<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Chaikovskyi);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Modeling the detection process of polymorphic malware based on the Lotka-Volterra model⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksym Chaikovskyi</string-name>
          <email>max.chaikovskyi@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Chaikovska</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomas Sochor</string-name>
          <email>tomas.sochor@osu.cz</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Martyniuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Lyhun</string-name>
          <email>oleksii.lyhun@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>Instytuts'ka Str. 11, 29000, Khmelnytskyi</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Prigo University</institution>
          ,
          <addr-line>Havirov</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1883</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The article proposes the use of the Lotka-Volterra model ("predator-prey" model) for modeling the process of detecting polymorphic malware. It is proposed to consider α as the probability that the number of polymorphic viruses will increase; β - the probability that polymorphic viruses of different levels of complexity will be detected using the selected methods, technologies and tools; γ - the probability that some of the selected methods, technologies and tools will not be effective in detecting polymorphic viruses of different levels of complexity as a result of the appearance of new varieties; δ - the probability that polymorphic viruses of different levels of complexity will require the complex use of selected methods, technologies and tools, as well as the latest approaches; x - quantitative measurement of polymorphic viruses at time t; y is a quantitative measure of the available technologies, methods and tools for detecting polymorphic viruses at time t. The influence of input indicators on the maximum rate of spread and detection of polymorphic viruses in its fluctuating process was studied. This approach confirms the feasibility of using a set of methods to detect polymorphic malware: string search algorithms, intelligent data analysis, sandbox analysis, machine learning, the method of developing structural functions, probabilistic logical networks.</p>
      </abstract>
      <kwd-group>
        <kwd>polymorphic malware</kwd>
        <kwd>detection probability of polymorphic malware</kwd>
        <kwd>Lotka-Volterra model 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The use of tools and techniques to detect polymorphic malware can be compared to the classic
predator-prey model. The Lotka-Volterra model ("predator-prey" model) describes a population
consisting of two species that interact with each other. Victims die out at a rate equal to the number
of encounters between predators and prey, which is proportional to the size of both populations.
Predators reproduce at a rate that is proportional to the amount of prey eaten by the predators. The
system of equations that describes such a population is called the Lotka-Volterra model. According
to the conditions of the model, the victims eat the plants, and the predators eat the victims. We will
use this model to simulate the process of detecting polymorphic malware. Polymorphic viruses in a
computer system will act as a "victim", tools and methods for detecting polymorphic malware will
act as a "predator".</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>The problem of detecting malicious software is quite relevant and a significant amount of research
by scientists is devoted to it.</p>
      <p>
        The work [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] reflects a comprehensive modern review of research on the malware detection
model.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] proposes an intelligent agent system for detecting DDoS attacks using automatic
feature selection and selection.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], it is stated that detection of malicious traffic in computer systems and improvement of
security of computer networks is possible using the results of analysis and detection of malicious
programs using machine learning algorithms to calculate the difference in correlation symmetry.
      </p>
      <p>The use of machine learning is also proposed in [15].</p>
      <p>
        The study [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] proposed an approach that takes advantage of the deep transfer methodology and
includes a fine-tuning method and various combination strategies to improve detection and
classification performance without the need to develop training models from scratch.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], malicious software is detected with the help of convolutional neural networks (CNN), in
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] with the help of machine learning algorithms.
      </p>
      <p>
        The work [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] compares the methods of detecting malicious programs based on static, dynamic
and hybrid analysis.
      </p>
      <p>
        In work [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] proposes a new systematic approach to identifying modern malware using dynamic
deep learning-based methods combined with heuristic approaches to classify and detect five modern
malware families: adware, Radware, rootkit, SMS malware, and ransomware.
      </p>
      <p>
        The work [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] proposes an integrated framework for implementing IoT with blockchain
technology to guarantee high level of security and validation process based on the integration
between consensus algorithms of blockchain (PBFT and Tangle).
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], a conceptual model of multi-computer systems was developed, which is designed to
ensure the functioning of anti-virus baits and traps for detecting malicious programs.
      </p>
      <p>In works [17, 18] proposed a novel detection approach by generating structural features through
computing a stream of byte chunks using compression ratio, entropy, Jaccard similarity coefficient
and Chi-square statistic test.</p>
      <p>The paper [20] presents an approach to the detection of metamorphic viruses based on the
analysis of its obfuscation features.</p>
      <p>In [21], the K-NN algorithm was used to detect malicious software. In [22], a support vector
machine (SVM) model was used to detect malicious software. Dynamic Malware Analysis with
Reinforcement Learning was carried out in [24].</p>
      <p>In [25], a method for determining the effectiveness of a distributed system for detecting
anomalous manifestations is proposed. In work [26], a method for detecting unknown metamorphic
viruses is proposed, which is based on the analysis of potentially suspicious behavior of programs
on the host, and in work [27] - a method for detecting metamorphic viruses, based on the search for
equivalent functional blocks.</p>
      <p>The paper [28] addresses the challenges associated with App-DDoS detection and presents a
highly effective and adaptable solution for detecting various types of App-DDoS attacks.</p>
      <p>
        So, you can see quite a wide selection of methods for detecting malware. One of these models is
also the Lotka-Volterra model (“predator-prey” model) [
        <xref ref-type="bibr" rid="ref5">5, 23</xref>
        ], which has found wide use in various
areas of our life: in space research [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], biology [
        <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
        ], in many in the fields of engineering [16],
medicine [19], security assessment of cyber-physical systems [29]. However, the use of this model
for researching the process of identifying polymorphic software is quite appropriate and relevant,
which is why this study is devoted to it.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology</title>
      <p>malware.</p>
      <p>Consider the classic Lotka-Voltaire model and its adaptation to the process of detecting polymorphic</p>
      <sec id="sec-3-1">
        <title>3.1. The classic Lotka-Volterra model</title>
        <p>In general, the model of interspecific competition looks as follows:


 

= (α −  )
= (− +  )
(1)
(3)
(2)
malware
where x is the number of victims; y is the number of predators; t – time; α, β, γ, δ are coefficients that
reflect the interaction between species.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Adaptation of the model to study the process of detection of polymorphic</title>
        <p>In the case of adaptation of the model to simulate the polymorphic malware detection process, α, β,
γ, δ can display the following: α is the probability that the number of polymorphic viruses will
increase; β is the probability that polymorphic viruses of different levels of complexity will be
detected using the selected methods, technologies and tools; γ is the probability that some of the
selected methods, technologies and tools will not be effective in detecting polymorphic viruses of
different levels of complexity as a result of the appearance of new varieties; δ is the probability that
polymorphic viruses of different levels of complexity will require the complex use of selected
methods, technologies and tools, as well as the latest approaches; x - quantitative measurement of
polymorphic viruses at time t; y is a quantitative measure of the available technologies, methods and
tools for detecting polymorphic viruses at time t.</p>
        <p>It immediately follows from the system that if there are no polymorphic viruses (x = 0), then the
number of necessary methods, technologies and tools for their detection will decrease exponentially
with a certain initial coefficient (γ according to formula 1).</p>
        <p>A similar situation is obtained in the complete absence of methods, technologies and tools for
detecting polymorphic viruses (y = 0):</p>
        <p>̇ = − ∙  →  =  1 ∙  − ∙ ,  1 .,
  ̇ =  ∙  →  =  2 ∙   ∙ ,  2 .,
This equation (3) is sometimes called the Malthus equation.</p>
        <p>Therefore, the growth of polymorphic viruses is exponential with a certain, predetermined
constant (α).</p>
        <p>It is worth noting that the Lotka-Volterra model makes several assumptions:</p>
        <p>There is a constant appearance of polymorphic viruses.</p>
        <p>Polymorphic viruses, as well as their detection technologies, are in the computer system.
Only the presence of polymorphic viruses and their detection technologies in the computer
system is taken into account.</p>
        <p>Let's find special points possessed by the system:

(α −  ) = 0
(− +  ) = 0
→</p>
        <p>(4)
 (0) =
 (0) =




.</p>
        <p>It is clear that when x (0) = 0, y (0) = 0, the special point will be precisely (0, 0), but this case is not
interesting, because at the zero moment of time there are no polymorphic viruses and technologies
for their detection and, logically , no longer appear.</p>
        <p>Much more interesting things happen in the nonzero case. Depending on the initial parameters,
a special point will change - such a number of viruses and their detection technologies, when both
indicators remain unchanged and balanced.</p>
        <p>If the initial condition does not fall into a special point, the phase curves will be located around
it, forming an infinite cyclic oscillation, which was exactly what Lotka and Volterra were talking
about. That is, the number of polymorphic viruses will grow, and the number of effective methods
for their detection will fall, then vice versa, and so on for an unlimited amount of time (within
reasonable limits, of course).</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Stages of the proposed integrated approach to detection, analysis and classification of polymorphic malware</title>
        <p>This approach is the second stage in the proposed comprehensive approach to detection, analysis
and classification of polymorphic malware (Figure 1).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments</title>
      <p>Consider the implementation of the "predator-prey" model for modeling the process of detecting
polymorphic malware using the Lotka-Volterra equation solver [30].</p>
      <p>The following scale is used to denote x and y parameters (table 1). The β indicator was formed on
the basis of previous studies on the effectiveness of the complex use of the above methods for
detecting polymorphic malware.</p>
      <sec id="sec-4-1">
        <title>4.1. Experiment 1</title>
        <p>Experiment 1 (2 methods were used to detect polymorphic viruses) involves the following input
parameters (Figure 2, 3): α=0.2; β=0.3 (2 methods were used to detect polymorphic viruses); γ=0.7;
δ=0.3; x=1; y=1; max_time = 100 (seconds); t = 1.</p>
        <p>Point Scale for Input Parameters
2 methods were used (string search algorithm + 1 of the
methods (intelligent data analysis, sandbox analysis,
machine learning, structural function development
method)
method)
3 methods were used (string search algorithm + 2 of the
methods (intelligent data analysis, sandbox analysis,
machine learning, structural function development
β
0.1
0.3
6 or
more</p>
        <p>Polymorphic viruses of
the 4th and lower levels
of complexity
Polymorphic viruses of
the 5th and lower levels
of complexity
Polymorphic viruses of
the 6th and lower levels
of complexity
4 methods were used (string search algorithm + 3
mmeatchhoindes (lienatrenlliingge,ntstdrautcatuarnalalyfsuins,ctsioanndbdoexvealonpamlyesinst, 0.5
method)
5 methods were used (row search algorithm, intelligent
data analysis, sandbox analysis, machine learning, 0.6
structural function development method)
6 or more methods are used (string search algorithm,
intelligent data analysis, sandbox analysis, machine
learning, structural function development method, 0.9
probabilistic logic networks)</p>
        <p>It can be seen in Figures 2, 3 that the process is oscillatory. With the same initial values of the
number of polymorphic viruses and methods of their detection on a point scale at the level of 1 point.
Under these input values, the number of polymorphic viruses increases, and the number and
efficiency of polymorphic virus detection methods decreases. When the value of y reaches β = 0.3,
partial detection of polymorphic viruses occurs and their number begins to decrease.</p>
        <p>The decrease in the number of polymorphic viruses after a certain time begins to be affected by
y, and the number of polymorphic viruses reaches the value (in point expression) γ/δ=0.7/0.3=2.33,
the number of methods used to detect polymorphic malware also begins to decrease along with by
reducing the number of polymorphic viruses. The decrease in the number of polymorphic viruses
and methods of its detection decreases until y reaches the value α/β = 0.2/0.3=0.66. At this moment,
the number of polymorphic viruses begins to increase, and after a certain period of time and methods
of their detection. This process is constantly repeated with a certain period.</p>
        <p>The periodicity of the process can be clearly observed in the pictures. The number of polymorphic
viruses and their detection methods fluctuates around the values of x = 2.33, y = 0.66, respectively.</p>
        <p>The periodicity of the process is well observed on the phase curve (x(t), y(t)), which is a closed
line. The extreme left point of this curve is the point at which the number of polymorphic viruses
reaches its minimum value, and the extreme right point - the maximum. Between these points, the
number of effective detection methods first decreases to the lower point of the phase curve and then
increases to the upper point of the phase curve. The phase curve covers the point x = 2.33 and y =
0.66. At this point, the system has a stationary state (dx/dt=0, dy/dt=0). If at the initial moment the
system was at this point, then over time x(t) and y(t) will not change and will remain constant, in all
other cases an oscillatory process will be observed. Based on these initial values, the maximum value
of polymorphic malware detection methods (in terms of points) will be 2.33 points.</p>
        <p>It can be seen that the selected virus detection methods are not effective and lead to the spread of
viruses to the level of almost 5 points.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Experiment 2</title>
        <p>Experiment 2 (5 methods were used to detect polymorphic viruses) involves the following input
parameters (Figure 4, 5): α=0.2; β=0.6 (5 methods were used to detect polymorphic viruses); γ=0.2;
δ=0.3; x=1; y=1; max_time = 100 (seconds); t = 1.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Experiment 3</title>
        <p>Experiment 3 (6 methods were used to detect polymorphic viruses) involves the following input
parameters (Figure 6, 7): α=0.5; β=0.9 (6 methods were used to detect polymorphic viruses); γ=0.3;
δ=0.7; x=1; y=1; max_time = 100 (seconds); t = 1. The selected virus detection methods (6) are effective
and result in a virus spread of slightly more than 1 point.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>The study proposes the use of the Lotka-Volterra model for modeling the process of detecting
polymorphic malware. It is proposed to consider α as the probability that the number of polymorphic
viruses will increase; β - the probability that polymorphic viruses of different levels of complexity
will be detected using the selected methods, technologies and tools; γ - the probability that some of
the selected methods, technologies and tools will not be effective in detecting polymorphic viruses
of different levels of complexity as a result of the appearance of new varieties; δ - the probability
that polymorphic viruses of different levels of complexity will require the complex use of selected
methods, technologies and tools, as well as the latest approaches; x - quantitative measurement of
polymorphic viruses at time t; y is a quantitative measure of the available technologies, methods and
tools for detecting polymorphic viruses at time t. The influence of input indicators on the maximum
rate of spread and detection of polymorphic viruses in its fluctuating process was studied. This
approach confirms the feasibility of using a complex of 6 methods to detect polymorphic malware:
string search algorithms, intelligent data analysis, sandbox analysis, machine learning, the method
of developing structural functions, probabilistic logical networks.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling
check; DeepL Translate in order to: some phrases translation into English. After using these
tools/services, the authors reviewed and edited the content as needed and take full responsibility for
the publication’s content.
[15] A. J. Kurian, A. Santhosh, M. Subin, Enhanced malware detection framework leveraging
machine learning algorithms. International Research Journal of Modernization in Engineering
Technology and Science 06(03) (2024) 3597-3603.
[16] Y. Lin, Q. Din, M. Rafaqat, A. A. Elsadany, Y. Zeng, Dynamics and Chaos Control for a
Discrete</p>
      <p>Time Lotka-Volterra Model. IEEE Access, 8, (2020) 126760-126775.
[17] Y. T. Ling, · N. F. M. Sani, · M. T. Abdullah, · N. A. W. A. Hamid, Metamorphic malware detection
using structural features andnonnegative matrix factorization with hidden markov model,
Journal of Computer Virology and Hacking Techniques 18 (2022)183–203.
[18] Y. T. Ling, N. F. M. Sani, M. T. Abdullah, N. A. W. A. Hamid, Structural Features with
Nonnegative Matrix Factorization for Metamorphic Malware Detection, Computers &amp;
Security 104, 2 (2021) 102216. doi: 10.1016/j.cose.2021.102216
[19] A. Manikandan, Investigative Study of the Behavior of Lotka-Volterra Model of COVID-19.</p>
      <p>International Journal of Science and Research (IJSR), 10(11), (2021) 556-558.
[20] G. Markowsky, O. Savenko, S. Lysenko, A. Nicheporuk, The technique for metamorphic viruses'
detection based on its obfuscation features analysis, CEUR-WS, 2104 (2018): 680–687.
[21] E. Masabo, et. al., Structural Feature Engineering approach for detecting polymorphic malware,
in: Proceedings of the 15-th IEEE Intl Conf on Dependable, Autonomic and Secure Computing,
15-th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence
and Computing and Cyber Science and Technology Congress,
DASC/PiCom/DataCom/CyberSciTech, 2017, pp. 716-721.
[22] C. B. Nwagwu, O. E. Taylor, N. D. Nwiabu, A Model for Detection of Malwares on Edge Devices.</p>
      <p>International Journal Of Engineering And Computer Science, 13(07), (2024) 26274-26283.
[23] L. Poley, J. W. Baron, T. Galla, Generalized Lotka-Volterra model with hierarchical interactions.</p>
      <p>Physical Review E, 107, (2023) 024313. doi: 10.1103/PhysRevE.107.024313
[24] K. Potter, R. Shad, Dynamic Malware Analysis with Reinforcement Learning. Journal of Cyber</p>
      <p>Security, July 16, (2024). doi: 10.2139/ssrn.4897267
[25] B. Savenko, A. Kashtalian, A method for determining the effectiveness of a distributed system
for detecting abnormal manifestations, Computer Systems and Information Technologies 2
(2022) 14–22. doi: 10.31891/csit-2022-2-2 In Ukrainian
[26] O. Savenko, S. Lysenko, A. Nicheporuk, B. Savenko, Approach for the Unknown Metamorphic
Virus Detection, in: Proceedings of the 8-th IEEE International Conference on Intelligent Data
Acquisition and Advanced Computing Systems: Technology and Applications,
IDAACS, Bucharest, Romania, 2017, pp. 71–76. doi: 10.1109/IDAACS.2017.8095052
[27] O. Savenko, S. Lysenko, A. Nicheporuk, B. Savenko, Metamorphic Viruses’ Detection Technique</p>
      <p>Based on the Equivalent Functional Block Search, CEUR-WS, 1844 (2017): 555–569.
[28] D. M. Sharif, H. Beitollahi, Detection of application-layer DDoS attacks using machine learning
and genetic algorithms. Computers &amp; Security, 135, (2023) 103511.
[29] S. Yevseiev, S. Pohasii, S. Milevskyi, O. Milov, Y. Melenti, I. Grod, D. Berestov, R. Fedorenko, O.</p>
      <p>Kurchenko, Development of a method for assessing the security of cyber-physical systems based
on the Lotka–Volterra model. Eastern-European Journal of Enterprise Technologies, 5(9(113),
(2021) 30–47. doi: 10.15587/1729-4061.2021.241638
[30] Lotka-Volterra equation solver. URL: https://fusion809.github.io/LotkaVolterra/</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Aboaoja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zainal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Ghaleb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. A. S.</given-names>
            <surname>Al-rimy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A. E.</given-names>
            <surname>Eisa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A. H.</given-names>
            <surname>Elnour</surname>
          </string-name>
          , Malware Detection Issues, Challenges, and Future Directions: A Survey.
          <source>Applied Sciences</source>
          ,
          <volume>12</volume>
          (
          <issue>17</issue>
          ), (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/app12178482
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R. Abu</given-names>
            <surname>Bakar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.S.</given-names>
            <surname>Javed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.F.</given-names>
            <surname>Majeed</surname>
          </string-name>
          ,
          <article-title>An Intelligent Agent-Based Detection System for DDoS Attacks Using Automatic Feature Extraction and Selection</article-title>
          . Sensors,
          <volume>23</volume>
          , (
          <year>2023</year>
          ),
          <volume>3333</volume>
          . doi:
          <volume>10</volume>
          .3390/s23063333
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Akhtar</surname>
          </string-name>
          , T. Feng,
          <article-title>Malware Analysis and Detection Using Machine Learning Algorithms</article-title>
          .
          <source>Symmetry (Basel)</source>
          ,
          <volume>14</volume>
          (
          <issue>11</issue>
          ), (
          <year>2022</year>
          ),
          <volume>2304</volume>
          . doi:
          <volume>10</volume>
          .3390/sym14112304
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Atitallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Driss</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Almomani,</surname>
          </string-name>
          <article-title>A novel detection and multi-classification approach for IoT-malware using random forest voting of finetuning convolutional neural networks</article-title>
          .
          <source>Sensors</source>
          ,
          <volume>22</volume>
          (
          <issue>11</issue>
          ), (
          <year>2022</year>
          )
          <article-title>4302</article-title>
          . doi:
          <volume>10</volume>
          .3390/s22114302
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bonnard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rouot</surname>
          </string-name>
          ,
          <article-title>Feedback classification and optimal control with applications to the controlled Lotka-Volterra model</article-title>
          .
          <source>Optimization</source>
          , (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .1080/02331934.
          <year>2024</year>
          .2392209
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kriti</surname>
          </string-name>
          , Yateendra,
          <string-name>
            <given-names>M.S.</given-names>
            <surname>Bennet</surname>
          </string-name>
          <string-name>
            <surname>Praba</surname>
          </string-name>
          ,
          <article-title>Polymorphic Malware Detection by Image Conversion Technique</article-title>
          .
          <source>International Journal of Engineering and Advanced Technology (IJEAT)</source>
          ,
          <volume>9</volume>
          (
          <issue>3</issue>
          ), (
          <year>2020</year>
          )
          <fpage>2898</fpage>
          -
          <lpage>2903</lpage>
          . doi:
          <volume>10</volume>
          .35940/ijeat.B4999.029320
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.C.</given-names>
            <surname>Ong</surname>
          </string-name>
          ,
          <article-title>Lotka-Volterra models for extraterrestrial self-replicating probes</article-title>
          .
          <source>The European Physical Journal Plus</source>
          <volume>137</volume>
          ,
          <issue>1109</issue>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1140/epjp/s13360-022-03320-3
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Clenet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Massol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Najim</surname>
          </string-name>
          ,
          <article-title>Equilibrium and surviving species in a large Lotka-Volterra system of differential equations</article-title>
          .
          <source>Journal of Mathematical Biology</source>
          ,
          <volume>87</volume>
          (
          <year>2023</year>
          ),
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Chiwariro</surname>
          </string-name>
          , L. Pullagura,
          <article-title>Malware Detection and Classification Using Machine Learning Algorithms</article-title>
          ,
          <source>International Journal for Research in Applied Science &amp; Engineering Technology, IJRASET</source>
          ,
          <volume>11</volume>
          (
          <year>2023</year>
          )
          <fpage>1727</fpage>
          -
          <lpage>1738</lpage>
          . doi:
          <volume>10</volume>
          .22214/ijraset.
          <year>2023</year>
          .55255
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Damodaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.D.</given-names>
            <surname>Troia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.A.</given-names>
            <surname>Visaggio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. H.</given-names>
            <surname>Austin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stamp</surname>
          </string-name>
          ,
          <article-title>A comparison of static, dynamic, and hybrid analysis for malware detection</article-title>
          ,
          <source>J Comput Virol Hack Tech</source>
          <volume>13</volume>
          (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11416-015-0261-z
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Olivença</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brown</surname>
          </string-name>
          , E. Voit,
          <article-title>Methods of quantifying interactions among populations using Lotka-Volterra models</article-title>
          .
          <source>Frontiers in Systems Biology</source>
          ,
          <volume>2</volume>
          , (
          <year>2022</year>
          )
          <article-title>1021897</article-title>
          . doi:
          <volume>10</volume>
          .3389/fsysb.
          <year>2022</year>
          .1021897
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Djenna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bouridane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rubab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.M.</given-names>
            <surname>Marou</surname>
          </string-name>
          ,
          <article-title>Artificial intelligence-based malware detection, analysis, and mitigation</article-title>
          .
          <source>Symmetry</source>
          ,
          <volume>15</volume>
          (
          <issue>3</issue>
          ), (
          <year>2023</year>
          ),
          <volume>677</volume>
          . doi:
          <volume>10</volume>
          .3390/sym15030677
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
            <surname>Emam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Fahmy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mamdouh</surname>
          </string-name>
          ,
          <article-title>Securing IoT Systems using Blockchain Algorithms</article-title>
          .
          <source>Communications on Applied Electronics</source>
          ,
          <volume>7</volume>
          (
          <issue>34</issue>
          ), (
          <year>2020</year>
          )
          <fpage>10</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .5120/cae2020652871.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kashtalian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sochor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Avsiyevych</surname>
          </string-name>
          ,
          <article-title>Multicomputer malware detection systems with metamorphic functionality</article-title>
          ,
          <source>Radioelectronic and Computer Systems</source>
          <volume>1</volume>
          (
          <year>2024</year>
          )
          <fpage>152</fpage>
          -
          <lpage>175</lpage>
          . doi:
          <volume>10</volume>
          .32620/reks.
          <year>2024</year>
          .
          <volume>1</volume>
          .13.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>