","DOI":"10.1016\/j.engappai.2023.107801","article-title":"A novel machine learning approach for detecting first-time-appeared malware","volume":"131","author":"Shaukat","year":"2024","journal-title":"Eng Appl Artif Intell"},{"key":"ref17","first-page":"98345","article-title":"Rmdnet-deep learning paradigms for effective malware detection and classification","volume":"81","author":"Puneeth","year":"2024","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1631\/FITEE.1601325","article-title":"Automatic malware classification and new malware detection using machine learning","volume":"18","author":"Liu","year":"2017","journal-title":"Front Inf Technol Electron Eng"},{"key":"ref19","series-title":"28th European Symposium on Research in Computer Security","first-page":"44","article-title":"The power of meme: adversarial malware creation with model-based reinforcement learning","author":"Rigaki","year":"2023 Sep 25\u201329"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"e0296722","DOI":"10.1371\/journal.pone.0296722","article-title":"AMDDLmodel: android smartphones malware detection using deep learning model","volume":"19","author":"Aamir","year":"2024","journal-title":"PLoS One"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"103629","DOI":"10.1016\/j.cose.2023.103629","article-title":"FeSAD ransomware detection framework with machine learning using adaption to concept drift","volume":"137","author":"Fernando","year":"2024","journal-title":"Comput Secur"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"9122","DOI":"10.1038\/s41598-025-93447-x","article-title":"Enhancing malware detection with feature selection and scaling techniques using machine learning models","volume":"15","author":"Hasan","year":"2025","journal-title":"Sci Rep"},{"key":"ref23","first-page":"200318","article-title":"DL-AMDet: deep learning-based malware detector for Android","volume":"21","author":"Nasser","year":"2024","journal-title":"Intell Syst Appl"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1007\/s11277-024-11366-y","article-title":"Hybrid deep learning approach based on LSTM and CNN for malware detection","volume":"136","author":"Thakur","year":"2024","journal-title":"Wirel Pers Commun"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"123","DOI":"10.3390\/sym15010123","article-title":"Malware detection using deep learning and correlation-based feature selection","volume":"15","author":"Alomari","year":"2023","journal-title":"Symmetry"},{"key":"ref26","first-page":"2028","article-title":"A tutorial on principal component analysis for dimensionality reduction in machine learning","volume":"8","author":"Bharadiya","year":"2023","journal-title":"Int J Innov Sci Res Technol"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.3390\/pr12071382","article-title":"A comprehensive review on discriminant analysis for addressing challenges of class-level limitations, small sample size, and robustness","volume":"12","author":"Qu","year":"2024","journal-title":"Processes"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3390\/jsan12050067","article-title":"Recursive feature elimination with cross-validation with decision tree: feature selection method for machine learning-based intrusion detection systems","volume":"12","author":"Awad","year":"2023","journal-title":"J Sens Actuator Netw"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"103582","DOI":"10.1016\/j.cose.2023.103582","article-title":"Automated machine learning for deep learning-based malware detection","volume":"137","author":"Brown","year":"2024","journal-title":"Comput Secur"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"108804","DOI":"10.1016\/j.compeleceng.2023.108804","article-title":"DroidEncoder: malware detection using auto-encoder based feature extractor and machine learning algorithms","volume":"110","author":"Bak\u0131r","year":"2023","journal-title":"Comput Electr Eng"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2508","DOI":"10.3390\/app13042508","article-title":"MalwD&C: a quick and accurate machine learning-based approach for malware detection and categorization","volume":"13","author":"Buriro","year":"2023","journal-title":"Appl Sci"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.future.2023.02.014","article-title":"MOBIPCR: efficient, accurate, and strict ML-based mobile malware detection","volume":"144","author":"Liu","year":"2023","journal-title":"Future Gener Comput Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_63046\/TSP_CMC_63046.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:36Z","timestamp":1776923136000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063046","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-01-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}