<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmytro Denysiuka,</string-name>
          <email>denysiuk@khmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>a Khmelnytskyi National University, Instytutska Str., 11, Khmelnytskyi, Ukraine</string-name>
          <email>as@tneu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Sachenkob</institution>
          ,
          <addr-line>c</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>bWestern Ukrainian National University</institution>
          ,
          <addr-line>Ternopil, Ukraine</addr-line>
          ,
          <institution>cKazimierz Pulaski University of Technology and Humanities in Radom</institution>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Nowadays malware detection is a very important task in information security. Criminals are constantly looking for new ways to attack computer networks and systems, so it is important to have a reliable mechanism to detect and prevent these threats. Existing anti-virus programs are not always effective in detecting new types of viruses or malware, which can compromise your system and steal important information. Therefore, it is critically important to investigate and create new methods for detecting malicious software, especially using modern technologies like Blockchain. One of the ways to detect malicious software is to use deep learning algorithms. For this, a Deep Learning Algorithm using Blockchain technology was developed to detect malicious programs. The basic idea is to use the blockchain to ensure security and accuracy of malware detection. The algorithm proposed in this work is based on the subsystems and Proof-of-Action. The first mechanism provides parallel analysis of potentially dangerous software by different participants. The second mechanism is used to validate the results of analysis and increase the accuracy of detection. The application of the proposed approach allows to detect malicious software with an accuracy of from 98.81% to 99.33%, which is quite a high result.</p>
      </abstract>
      <kwd-group>
        <kwd>1 malware</kwd>
        <kwd>malware detection</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Proof-of-Action</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Olena</title>
      <p>Geidarovaa,</p>
    </sec>
    <sec id="sec-2">
      <title>Mariia</title>
      <sec id="sec-2-1">
        <title>1. Introduction</title>
        <p>
          Cyber threats have continued to grow over the past three years, especially with the widespread
adoption of video conferencing platforms, telecommuting and other remote work solutions.
According to a study by Risk Based Security[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], more than 29 billion data records were stolen in
cyberattacks in 2021, that is the highest number on record.
        </p>
        <p>
          At the beginning of 2022, cybercrime has increased significantly, posing a threat to business and
other sectors of the economy. A study by McAfee[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] showed that the number of cyber attacks on
enterprises increased by 146% compared to the previous year. Most of these attacks target large
companies, but small and medium-sized businesses also fall victim to cybercriminals.
        </p>
        <p>Cyberattacks have used a variety of methods, including phishing, spreading malware via email and
social media, and using cryptocurrencies to demand ransom.</p>
        <p>
          In 2020, SonicWall[
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] registered 2.9 billion cyberattacks, which is 18% more than in 2019. Most
of these attacks targeted small and medium-sized businesses, as well as home computers.
        </p>
        <p>
          In 2019, a study by Symantec[
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] noted that more than 60% of cyber attacks were aimed at small
and medium-sized businesses. In addition, research has shown that criminals are increasingly using
social engineering techniques, such as phishing attacks, to gain access to sensitive information.
        </p>
        <p>
          According to Symantec's "Internet Security Threat Report" [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], the number of new vulnerabilities
used by hackers increased by 60% in 2021 compared to 2019.
        </p>
        <p>
          Also, according to Cybersecurity Ventures [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], it is predicted that by 2025 spending on cyber
security will reach $10.5 trillion.
        </p>
        <p>Thus, the problem of cyber security is very urgent and requires constant attention, research, solutions
and investment. And malware detection is a very important task in information security. Criminals are
constantly looking for new ways to attack computer networks and systems, so it is important to have a
reliable mechanism to detect and prevent these threats.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2. Related works</title>
        <p>
          Different approaches to detecting malicious programs are widely described in scientific resources.
For example, the classification of malware using user feedback is described in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], but this approach
leads to an increase in the number of false positives in the case of confidential resources.
        </p>
        <p>
          Another approach proposed in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] combines permissions and intents, which are supplemented by
some stages of classifiers like decision trees, multi-level perceptrons, and decision tables. These
stages combine the help of three schemes: determination of the average value of probabilities, product
of probabilities and majority voting.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], a technique for detecting malware through analysis of system call logs is introduced. This
approach achieves a high level of detection accuracy, but it neglects the possibility of certain
applications being able to detect sandbox-like environments.
        </p>
        <p>
          On the other hand, the system for malware detection proposed in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] employs a deep
convolutional neural network (CNN) to classify malware. The classification is based on a static
analysis of the raw code sequence obtained from the disassembled program.
        </p>
        <p>The work [11] proposed a system of static analysis, which consists of four stages. First, a call
graph is built for each program, from which sequences of unique API calls are obtained. Each call is
then assigned to a specific class, package, or family. The subsequent step involves constructing
Markov chains from sequences of API calls to model the behavior of each application. The system
then utilizes the probabilities of transitions between these calls as a feature vector to classify
applications as either benign or malicious.</p>
        <p>In [12], a framework for assessing the potential risk of applications was developed using triage.
This approach employs a probabilistic model to predict the presence and significance of information
flows in both benign and malicious applications. The results of the experiments demonstrated that this
approach is effective in predicting the availability of information flows and can significantly reduce
resource usage.</p>
        <p>Meanwhile, in [13], the approach to detecting malicious programs involves both static and
dynamic analysis. In order to improve the efficacy of static analysis-based malware detection,
traditional features such as permissions and API calls are utilized. The proposed method incorporates
feature selection and clustering techniques to normalize the features obtained from call graphs of
different sizes.</p>
        <p>In the study [14], the possibility of using meaningful and connective features for the detection of
malware was investigated. For this, various types of entities and their semantic relationships were
simulated, including relationships between files, archives, machines, APIs, and DLLs. A method was
developed to map relationships between files using a structured heterogeneous information network
(HIN) and metagraph-based approach. In order to identify the HIN, it was necessary to apply effective
methods of studying hidden ideas. For this, a new metagraph2vec model was proposed, which is
based on the creation of metagraph schemes.</p>
        <p>In [15], the potential use of evolutionary computations is being explored to generate new iterations
of malware capable of evading protection systems that rely on static analysis. Furthermore, these
methods could be employed to automatically devise more effective measures for preventing such
malware.</p>
        <p>In work [16], a novel approach to malware detection is suggested, involving the analysis of
information flows to detect behavior patterns and related flows that share common computation paths.
These intricate streams are able to accurately capture complex behavior, which can indicate either
malicious or benign programs. To identify unique and shared behavior patterns, the method utilizes an
N-gram analysis of API calls present in these complex flows.</p>
        <p>The paper [17] proposes the use of a deep discriminative adversarial network (DAN) to classify
applications into malicious and benign using three types of features: raw code operations,
permissions, and API calls. By using this approach, it is possible to detect malicious programs that
employ obfuscation techniques to avoid detection.</p>
        <p>An examination of literature reveals the significance of detecting malicious programs, with current
methods demonstrating considerable effectiveness but also a high rate of false positives. A notable
limitation of this approach is its substantial computational demands and inability to dynamically
counteract both known and unknown malware attacks.</p>
        <p>In addition, some of these methods share common weaknesses, such as ignoring packaged
malware and failing to protect devices from zero-day attacks and malware that can modify their code.</p>
        <p>Existing anti-virus programs are not always effective in detecting new types of viruses or malware,
which can compromise your system and steal important information. Therefore, it is critically
important to investigate and create new methods for detecting malicious software, especially using
modern technologies like Blockchain.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.1 Blockchain in cybersecurity</title>
        <p>Blockchain is a technology that secures data using cryptographic techniques such as hash functions
and digital signatures. These methods make it possible to guarantee the integrity of data stored in
blockchain blocks (Figure 1).</p>
        <p>Blockchain technology has practical applications in the realm of cybersecurity, providing a secure
and dependable infrastructure for data processing, storage, and transmission. For instance, blockchain
can be used to store sensitive information like financial information, personal data, and medical data.
With encryption methods, data can be stored in an encrypted form and access to it can be controlled
using digital signatures and other methods.</p>
        <p>In addition, the blockchain can be used to confirm the authenticity and integrity of data that is
transmitted over the network. Blockchain can help prevent hacking and other forms of cybercrime by
creating a safe and secure infrastructure.</p>
        <p>However, it is important to note that blockchain alone is not a universal defense against
cybercrime. Criminals can use a variety of techniques to gain access to data, even if it is stored on the
blockchain. However, the application of blockchain can be a useful addition to other cybersecurity
methods already in use.</p>
        <p>In addition to data storage, blockchain can also be used to verify the identity of users and create
secure payment mechanisms. Many blockchain platforms, such as Bitcoin and Ethereum, are used for
secure and anonymous transactions, allowing users to transact without the use of intermediaries such
as banks.</p>
        <p>One of the fundamental advantages of the blockchain is that it works on the principle of
decentralization, that is, data is stored on several computers at the same time (Figure 2), which makes
it impossible to hack the system by invading one central server. Furthermore, for any modifications to
the blockchain, the consensus of the majority of network participants is necessary, ensuring the
system's reliability and its ability to withstand hacking attempts and manipulation.</p>
        <p>However, like any technology, blockchain also has its limitations and drawbacks. For example,
processing transactions on the blockchain can take quite a long time and have high fees. Additionally,
some types of blockchain attacks can be successful if criminals can gain access to sufficient
computing resources.</p>
        <p>One of the unique features of blockchain technology is that in order to compromise sequences of
blocks, one needs to have more than 51% participation in the computing power used to create new
blocks. The use of blockchain technology offers substantial advantages to numerous users who need
instantaneous, trustworthy access to shared transactions. As the blockchain does not have a singular
data storage location, it lacks a central point of weakness. This enhances the security and accessibility
of data for each participant in the network.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.2. Incorporating Blockchain Mechanism for the Implementation of Malware</title>
      </sec>
      <sec id="sec-2-5">
        <title>Detection Technologies</title>
        <p>The article outlines a flexible approach to identifying malicious software in networks, which relies
on a load distribution mechanism among network participants. Malware poses a serious threat to the
security of information systems, and therefore the development of effective methods of searching for
it is extremely important.</p>
        <p>The demonstrated method employs various machine learning techniques to identify code
fragments that may pose a threat. Based on the received data, the software tool determines whether
this piece of code is malware or benign software. This enables a successful search for malware, which
is particularly advantageous during the swift dissemination of new malicious programs. Furthermore,
the method utilizes a range of machine learning techniques such as data classification and deep
learning. These methods make it possible to improve the accuracy of detection of malware and reduce
the number of false signals.</p>
        <p>The primary objective of the suggested approach is to enhance malware detection efficacy through
the segregation of malware identification and detection mechanisms.</p>
        <p>The developed method is comprised of two subsystems, which prevent information compromise
and improve malware identification.</p>
      </sec>
      <sec id="sec-2-6">
        <title>2.3. Multi-Network Malware Detection Subsystem</title>
        <p>A collection of malware detection networks refers to a group of networks, wherein each network
utilizes a relevant algorithm to identify potentially harmful code, and is composed of a cohort of
network participants. This mechanism makes it possible to quickly scale the network, to increase the
number of subnets with the appropriate search algorithms for the malware detection, and to scale the
number of participants in the subnets. Figure 3 shows the general structure of the network, as a result
of which we receive a Blockchain block with the result of the work, for further analysis by the neural
network. Thus, the set of subnets can be denoted as 
= { 

} =1, where K is the total number of
in the validation;   is the a set of users associated with  
subnet.
subnets engaged in examining potentially hazardous code segments,   is the i-th subnet participating</p>
        <p>Each subnet can have an unlimited number of users in order to increase the speed of malware
detection. In order to effectively use the power of the network, a part of the participants performs the
role of a feature extraction mechanism, which can indicate belonging to the appropriate method of
malware detection. Each member of the network checks a specific piece of code for potentially
dangerous elements and submits a report to create an overall subnet report. Each network technique
can have a distinct approach to representing potentially hazardous code in a format amenable to
machine learning analysis, achieved through the selection of suitable features, such as n-grams,
control flow graphs, feature vectors, opcode sequences, etc.</p>
        <p>An instance of the arrangement of network nodes for scrutinizing potentially hazardous code is
depicted in Figure 4. Each of the nodes consists of a set of participants of the network P, which
perform verification according to the given method of the network Ni.</p>
        <p>Since network participants do not know about each other to ensure network security from data
compromise, a consensus mechanism based on the Proof-of-Action (PoA) algorithm
was used.</p>
        <p>Thanks to the Proof-of-Action algorithm, the maximum efficiency of the use of computing power is
achieved. Because in order to achieve consensus, Proof-of-Action uses a mechanism for validating
results from a group of nodes that have completed the verification. Thus, a randomly generated group
of validators is used for validation. To increase the accuracy and reliability of the validation results,
the number of validation steps can be increased. If a conflict of validation results occurs during
validation, the validation iteration is repeated with a change in the number of validators. After
conducting the validation stage and drawing up the corresponding report, the participants of the
validation groups receive efficiency coefficients, which are later used to obtain the validator's rating.
This coefficient is taken into account when creating a general report on the results of the network, and
the soft voting method is used.</p>
      </sec>
      <sec id="sec-2-7">
        <title>2.4. Subsystem of the analysis of malware detection results</title>
        <p>The Blockchain method is used for efficient and transparent storage of information in the system.
This approach will provide an opportunity to store the results of the check in a decentralized manner.
With the formalized reports of the detection sub-networks and the Blockchain structure, the validation
results are used to train a deep neural network. Thanks to this, the system has the ability to check
potentially dangerous code fragments without involving subnets. If the accuracy of the check is low,
the system will start a mechanism for checking potentially dangerous codes over networks. Figure 5
shows the interaction mechanism of the sequence of blocks and the neural network.</p>
        <p>When a new block is created, the neural network starts a learning mechanism based on the
generated network results.</p>
        <p>Figure 6 shows the general algorithm of the system for analyzing a potentially dangerous piece of
code.</p>
      </sec>
      <sec id="sec-2-8">
        <title>3. Experiments</title>
        <p>A network consisting of 120 computer systems divided into 12 subnets was used for software
analysis experiments. Each computer subnet was designed to perform certain functions. For example,
the S group was engaged in extracting signs that indicated that the programs belonged to the
malicious class.</p>
        <p>The P team analyzed potentially dangerous code to determine whether it was malicious or safe
software. Group J, for its part, was responsible for verifying and validating the malware analysis
results that were received from group P.</p>
        <p>This network allowed for more accurate and detailed analysis of the software, which ensured
greater efficiency and reliability of the experiments.</p>
        <p>In addition, this division of responsibilities among different groups has helped in faster and more
accurate detection of malicious software, as well as in reducing the number of false reports about safe
software.</p>
        <p>The following methods based on machine learning [18-25] were employed to scrutinize segments
of code that may pose a threat: K-Nearest Neighbor, Random Forest, Support Vector Machine,
Rotation Forest, Decision Trees [26-28].</p>
        <p>The publicly available data set [29] was used for the experiments. It contains 3214 samples of
different malware classes. The samples of benign software were taken from the Microsoft store [30]
and consist of 3597 units. Table 1 displays the outcomes of the conducted experiments.
5. References
[11] E. Mariconti, L. Onwuzurike, P. Andriotis, E. De Cristofaro. MaMaDroid: Detecting
Android Malware by Building Markov Chains of Behavioral Model, ACM Trans. Priv. Sec.,
1 1 (2019) 1–33.
[12] O. Mirzaei, G. Suarez-Tangil, J. Tapiador, J. M.de Fuentes Triflow: Triaging android
applications using speculative information flows, Proceedings of the 2017 ACM on Asia
Con-ference on Computer and Communications Security, 2017. – pp. 640-651.
[13] Y. Liu, K. Guo, X. Huang, Z. Zhou, and Y. Zhang. Detecting Android Malwares with
HighEfficient Hybrid Analyzing Methods. Mobile Information Systems (2018) 1–12, doi:
10.1155/2018/1649703.
[14] Y. Fan, S. Hou, Y. Zhang, Y. Ye, and M. Abdulhayoglu. Gotcha - Sly Malware!: Scorpion A
Metagraph2vec Based Malware Detection System. Proceedings of the 24th ACM SIGKDD
International Conference on Knowledge Discovery &amp; Data Mining (2018) 253-262.
[15] S. Sen, E. Aydogan, and A. I. Aysan. Coevolution of Mobile Malware and Anti-Malware.</p>
        <p>IEEE Trans.Inform.Forensic Secur., 13 10 (2018) 2563–2574, doi:
10.1109/TIFS.2018.2824250.
[16] F. Shen, J. D. Vecchio, A. Mohaisen, S. Y. Ko, and L. Ziarek, Android Malware Detection
Using Complex-Flows. IEEE Trans. on Mobile Comput., 8 6 (2019) 1231–1245, doi:
10.1109/TMC.2018.2861405.
[17] S. Millar, N. McLaughlin, J. Martinez del Rincon, P. Miller, Z. Zhao. DANdroid: A
multiview discriminative adversarial network for obfuscated Android malware detection.
Proceedings of the tenth ACM conference on data and application security and privacy,
2020, pp. 353-364.
[18] L. Gaoqi, et al. "Distributed blockchain-based data protection framework for modern power
systems against cyber attacks." IEEE Transactions on Smart Grid 10.3 (2018): 3162-3173.
[19] N. Moustafa, B. Turnbull and K. -K. R. Choo An ensemble intrusion detection technique
based on proposed statistical flow features for protecting network traffic of internet of
things, IEEE Internet of Things Journal 6.3 (2018) 4815-4830.
[20] A. Ishtiaque, M. Darda and S. Nath. Blockchain: A New Safeguard to Cybersecurity,</p>
        <p>Blockchain Technology: Applications and Challenges (2021) 271-284.
[21] B. Savenko, S. Lysenko, K. Bobrovnikova, O. Savenko, G. Markowsky. Detection DNS
Tunneling Botnets // Proceedings of the 2021 IEEE 11th International Conference on
Intelligent Data Acquisition and Advanced Computing Systems: Technology and
Applications (IDAACS), IDAACS’2021, Cracow, Poland, September 22-25, 2021.
[22] S. Lysenko, K. Bobrovnikova, R. Shchuka, O. Savenko. A Cyberattacks Detection
Technique Based on Evolutionary Algorithms. 11th International Conference on Dependable
Systems, Services and Technologies (DESSERT), 2020. Vol.1. pp. 127-132.
[23] S. Lysenko, O. Savenko, K. Bobrovnikova. DDoS Botnet Detection Technique Based on the</p>
        <p>Use of the Semi-Supervised Fuzzy c-Means Clustering, CEUR-WS 2104 (2018) 688-695.
[24] K. Bobrovnikova, S. Lysenko, B. Savenko, P. Gaj, O. Savenko. Technique for IoT malware
detection based on control flow graph analysis. Radioelectronic and Computer Systems, 1
(2022) 141–153.
[25] S. Lysenko, K. Bobrovnikova, B. Savenko, P. Gaj, O. Savenko, Botnet Detection Approach</p>
        <p>Based on DNS CEUR WS 3156 (2022) 400–410
[26] Y.Gao, H. Hasegawa, Y. Yamaguchi, H. Shimada, Malware Detection Using Gradient
Boosting Decision Trees with Customized Log Loss Function. In 2021 International
Conference on Information Networking (ICOIN), pp. 273-278.
[27] Savenko O. Nicheporuk, A., Hurman, I., Lysenko, S. Dynamic signature-based malware
detection technique based on API call tracing. CEUR-WS. 2019. Vol. 2393. P.633-643,
ISSN: 1613-0073.
[28] Q. Wang and H. Meng, Blockchain-based Federated Learning with Limited Resources, 2022
3rd International Conference on Computer Vision, Image and Deep Learning &amp; International
Conference on Computer Engineering and Applications (CVIDL &amp; ICCEA), Changchun,
China, 2022, pp. 449-452, doi: 10.1109/CVIDLICCEA56201.2022.9825317.
[29] MalwareBazaar | Malware sample exchange. URL: https://bazaar.abuse.ch/
[30] Microsoft Store. URL: https://apps.microsoft.com/store/apps</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Cybersecurity benchmark study reveals risk-based approach prevents security breaches URL: https://www.skyboxsecurity.com/blog/cybersecurity-benchmark-study-reveals-risk-basedapproach-prevents-security-breaches/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>The</given-names>
            <surname>McAfee Consumer Mobile Threat Report</surname>
          </string-name>
          <string-name>
            <given-names>URL</given-names>
            : https://www.mcafee.com/content/dam/consumer/en
            <surname>-</surname>
            us/docs/reports/rp-mobile-
          </string-name>
          threat-reportfeb-
          <year>2022</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <article-title>SonicWall 2022 cyber threat</article-title>
          report URL: https://www.infopoint-security.de/media/2022- sonicwall
          <article-title>-cyber-threat-report</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>SymantecTM</given-names>
            <surname>Universal Link Installation Guide</surname>
          </string-name>
          <string-name>
            <surname>URL</surname>
          </string-name>
          : https://techdocs.broadcom.com/content/dam/broadcom/techdocs/symantec-securitysoftware/
          <article-title>endpoint-security-and-management/integrated-cyber-defense-exchange/generatedpdfs/Symantec_Universal_Link_Installation_Guide_4.0.0</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Internet</given-names>
            <surname>Security Threat Report</surname>
          </string-name>
          <string-name>
            <surname>URL</surname>
          </string-name>
          : https://docs.broadcom.com/doc/istr-24-2019-en
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Cybercrime</given-names>
            <surname>To Cost</surname>
          </string-name>
          The World $
          <volume>10</volume>
          .5 Trillion Annually By 2025 URL: https://cybersecurityventures.com/cybercrime-damage-costs-10
          <string-name>
            <surname>-</surname>
          </string-name>
          trillion-by-2025/
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Amro</surname>
          </string-name>
          ,
          <article-title>Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences</article-title>
          ,
          <source>International Journal of Computer Science and Network Security</source>
          <volume>18</volume>
          (
          <issue>1</issue>
          ) (
          <year>2018</year>
          )
          <fpage>18</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
            <surname>Idrees</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rajarajan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Conti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Rahulamathavan</surname>
          </string-name>
          ,
          <article-title>Pindroid: a novel android malware detection system using ensemble learning methods</article-title>
          ,
          <source>Computers &amp; Security</source>
          ,
          <volume>68</volume>
          (
          <year>2017</year>
          )
          <fpage>36</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chaba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dave</surname>
          </string-name>
          ,
          <article-title>Malware Detection Approach for Android systems Using System Call Logs</article-title>
          ,
          <source>arXiv preprint arXiv:1709.0880</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>McLaughlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Martinez del Rincon</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. Kang</surname>
          </string-name>
          <article-title>Deep android malware detection</article-title>
          ,
          <source>Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy</source>
          ,
          <year>2017</year>
          . - pp.
          <fpage>301</fpage>
          -
          <lpage>308</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>