{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T05:19:32Z","timestamp":1733548772447,"version":"3.30.1"},"reference-count":22,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.029946","type":"journal-article","created":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T06:02:31Z","timestamp":1660802551000},"page":"3349-3364","source":"Crossref","is-referenced-by-count":5,"title":["Optimal Deep Belief Network Enabled Malware Detection and Classification Model"],"prefix":"10.32604","volume":"35","author":[{"given":"P.","family":"Pandi Chandran","sequence":"first","affiliation":[]},{"given":"N.","family":"Hema Rajini","sequence":"additional","affiliation":[]},{"given":"M.","family":"Jeyakarthic","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3332184","article-title":"Towards adversarial malware detection: Lessons learned from PDF-based attacks","volume":"52","author":"Maiorca","year":"2020","journal-title":"ACM Computing Surveys"},{"key":"ref2","first-page":"50","article-title":"The impact of artificial intelligence and robotics on the future employment opportunities","volume":"5","author":"Shaukat","year":"2020","journal-title":"Trends in Computer Science and Information Technology"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/ACCESS.2020.3046931","article-title":"What is core and what future holds for blockchain technologies and cryptocurrencies: A bibliometric analysis","volume":"9","author":"Nasir","year":"2021","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"53","DOI":"10.53571\/NJESR.2021.2.8.53-61","article-title":"Cyber crime and cyber security in Madhya Pradesh","volume":"2","author":"Bhargava","year":"2021","journal-title":"National Journal of Environment and Scientific Research"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"102515","DOI":"10.1016\/j.cose.2021.102515","article-title":"A novel malware classification and augmentation model based on convolutional neural network","volume":"112","author":"Tekerek","year":"2022","journal-title":"Computers & Security"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"222310","DOI":"10.1109\/ACCESS.2020.3041951","article-title":"A survey on machine learning techniques for cyber security in the last decade","volume":"8","author":"Shaukat","year":"2020","journal-title":"IEEE Access"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"102726","DOI":"10.1016\/j.bspc.2021.102726","article-title":"A novel framework for prognostic factors identification of malignant mesothelioma through association rule mining","volume":"68","author":"Alam","year":"2021","journal-title":"Biomedical Signal Processing and Control"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2803","DOI":"10.1002\/int.22451","article-title":"Boosting training for PDF malware classifier via active learning","volume":"37","author":"Li","year":"2022","journal-title":"International Journal of Intelligent Systems"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/TAI.2021.3103139","article-title":"Learn2Evade: Learning-based generative model for evading PDF malware classifiers","volume":"2","author":"Bae","year":"2021","journal-title":"IEEE Transactions on Artificial Intelligence"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"9821","DOI":"10.1109\/ACCESS.2020.2964788","article-title":"Finger vein biometrics: Taxonomy analysis, open challenges, future directions and recommended solution for decentralised network architectures","volume":"8","author":"Mohsin","year":"2020","journal-title":"IEEE Access"},{"key":"ref11","series-title":"2019 2nd Int. Conf. on Data Intelligence and Security (ICDIS)","first-page":"108","article-title":"Robust PDF malware detection with image visualization and processing techniques","author":"Corum","year":"2019"},{"key":"ref12","series-title":"2019 Int. Conf. on Cyber security and protection of digital services (Cyber Security)","first-page":"1","article-title":"A novel machine learning based malware detection and classification framework","author":"Sethi","year":"2019"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"107095","DOI":"10.1016\/j.knosys.2021.107095","article-title":"Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments","volume":"226","author":"Panker","year":"2021","journal-title":"Knowledge Based Systems"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.ins.2020.02.075","article-title":"A feature-vector generative adversarial network for evading PDF malware classifiers","volume":"523","author":"Li","year":"2021","journal-title":"Information Sciences"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"485","DOI":"10.3390\/electronics10040485","article-title":"Ensemble-based classification using neural networks and machine learning models for Windows PE malware detection","volume":"10","author":"Dama\u0161evi\u010dius","year":"2021","journal-title":"Electronics"},{"key":"ref16","first-page":"118","article-title":"Malware detection based on code visualization and two-level classification","volume":"12","author":"Moussas","year":"2021","journal-title":"Information\u2014An International Interdisciplinary Journal"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1016\/j.procs.2020.03.110","article-title":"The use of machine learning techniques to advance the detection and classification of unknown Malware","volume":"170","author":"Shhadat","year":"2020","journal-title":"Procedia Computer Science"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10796-020-10017-4","article-title":"DeepRan: Attention-based BiLSTM and CRF for ransomware early detection and classification","volume":"23","author":"Roy","year":"2021","journal-title":"Information Systems Frontiers"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.neunet.2021.09.019","article-title":"Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux Cloud environments","volume":"144","author":"Landman","year":"2021","journal-title":"Neural Networks"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"114974","DOI":"10.1016\/j.eswa.2021.114974","article-title":"Ensemble forecasting system for short-term wind speed forecasting based on optimal sub-model selection and multi-objective version of mayfly optimization algorithm","volume":"177","author":"Liu","year":"2021","journal-title":"Expert Systems with Applications"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.3390\/su13041699","article-title":"HF-SPHR: Hybrid features for sustainable physical healthcare pattern recognition using deep belief networks","volume":"13","author":"Javeed","year":"2021","journal-title":"Sustainability"},{"key":"ref22","series-title":"Int. Conf. on Platform Technology and Service (PlatCon)","first-page":"1","article-title":"An effective intrusion detection classifier using long short-term memory with gradient descent optimization","author":"Le","year":"2017"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-3\/TSP_IASC_29946\/TSP_IASC_29946.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:30:26Z","timestamp":1733520626000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n3\/49388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.029946","relation":{},"ISSN":["1079-8587"],"issn-type":[{"type":"print","value":"1079-8587"}],"subject":[],"published":{"date-parts":[[2023]]}}}