{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:33:22Z","timestamp":1769751202542,"version":"3.49.0"},"update-to":[{"DOI":"10.32604\/cmc.2025.063448","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T00:00:00Z","timestamp":1748390400000}}],"reference-count":37,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T00:00:00Z","timestamp":1748390400000},"content-version":"vor","delay-in-days":147,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":["www.techscience.com"],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063448","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T08:46:29Z","timestamp":1746261989000},"page":"4575-4606","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Advanced Techniques for Dynamic Malware Detection and Classification in Digital Security Using Deep Learning"],"prefix":"10.32604","volume":"83","author":[{"given":"Taher","family":"Alzahrani","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.01.012","article-title":"A survey of intrusion detection in wireless network applications","volume":"42","author":"Mitchell","year":"2014","journal-title":"Comput Commun"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"100082","DOI":"10.1016\/j.csa.2024.100082","article-title":"A survey on intrusion detection system in IoT networks","volume":"3","author":"Rahman","year":"2025","journal-title":"Cyber Secur Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"103582","DOI":"10.1016\/j.cose.2023.103582","article-title":"Automated machine learning for deep learning based malware detection","volume":"137","author":"Brown","year":"2024","journal-title":"Comput Secur"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1007\/s10489-022-03523-2","article-title":"Self-attention based convolutional-LSTM for Android malware detection using network traffics grayscale image","volume":"53","author":"Shen","year":"2023","journal-title":"Appl Intell"},{"key":"ref5","series-title":"2022 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","first-page":"110","article-title":"Obfuscated malware detection using dilated convolutional network","author":"Mezina","year":"2022 Oct 11\u201313"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.aej.2023.12.061","article-title":"Using 3D-VGG-16 and 3D-Resnet-18 deep learning models and FABEMD techniques in the detection of malware","volume":"89","author":"Al-Khater","year":"2024","journal-title":"Alex Eng J"},{"key":"ref7","series-title":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","first-page":"1","article-title":"Machine learning and images for malware detection and classification","author":"Kosmidis","year":"2017 Sep 28\u201330"},{"key":"ref8","first-page":"34","article-title":"De-LADY: deep learning based Android malware detection using Dynamic features","volume":"11","author":"Sihag","year":"2021","journal-title":"J Internet Serv Inf Secur"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1615528","DOI":"10.1155\/2022\/1615528","article-title":"ZeVigilante: detecting zero-day malware using machine learning and sandboxing analysis techniques","volume":"2022","author":"Alhaidari","year":"2022","journal-title":"Comput Intell Neurosci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"64","DOI":"10.47577\/technium.v4i8.7225","article-title":"Detecting network attacks Model based on a long short-term memory LSTM","volume":"4","author":"Jasi","year":"2022","journal-title":"Technium"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"123109","DOI":"10.1016\/j.eswa.2023.123109","article-title":"A malware detection model based on imbalanced heterogeneous graph embeddings","volume":"246","author":"Li","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref12","unstructured":"Alazab M, Soman KP, Srinivasan S, Venkatraman S, Pham VQ. Deep learning for cyber security applications: a comprehensive survey. arXiv:16748161. 2023."},{"key":"ref13","series-title":"European Conference on Cyber Warfare and Security (ECCWS)","article-title":"Spam email detection using machine learning techniques","author":"Moutafis","year":"2023 Jun 22\u201323"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.3390\/app14031015","article-title":"Dynamic malware classification and API categorisation of windows portable executable files using machine learning","volume":"14","author":"Syeda","year":"2024","journal-title":"Appl Sci"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.procs.2024.03.239","article-title":"CNN-LSTM hybrid model for enhanced malware analysis and detection","volume":"233","author":"Karat","year":"2024","journal-title":"Procedia Comput Sci"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"104317","DOI":"10.1109\/ACCESS.2024.3435362","article-title":"Efficient and generalized image-based CNN algorithm for multi-class malware detection","volume":"12","author":"Liu","year":"2024","journal-title":"IEEE Access"},{"key":"ref17","first-page":"31","article-title":"Enhance deep learning model for malware detection with a new image representation method","volume":"2024","author":"Linh","year":"2024","journal-title":"J Sci Technol Inf Secur"},{"key":"ref18","series-title":"2020 SoutheastCon","first-page":"1","article-title":"Malware analysis using machine learning and deep learning techniques","author":"Patil","year":"2020 Mar 28\u201329"},{"key":"ref19","first-page":"103405","article-title":"A dependable hybrid machine learning model for network intrusion detection","volume":"72","author":"Talukder","year":"2023","journal-title":"J Inf Secur Appl"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1007\/s11277-024-11366-y","article-title":"Hybrid deep learning approach based on LSTM and CNN for malware detection","volume":"136","author":"Thakur","year":"2024","journal-title":"Wirel Pers Commun"},{"key":"ref21","series-title":"Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019","first-page":"75","article-title":"Malware classification using image representation","author":"Singh","year":"2019 Jun 27\u201328"},{"key":"ref22","first-page":"272","article-title":"Random forests and decision trees","volume":"9","author":"Ali","year":"2012 Sep 1","journal-title":"Int J Comput Sci Issues"},{"key":"ref23","first-page":"1","article-title":"Xgboost: extreme gradient boosting","volume":"1","author":"Chen","year":"2015 Aug 1","journal-title":"R package version 0.4-2"},{"key":"ref24","series-title":"International Conference on Machine Learning","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","author":"Tan","year":"2019 May 24"},{"key":"ref25","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1251","article-title":"Xception: Deep learning with depthwise separable convolutions","author":"Chollet","year":"2017"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"8604","DOI":"10.3390\/app12178604","article-title":"Malware detection using memory analysis data in big data environment","volume":"12","author":"Dener","year":"2022","journal-title":"Appl Sci"},{"key":"ref27","series-title":"2024 21st International Bhurban Conference on Applied Sciences and Technology (IBCAST)","first-page":"98","article-title":"IMA\u2014an intelligent obfuscated malware analysis model","author":"Ahmad","year":"2024 Aug 20\u201323"},{"key":"ref28","series-title":"2014 International Congress on Technology, Communication and Knowledge (ICTCK)","first-page":"1","article-title":"A new approach to malware detection by comparative analysis of data structures in a memory image","author":"Aghaeikheirabady","year":"2014 Nov 26\u201327"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"e6672","DOI":"10.1002\/cpe.6672","article-title":"Process based volatile memory forensics for ransomware detection","volume":"34","author":"Arfeen","year":"2022","journal-title":"Concurr Comput Pract Exp"},{"key":"ref30","first-page":"103151","article-title":"Malicious code classification based on opcode sequences and text CNN network","volume":"67","author":"Wang","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"8505","DOI":"10.3390\/app14188505","article-title":"Deep-learning-based approach for IoT attack and malware detection","volume":"14","author":"Ta\u015fc\u0131","year":"2024","journal-title":"Appl Sci"},{"key":"ref32","series-title":"2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM)","first-page":"1","article-title":"Securing the Internet of Things: using machine learning for malware detection with CIC-MalMem dataset","author":"Sharma","year":"2024 Feb 21\u201323"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2579","DOI":"10.3390\/electronics11162579","article-title":"Memory forensics-based malware detection using computer vision and machine learning","volume":"11","author":"Shah","year":"2022","journal-title":"Electronics"},{"key":"ref34","series-title":"International Conference on Information Security Practice and Experience","first-page":"273","article-title":"Unveiling the efficacy of BERT\u2019s attention in memory obfuscated malware detection","author":"Mashrur Arifin","year":"2024 Oct 25\u201327"},{"key":"ref35","series-title":"2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS)","first-page":"1","article-title":"EntropLyzer: android malware classification and characterization using entropy analysis of dynamic characteristics","author":"Keyes","year":"2021 May 18\u201319"},{"key":"ref36","series-title":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","first-page":"86","article-title":"An efficient malicious code detection system based on convolutional neural networks","author":"Cao","year":"2018 Dec 8\u201310"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"2444","DOI":"10.3390\/electronics10192444","article-title":"Image-based malware classification using VGG19 network and spatial convolutional attention","volume":"10","author":"Awan","year":"2021","journal-title":"Electronics"}],"updated-by":[{"DOI":"10.32604\/cmc.2025.063448","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T00:00:00Z","timestamp":1748390400000}}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63448\/TSP_CMC_63448.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:14Z","timestamp":1763342954000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/doi\/10.32604\/cmc.2025.063448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":37,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063448","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}