{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T02:52:01Z","timestamp":1719283921257},"reference-count":20,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:00:00Z","timestamp":1588032000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence"],"published-print":{"date-parts":[[2020,8]]},"abstract":"Abstract<\/jats:title>Nowadays, most of the services from cloud are protuberant within the all commercial, public, and private areas. A primary difficulty of cloud computing system is making a virtualized environment safe from all intruders. The existing system uses signature\u2010based methods, which cannot provide accurate detection of malware. This paper put forward an approach to detect the malware by using the approach based on feature extraction and various classification techniques. Initially the clean files and malware files are extracted. The feature selection includes gain ratio to provide subset features. The classification is used to predict any malware that has been entered in the mobile device. In this paper, it is proposed to use the ensemble classifier which contains different kinds of classifiers such as Support Vector Machine, K\u2010Nearest Neighbor, and Na\u00efve Bayes classification. These together are known as a meta classifier. These three classification methods had been used for proposed work and get the results with higher accuracy. This measures the correctness of the prediction happened using ensemble method with high precision and recall values which is specifically identifies the quality of the techniques \nused.<\/jats:p>","DOI":"10.1111\/coin.12314","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T13:26:25Z","timestamp":1588080385000},"page":"1097-1112","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["On viability of detecting malwares online using ensemble classification method with performance metrics"],"prefix":"10.1111","volume":"36","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7275-6566","authenticated-orcid":false,"given":"N.","family":"Saranya","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering Sri Shakthi Institute of Engineering and Technology Coimbatore India"}]},{"given":"V.","family":"Manikandan","sequence":"additional","affiliation":[{"name":"Department of Electrical Electronics Engineering Coimbatore Institute of Technology Coimbatore India"}]}],"member":"311","published-online":{"date-parts":[[2020,4,28]]},"reference":[{"key":"e_1_2_6_2_1","article-title":"Malware detection in cloud computing infrastructures","author":"Michael R","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"e_1_2_6_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSI.2019040103"},{"key":"e_1_2_6_4_1","unstructured":"RamanK. Selecting features to classify malware # product security incident response team (PSIRT). Adobe Systems Inc.601 Townsend Street San Francisco CA 94103;2012."},{"key":"e_1_2_6_5_1","first-page":"1","article-title":"A typical IoT architecture\u2010based regular monitoring of arthritis disease using time wrapping algorithm","author":"Parthasarathy P","year":"2018","journal-title":"Int J Comput Appl"},{"key":"e_1_2_6_6_1","doi-asserted-by":"crossref","unstructured":"AlamMS VuongST. Random forest classification for detecting android malware. Paper presented at: Proceedings of the IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber Physical and Social Computing;2013","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"e_1_2_6_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.036"},{"key":"e_1_2_6_8_1","doi-asserted-by":"crossref","unstructured":"MirzaQKA Mohi\u2010ud\u2010dinG. A cloud\u2010based energy efficient system for enhancing the detection and prevention of modern malware. Paper presented at: Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications.","DOI":"10.1109\/AINA.2016.133"},{"key":"e_1_2_6_9_1","first-page":"15","article-title":"A study of android malware detection techniques and machine learning","author":"Baskaran B","year":"2016","journal-title":"MAICS"},{"key":"e_1_2_6_10_1","article-title":"Cloud\u2010based malware detection game for Mobile devices with offloading","author":"Liang X","year":"2017","journal-title":"IEEE Trans Mob Comput"},{"key":"e_1_2_6_11_1","article-title":"CloudIntell: an intelligent malware detection system","author":"Ali\u2010Mirza QK","year":"2017","journal-title":"Detect Syst Future Generat Comput Syst"},{"key":"e_1_2_6_12_1","article-title":"Effect of anti\u2010malware software on infectious nodes in cloud environment","author":"FarzanehAbazari MA","year":"2016","journal-title":"Comput Sec"},{"key":"e_1_2_6_13_1","doi-asserted-by":"crossref","unstructured":"ChuangHY WangSD. Machine learning based hybrid behavior models for Android malware analysis. Paper preseented at: Proceeding of the IEEE International Conference on Software Quality Reliability and Security;2015.","DOI":"10.1109\/QRS.2015.37"},{"key":"e_1_2_6_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.09.002"},{"key":"e_1_2_6_15_1","unstructured":"https:\/\/github.com\/ashishb\/android\u2010malware."},{"key":"e_1_2_6_16_1","unstructured":"https:\/\/github.com\/fouroctets\/Android\u2010Malware\u2010Samples."},{"key":"e_1_2_6_17_1","unstructured":"https:\/\/github.com\/hxp2k6\/Android\u2010Malwares."},{"key":"e_1_2_6_18_1","first-page":"1","article-title":"An automatic Tamil speech recognition system by using bidirectional recurrent neural network with self\u2010organizing map","author":"Lokesh S","journal-title":"Neural Comput Appl"},{"key":"e_1_2_6_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-018-1139-0"},{"key":"e_1_2_6_20_1","first-page":"1","article-title":"A new approach for prediction of lung carcinoma using back propagation neural network with decision tree classifiers","author":"Varadharajan R","year":"2018","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"e_1_2_6_21_1","first-page":"1","article-title":"A novel Gini index decision tree data mining method with neural network classifiers for prediction of heart disease","author":"Mathan K","year":"2018","journal-title":"Design Automat Embed Syst"}],"container-title":["Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fcoin.12314","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/coin.12314","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1111\/coin.12314","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/coin.12314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T03:47:41Z","timestamp":1693885661000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/coin.12314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,28]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["10.1111\/coin.12314"],"URL":"https:\/\/doi.org\/10.1111\/coin.12314","archive":["Portico"],"relation":{},"ISSN":["0824-7935","1467-8640"],"issn-type":[{"value":"0824-7935","type":"print"},{"value":"1467-8640","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,28]]},"assertion":[{"value":"2019-09-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}