{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:55Z","timestamp":1776926335068,"version":"3.51.2"},"reference-count":30,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064053","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T04:39:26Z","timestamp":1750135166000},"page":"4755-4772","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model"],"prefix":"10.32604","volume":"84","author":[{"given":"Brij B.","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]},{"given":"Wadee","family":"Alhalabi","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Shavi","family":"Bansal","sequence":"additional","affiliation":[]},{"given":"Ching-Hsien","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"644","article-title":"Classification of malware in https traffic using machine learning approach","volume":"9","author":"Singh","year":"2022","journal-title":"El-Cezeri"},{"key":"ref2","first-page":"91","article-title":"Deep learning based hybrid analysis of malware detection and classification: a recent review","volume":"13","author":"Hussain","year":"2023","journal-title":"J Cyber Secur Mobil"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3618","DOI":"10.35940\/ijitee.C8385.019320","article-title":"Forensic analysis of a ransomware","volume":"9","author":"Agrawal","year":"2020","journal-title":"Int J Innov Technol Explor Eng"},{"key":"ref4","first-page":"1","article-title":"Particle swarm algorithm for smart contract vulnerability detection based on semantic web","volume":"20","author":"Feng","year":"2024","journal-title":"Int J Semant Web Inform Syst (IJSWIS)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.3390\/electronics10111241","article-title":"Intelligent mirai malware detection for IoT nodes","volume":"10","author":"Palla","year":"2021","journal-title":"Electronics"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.24018\/ejeng.2021.6.3.2372","article-title":"A review of cloud-based malware detection system: opportunities, advances and challenges","volume":"6","author":"Aslan","year":"2021","journal-title":"Eur J Eng Technol Res"},{"key":"ref7","first-page":"17","article-title":"Detection of malicious software and control using artificial intelligence","volume":"7","author":"Hassan","year":"2023","journal-title":"Int J Electron Crime Investig"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSWIS.361772","article-title":"A network intrusion detection method for information systems using federated learning and improved transformer","volume":"20","author":"Zhou","year":"2024","journal-title":"Int J Semant Web Inform Syst (IJSWIS)"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1662","DOI":"10.18517\/ijaseit.8.4-2.6827","article-title":"A survey on malware analysis techniques: static, dynamic, hybrid and memory analysis","volume":"8","author":"Sihwail","year":"2018","journal-title":"Int J Adv Sci Eng Inform Technol"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"11","DOI":"10.13053\/rcs-147-12-1","article-title":"A method for malware analysis by virtual machine introspection technique","volume":"147","author":"Garc\u00eda","year":"2018","journal-title":"Res Comput Sci"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"10196","DOI":"10.3390\/app131810196","article-title":"Intelligent anomaly detection system through malware image augmentation in iiot environment based on digital twin","volume":"13","author":"Cha","year":"2023","journal-title":"Appl Sci"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.comcom.2023.12.036","article-title":"IMCNN: intelligent malware classification using deep convolution neural networks as transfer learning and ensemble learning in honeypot enabled organizational network","volume":"216","author":"Kumar","year":"2024","journal-title":"Comput Commun"},{"key":"ref13","first-page":"1","article-title":"A secure framework to prevent three-tier cloud architecture from malicious malware injection attacks","volume":"13","author":"Rao","year":"2023","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1016\/j.cose.2018.04.005","article-title":"Malware identification using visualization images and deep learning","volume":"77","author":"Ni","year":"2018","journal-title":"Comput Secur"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSSCI.334711","article-title":"A novel deep federated learning-based model to enhance privacy in critical infrastructure systems","volume":"15","author":"Sharma","year":"2023","journal-title":"Int J Softw Sci Comput Intell (IJSSCI)"},{"key":"ref16","first-page":"377","article-title":"A hybrid deep learning image-based analysis for effective malware detection","volume":"47","author":"Venkatraman","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"100083","DOI":"10.1016\/j.csa.2024.100083","article-title":"Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection","volume":"3","author":"Gupta","year":"2025","journal-title":"Cyber Secur Appl"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s11416-019-00346-7","article-title":"Deep learning for image-based mobile malware detection","volume":"16","author":"Mercaldo","year":"2020","journal-title":"J Comput Virol Hacking Tech"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"109483","DOI":"10.1016\/j.compeleceng.2024.109483","article-title":"CloudIntellMal: an advanced cloud based intelligent malware detection framework to analyze android applications","volume":"119","author":"Mishra","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"102154","DOI":"10.1016\/j.adhoc.2020.102154","article-title":"Malware detection in industrial internet of things based on hybrid image visualization and deep learning model","volume":"105","author":"Naeem","year":"2020","journal-title":"Ad Hoc Netw"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"4248","DOI":"10.1109\/TNSM.2022.3200866","article-title":"From data and model levels: improve the performance of few-shot malware classification","volume":"19","author":"Chai","year":"2022","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"ref22","unstructured":"Ghahramani M, Taheri R, Shojafar M, Javidan R, Wan S. Deep image: a precious image based deep learning method for online malware detection in IoT Environment. arXiv:2204.01690. 2022."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"102627","DOI":"10.1016\/j.cose.2022.102627","article-title":"Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense","volume":"115","author":"Sharma","year":"2022","journal-title":"Comput Secur"},{"key":"ref24","series-title":"Proceedings of the 19th International Conference on Availability, Reliability and Security","first-page":"1","article-title":"SoK: visualization-based malware detection techniques","author":"Brosolo","year":"2024"},{"key":"ref25","first-page":"103313","article-title":"IMCLNet: a lightweight deep neural network for image-based malware classification","volume":"70","author":"Zou","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref26","first-page":"42","article-title":"IVMCT: image visualization based multiclass malware classification using transfer learning","volume":"71","author":"Kumar","year":"2022","journal-title":"Math Stat Eng Appl"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-014-0242-0","article-title":"Malware analysis using visualized images and entropy graphs","volume":"14","author":"Han","year":"2015","journal-title":"Int J Inf Secur"},{"key":"ref28","unstructured":"Matthew M. Malware as Images. 2020. [cited 2024 Jan 30]. Available from: https:\/\/www.kaggle.com\/datasets\/matthewfields\/malware-as-images."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"105082","DOI":"10.1016\/j.engappai.2022.105082","article-title":"Artificial rabbits optimization: a new bio-inspired meta-heuristic algorithm for solving engineering optimization problems","volume":"114","author":"Wang","year":"2022","journal-title":"Eng Appl Artif Intell"},{"key":"ref30","series-title":"Next Generation of Internet of Things: Proceedings of ICNGIoT 2022","first-page":"195","article-title":"Computational complexity and analysis of supervised machine learning algorithms","author":"Singh","year":"2022"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_64053\/TSP_CMC_64053.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:24Z","timestamp":1776923124000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064053","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}