<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Modeling the detection process of polymorphic malware based on the Lotka-Volterra model ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Maksym</forename><surname>Chaikovskyi</surname></persName>
							<email>max.chaikovskyi@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Instytuts&apos;ka Str. 11</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Inna</forename><surname>Chaikovska</surname></persName>
							<email>inna.chaikovska@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Instytuts&apos;ka Str. 11</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tomas</forename><surname>Sochor</surname></persName>
							<email>tomas.sochor@osu.cz</email>
							<affiliation key="aff1">
								<orgName type="institution">Prigo University</orgName>
								<address>
									<settlement>Havirov</settlement>
									<country key="CZ">Czech Republic</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Inna</forename><surname>Martyniuk</surname></persName>
							<email>inmartunyk@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Instytuts&apos;ka Str. 11</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksii</forename><surname>Lyhun</surname></persName>
							<email>oleksii.lyhun@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Instytuts&apos;ka Str. 11</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Workshop on Advanced Applied Information Technologies</orgName>
								<address>
									<addrLine>December 5</addrLine>
									<postCode>2024</postCode>
									<settlement>KhmelnytskyiZilina</settlement>
									<country>Ukraine -, Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Modeling the detection process of polymorphic malware based on the Lotka-Volterra model ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">FFB339C9F26A0A289F9FD7290BC82B73</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>polymorphic malware, detection probability of polymorphic malware, Lotka-Volterra model 1 O. Lyhun) 0000-0002-9596-6697 (M. Chaikovskyi)</term>
					<term>0000-0001-7482-1010 (I. Chaikovska)</term>
					<term>0000-0002-1704-1883 (T. Sochor)</term>
					<term>0009-0007-7751-8974 (I. Martyniuk)</term>
					<term>0009-0004-5727-5096 (O. Lyhun)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article proposes the use of the Lotka-Volterra model ("predator-prey" model) for modeling the process of detecting polymorphic malware. It is proposed to consider α as the probability that the number of polymorphic viruses will increase; β -the probability that polymorphic viruses of different levels of complexity will be detected using the selected methods, technologies and tools; γ -the probability that some of the selected methods, technologies and tools will not be effective in detecting polymorphic viruses of different levels of complexity as a result of the appearance of new varieties; δ -the probability that polymorphic viruses of different levels of complexity will require the complex use of selected methods, technologies and tools, as well as the latest approaches; x -quantitative measurement of polymorphic viruses at time t; y is a quantitative measure of the available technologies, methods and tools for detecting polymorphic viruses at time t. The influence of input indicators on the maximum rate of spread and detection of polymorphic viruses in its fluctuating process was studied. This approach confirms the feasibility of using a set of methods to detect polymorphic malware: string search algorithms, intelligent data analysis, sandbox analysis, machine learning, the method of developing structural functions, probabilistic logical networks.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The use of tools and techniques to detect polymorphic malware can be compared to the classic predator-prey model. The Lotka-Volterra model ("predator-prey" model) describes a population consisting of two species that interact with each other. Victims die out at a rate equal to the number of encounters between predators and prey, which is proportional to the size of both populations. Predators reproduce at a rate that is proportional to the amount of prey eaten by the predators. The system of equations that describes such a population is called the Lotka-Volterra model. According to the conditions of the model, the victims eat the plants, and the predators eat the victims. We will use this model to simulate the process of detecting polymorphic malware. Polymorphic viruses in a computer system will act as a "victim", tools and methods for detecting polymorphic malware will act as a "predator".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Literature review</head><p>The problem of detecting malicious software is quite relevant and a significant amount of research by scientists is devoted to it.</p><p>The work <ref type="bibr" target="#b0">[1]</ref> reflects a comprehensive modern review of research on the malware detection model.</p><p>The paper <ref type="bibr" target="#b1">[2]</ref> proposes an intelligent agent system for detecting DDoS attacks using automatic feature selection and selection.</p><p>In <ref type="bibr" target="#b2">[3]</ref>, it is stated that detection of malicious traffic in computer systems and improvement of security of computer networks is possible using the results of analysis and detection of malicious programs using machine learning algorithms to calculate the difference in correlation symmetry.</p><p>The use of machine learning is also proposed in <ref type="bibr" target="#b14">[15]</ref>.</p><p>The study <ref type="bibr" target="#b3">[4]</ref> proposed an approach that takes advantage of the deep transfer methodology and includes a fine-tuning method and various combination strategies to improve detection and classification performance without the need to develop training models from scratch.</p><p>In <ref type="bibr" target="#b5">[6]</ref>, malicious software is detected with the help of convolutional neural networks (CNN), in <ref type="bibr" target="#b8">[9]</ref> with the help of machine learning algorithms.</p><p>The work <ref type="bibr" target="#b9">[10]</ref> compares the methods of detecting malicious programs based on static, dynamic and hybrid analysis.</p><p>In work <ref type="bibr" target="#b11">[12]</ref> proposes a new systematic approach to identifying modern malware using dynamic deep learning-based methods combined with heuristic approaches to classify and detect five modern malware families: adware, Radware, rootkit, SMS malware, and ransomware.</p><p>The work <ref type="bibr" target="#b12">[13]</ref> proposes an integrated framework for implementing IoT with blockchain technology to guarantee high level of security and validation process based on the integration between consensus algorithms of blockchain (PBFT and Tangle).</p><p>In <ref type="bibr" target="#b13">[14]</ref>, a conceptual model of multi-computer systems was developed, which is designed to ensure the functioning of anti-virus baits and traps for detecting malicious programs.</p><p>In works <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b17">18]</ref> proposed a novel detection approach by generating structural features through computing a stream of byte chunks using compression ratio, entropy, Jaccard similarity coefficient and Chi-square statistic test.</p><p>The paper <ref type="bibr" target="#b19">[20]</ref> presents an approach to the detection of metamorphic viruses based on the analysis of its obfuscation features.</p><p>In <ref type="bibr" target="#b20">[21]</ref>, the K-NN algorithm was used to detect malicious software. In <ref type="bibr" target="#b21">[22]</ref>, a support vector machine (SVM) model was used to detect malicious software. Dynamic Malware Analysis with Reinforcement Learning was carried out in <ref type="bibr" target="#b23">[24]</ref>.</p><p>In <ref type="bibr" target="#b24">[25]</ref>, a method for determining the effectiveness of a distributed system for detecting anomalous manifestations is proposed. In work <ref type="bibr" target="#b25">[26]</ref>, a method for detecting unknown metamorphic viruses is proposed, which is based on the analysis of potentially suspicious behavior of programs on the host, and in work <ref type="bibr" target="#b26">[27]</ref> -a method for detecting metamorphic viruses, based on the search for equivalent functional blocks.</p><p>The paper <ref type="bibr" target="#b27">[28]</ref> addresses the challenges associated with App-DDoS detection and presents a highly effective and adaptable solution for detecting various types of App-DDoS attacks.</p><p>So, you can see quite a wide selection of methods for detecting malware. One of these models is also the Lotka-Volterra model ("predator-prey" model) <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b22">23]</ref>, which has found wide use in various areas of our life: in space research <ref type="bibr" target="#b6">[7]</ref>, biology <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref>, in many in the fields of engineering <ref type="bibr" target="#b15">[16]</ref>, medicine <ref type="bibr" target="#b18">[19]</ref>, security assessment of cyber-physical systems <ref type="bibr" target="#b28">[29]</ref>. However, the use of this model for researching the process of identifying polymorphic software is quite appropriate and relevant, which is why this study is devoted to it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Methodology</head><p>Consider the classic Lotka-Voltaire model and its adaptation to the process of detecting polymorphic malware.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">The classic Lotka-Volterra model</head><p>In general, the model of interspecific competition looks as follows:</p><formula xml:id="formula_0">� 𝑑𝑑𝑑𝑑 𝑑𝑑𝑑𝑑 = (α − 𝛽𝛽𝛽𝛽)𝑑𝑑 𝑑𝑑𝛽𝛽 𝑑𝑑𝑑𝑑 = (−𝛾𝛾 + 𝛿𝛿𝑑𝑑)𝛽𝛽<label>(1)</label></formula><p>where x is the number of victims; y is the number of predators; t -time; α, β, γ, δ are coefficients that reflect the interaction between species.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Adaptation of the model to study the process of detection of polymorphic malware</head><p>In the case of adaptation of the model to simulate the polymorphic malware detection process, α, β, γ, δ can display the following: α is the probability that the number of polymorphic viruses will increase; β is the probability that polymorphic viruses of different levels of complexity will be detected using the selected methods, technologies and tools; γ is the probability that some of the selected methods, technologies and tools will not be effective in detecting polymorphic viruses of different levels of complexity as a result of the appearance of new varieties; δ is the probability that polymorphic viruses of different levels of complexity will require the complex use of selected methods, technologies and tools, as well as the latest approaches; x -quantitative measurement of polymorphic viruses at time t; y is a quantitative measure of the available technologies, methods and tools for detecting polymorphic viruses at time t. It immediately follows from the system that if there are no polymorphic viruses (x = 0), then the number of necessary methods, technologies and tools for their detection will decrease exponentially with a certain initial coefficient (γ according to formula 1).</p><formula xml:id="formula_1">𝛽𝛽̇= −𝛾𝛾 • 𝛽𝛽 → 𝛽𝛽 = 𝐶𝐶 1 • 𝑒𝑒 −𝛾𝛾•𝑡𝑡 , 𝐶𝐶 1 𝜖𝜖𝜖𝜖.,<label>(2)</label></formula><p>A similar situation is obtained in the complete absence of methods, technologies and tools for detecting polymorphic viruses (y = 0):</p><formula xml:id="formula_2">𝐸𝐸𝑑𝑑̇= 𝛼𝛼 • 𝑑𝑑 → 𝑑𝑑 = 𝐶𝐶 2 • 𝑒𝑒 𝛼𝛼•𝑡𝑡 , 𝐶𝐶 2 𝜖𝜖𝜖𝜖.,<label>(3)</label></formula><p>This equation ( <ref type="formula" target="#formula_2">3</ref>) is sometimes called the Malthus equation. Therefore, the growth of polymorphic viruses is exponential with a certain, predetermined constant (α).</p><p>It is worth noting that the Lotka-Volterra model makes several assumptions:</p><p>1. There is a constant appearance of polymorphic viruses.</p><p>2. Polymorphic viruses, as well as their detection technologies, are in the computer system. 3. Only the presence of polymorphic viruses and their detection technologies in the computer system is taken into account.</p><p>Let's find special points possessed by the system:</p><formula xml:id="formula_3">𝐸𝐸 � (α − 𝛽𝛽𝛽𝛽)𝑑𝑑 = 0 (−𝛾𝛾 + 𝛿𝛿𝑑𝑑)𝛽𝛽 = 0 → � 𝛼𝛼𝑑𝑑 = 𝛽𝛽𝑑𝑑𝛽𝛽 𝛾𝛾𝛽𝛽 = 𝛿𝛿𝑑𝑑𝛽𝛽 → � 𝛽𝛽(0) = 𝛼𝛼 𝛽𝛽 𝑑𝑑(0) = 𝛾𝛾 𝛿𝛿 .<label>(4)</label></formula><p>It is clear that when x (0) = 0, y (0) = 0, the special point will be precisely (0, 0), but this case is not interesting, because at the zero moment of time there are no polymorphic viruses and technologies for their detection and, logically , no longer appear.</p><p>Much more interesting things happen in the nonzero case. Depending on the initial parameters, a special point will change -such a number of viruses and their detection technologies, when both indicators remain unchanged and balanced.</p><p>If the initial condition does not fall into a special point, the phase curves will be located around it, forming an infinite cyclic oscillation, which was exactly what Lotka and Volterra were talking about. That is, the number of polymorphic viruses will grow, and the number of effective methods for their detection will fall, then vice versa, and so on for an unlimited amount of time (within reasonable limits, of course).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Stages of the proposed integrated approach to detection, analysis and classification of polymorphic malware</head><p>This approach is the second stage in the proposed comprehensive approach to detection, analysis and classification of polymorphic malware (Figure <ref type="figure" target="#fig_0">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experiments</head><p>Consider the implementation of the "predator-prey" model for modeling the process of detecting polymorphic malware using the Lotka-Volterra equation solver <ref type="bibr" target="#b29">[30]</ref>.</p><p>The following scale is used to denote x and y parameters (table <ref type="table" target="#tab_0">1</ref>). The β indicator was formed on the basis of previous studies on the effectiveness of the complex use of the above methods for detecting polymorphic malware.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Experiment 1</head><p>Experiment 1 (2 methods were used to detect polymorphic viruses) involves the following input parameters (Figure <ref type="figure" target="#fig_1">2</ref>, 3): α=0.2; β=0.3 (2 methods were used to detect polymorphic viruses); γ=0.7; δ=0.3; x=1; y=1; max_time = 100 (seconds); t = 1.  The decrease in the number of polymorphic viruses after a certain time begins to be affected by y, and the number of polymorphic viruses reaches the value (in point expression) γ/δ=0.7/0.3=2.33, the number of methods used to detect polymorphic malware also begins to decrease along with by reducing the number of polymorphic viruses. The decrease in the number of polymorphic viruses and methods of its detection decreases until y reaches the value α/β = 0.2/0.3=0.66. At this moment, the number of polymorphic viruses begins to increase, and after a certain period of time and methods of their detection. This process is constantly repeated with a certain period.</p><p>The periodicity of the process can be clearly observed in the pictures. The number of polymorphic viruses and their detection methods fluctuates around the values of x = 2.33, y = 0.66, respectively.</p><p>The periodicity of the process is well observed on the phase curve (x(t), y(t)), which is a closed line. The extreme left point of this curve is the point at which the number of polymorphic viruses reaches its minimum value, and the extreme right point -the maximum. Between these points, the number of effective detection methods first decreases to the lower point of the phase curve and then increases to the upper point of the phase curve. The phase curve covers the point x = 2.33 and y = 0.66. At this point, the system has a stationary state (dx/dt=0, dy/dt=0). If at the initial moment the system was at this point, then over time x(t) and y(t) will not change and will remain constant, in all other cases an oscillatory process will be observed. Based on these initial values, the maximum value of polymorphic malware detection methods (in terms of points) will be 2.33 points.</p><p>It can be seen that the selected virus detection methods are not effective and lead to the spread of viruses to the level of almost 5 points. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Experiment 2</head><p>Experiment 2 (5 methods were used to detect polymorphic viruses) involves the following input parameters (Figure <ref type="figure" target="#fig_3">4</ref>, 5): α=0.2; β=0.6 (5 methods were used to detect polymorphic viruses); γ=0.2; δ=0.3; x=1; y=1; max_time = 100 (seconds); t = 1.   It can be seen that these virus detection methods <ref type="bibr" target="#b4">(5)</ref> are effective and lead to a spread of viruses slightly more than 2 points.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Experiment 3</head><p>Experiment 3 (6 methods were used to detect polymorphic viruses) involves the following input parameters (Figure <ref type="figure" target="#fig_5">6</ref>, 7): α=0.5; β=0.9 (6 methods were used to detect polymorphic viruses); γ=0.3; δ=0.7; x=1; y=1; max_time = 100 (seconds); t = 1. The selected virus detection methods (6) are effective and result in a virus spread of slightly more than 1 point.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>The study proposes the use of the Lotka-Volterra model for modeling the process of detecting polymorphic malware. It is proposed to consider α as the probability that the number of polymorphic viruses will increase; β -the probability that polymorphic viruses of different levels of complexity will be detected using the selected methods, technologies and tools; γ -the probability that some of the selected methods, technologies and tools will not be effective in detecting polymorphic viruses of different levels of complexity as a result of the appearance of new varieties; δ -the probability that polymorphic viruses of different levels of complexity will require the complex use of selected methods, technologies and tools, as well as the latest approaches; x -quantitative measurement of</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: A comprehensive approach to detection, analysis and classification of malicious software.</figDesc><graphic coords="5,94.83,230.13,410.60,478.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Temporal functions of the "predator-prey" system (x-axis -time, y-axis -point scale), experiment 1</figDesc><graphic coords="6,76.55,379.61,466.92,206.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Phase portrait of the predator-prey system, experiment 1.</figDesc><graphic coords="7,84.32,62.35,431.44,187.53" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Temporal functions of the "predator-prey" system (x-axis -time, y-axis -point scale), experiment 2.</figDesc><graphic coords="7,76.55,522.68,480.07,231.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Phase portrait of the predator-prey system, experiment 2.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Temporal functions of the "predator-prey" system (x-axis -time, y-axis -point scale), experiment 3.</figDesc><graphic coords="8,76.55,190.16,454.18,194.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Phase portrait of the predator-prey system, experiment 3.</figDesc><graphic coords="8,76.55,427.00,454.34,189.23" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 Point</head><label>1</label><figDesc></figDesc><table><row><cell cols="2">Scale for Input Parameters</cell><cell></cell><cell></cell></row><row><cell>Ball</cell><cell>х</cell><cell>y</cell><cell>β</cell></row><row><cell>scale</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>Polymorphic viruses of</cell><cell></cell><cell></cell></row><row><cell>to 1</cell><cell>the 1st level of</cell><cell>1 method used (string search algorithm)</cell><cell>0.1</cell></row><row><cell></cell><cell>complexity</cell><cell></cell><cell></cell></row><row><cell>2</cell><cell>Polymorphic viruses of the 2nd and lower levels of complexity</cell><cell>2 methods were used (string search algorithm + 1 of the method) methods (intelligent data analysis, sandbox analysis, machine learning, structural function development</cell><cell>0.3</cell></row><row><cell>3</cell><cell>Polymorphic viruses of the 3rd and lower levels of complexity</cell><cell>3 methods were used (string search algorithm + 2 of the method) methods (intelligent data analysis, sandbox analysis, machine learning, structural function development</cell><cell>0.4</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>polymorphic viruses at time t; y is a quantitative measure of the available technologies, methods and tools for detecting polymorphic viruses at time t. The influence of input indicators on the maximum rate of spread and detection of polymorphic viruses in its fluctuating process was studied. This approach confirms the feasibility of using a complex of 6 methods to detect polymorphic malware: string search algorithms, intelligent data analysis, sandbox analysis, machine learning, the method of developing structural functions, probabilistic logical networks.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling check; DeepL Translate in order to: some phrases translation into English. After using these tools/services, the authors reviewed and edited the content as needed and take full responsibility for the publication's content.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Malware Detection Issues, Challenges, and Future Directions: A Survey</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Aboaoja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zainal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Ghaleb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A S</forename><surname>Al-Rimy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">A E</forename><surname>Eisa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A H</forename><surname>Elnour</surname></persName>
		</author>
		<idno type="DOI">10.3390/app12178482</idno>
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">17</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">An Intelligent Agent-Based Detection System for DDoS Attacks Using Automatic Feature Extraction and Selection</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bakar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Javed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Majeed</surname></persName>
		</author>
		<idno type="DOI">10.3390/s23063333</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page">3333</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Malware Analysis and Detection Using Machine Learning Algorithms</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Akhtar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Feng</surname></persName>
		</author>
		<idno type="DOI">10.3390/sym14112304</idno>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page">2304</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A novel detection and multi-classification approach for IoT-malware using random forest voting of finetuning convolutional neural networks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">B</forename><surname>Atitallah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Driss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Almomani</surname></persName>
		</author>
		<idno type="DOI">10.3390/s22114302</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page">4302</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Feedback classification and optimal control with applications to the controlled Lotka-Volterra model</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bonnard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rouot</surname></persName>
		</author>
		<idno type="DOI">10.1080/02331934.2024.2392209</idno>
	</analytic>
	<monogr>
		<title level="j">Optimization</title>
		<imprint>
			<biblScope unit="page" from="1" to="24" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Polymorphic Malware Detection by Image Conversion Technique</title>
		<author>
			<persName><forename type="first">A</forename><surname>Chakraborty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kriti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Yateendra</surname></persName>
		</author>
		<author>
			<persName><surname>Bennet Praba</surname></persName>
		</author>
		<idno type="DOI">10.35940/ijeat.B4999.029320</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Engineering and Advanced Technology (IJEAT)</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="2898" to="2903" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Lotka-Volterra models for extraterrestrial self-replicating probes</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">C</forename><surname>Ong</surname></persName>
		</author>
		<idno type="DOI">10.1140/epjp/s13360-022-03320-3</idno>
	</analytic>
	<monogr>
		<title level="j">The European Physical Journal Plus</title>
		<imprint>
			<biblScope unit="volume">137</biblScope>
			<biblScope unit="page">1109</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Equilibrium and surviving species in a large Lotka-Volterra system of differential equations</title>
		<author>
			<persName><forename type="first">M</forename><surname>Clenet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Massol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Najim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Mathematical Biology</title>
		<imprint>
			<biblScope unit="volume">87</biblScope>
			<biblScope unit="page">13</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Malware Detection and Classification Using Machine Learning Algorithms</title>
		<author>
			<persName><forename type="first">R</forename><surname>Chiwariro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pullagura</surname></persName>
		</author>
		<idno type="DOI">10.22214/ijraset.2023.55255</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal for Research in Applied Science &amp; Engineering Technology, IJRASET</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="1727" to="1738" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A comparison of static, dynamic, and hybrid analysis for malware detection</title>
		<author>
			<persName><forename type="first">A</forename><surname>Damodaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">D</forename><surname>Troia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Visaggio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Austin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stamp</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11416-015-0261-z#auth-Mark-Stamp-Aff1</idno>
	</analytic>
	<monogr>
		<title level="j">J Comput Virol Hack Tech</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Methods of quantifying interactions among populations using Lotka-Volterra models</title>
		<author>
			<persName><forename type="first">J</forename><surname>Davis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Olivença</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Brown</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Voit</surname></persName>
		</author>
		<idno type="DOI">10.3389/fsysb.2022.1021897</idno>
	</analytic>
	<monogr>
		<title level="j">Frontiers in Systems Biology</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">1021897</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Artificial intelligence-based malware detection, analysis, and mitigation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Djenna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bouridane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rubab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">M</forename><surname>Marou</surname></persName>
		</author>
		<idno type="DOI">10.3390/sym15030677</idno>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">677</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Securing IoT Systems using Blockchain Algorithms</title>
		<author>
			<persName><forename type="first">O</forename><surname>Emam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Fahmy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mamdouh</surname></persName>
		</author>
		<idno type="DOI">10.5120/cae2020652871</idno>
	</analytic>
	<monogr>
		<title level="j">Communications on Applied Electronics</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">34</biblScope>
			<biblScope unit="page" from="10" to="17" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Multicomputer malware detection systems with metamorphic functionality</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kashtalian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sochor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Avsiyevych</surname></persName>
		</author>
		<idno type="DOI">10.32620/reks.2024.1.13</idno>
	</analytic>
	<monogr>
		<title level="j">Radioelectronic and Computer Systems</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="152" to="175" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Enhanced malware detection framework leveraging machine learning algorithms</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Kurian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Santhosh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Subin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Research Journal of Modernization in Engineering Technology and Science</title>
		<imprint>
			<biblScope unit="volume">06</biblScope>
			<biblScope unit="issue">03</biblScope>
			<biblScope unit="page" from="3597" to="3603" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Dynamics and Chaos Control for a Discrete-Time Lotka-Volterra Model</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Din</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rafaqat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Elsadany</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zeng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="126760" to="126775" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Metamorphic malware detection using structural features andnonnegative matrix factorization with hidden markov model</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">T</forename><surname>Ling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">•</forename><forename type="middle">N F M</forename><surname>Sani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Abdullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">•</forename><forename type="middle">N A W A</forename><surname>Hamid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computer Virology and Hacking Techniques</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="183" to="203" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Structural Features with Nonnegative Matrix Factorization for Metamorphic Malware Detection</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">T</forename><surname>Ling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">F M</forename><surname>Sani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Abdullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A W A</forename><surname>Hamid</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2021.102216</idno>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">104</biblScope>
			<biblScope unit="page">102216</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Investigative Study of the Behavior of Lotka-Volterra Model of COVID-19</title>
		<author>
			<persName><forename type="first">A</forename><surname>Manikandan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Science and Research (IJSR)</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="556" to="558" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">The technique for metamorphic viruses&apos; detection based on its obfuscation features analysis</title>
		<author>
			<persName><forename type="first">G</forename><surname>Markowsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS</title>
		<imprint>
			<biblScope unit="volume">2104</biblScope>
			<biblScope unit="page" from="680" to="687" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Structural Feature Engineering approach for detecting polymorphic malware</title>
		<author>
			<persName><forename type="first">E</forename><surname>Masabo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 15-th IEEE Intl Conf on Dependable, Autonomic and Secure Computing, 15-th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech</title>
				<meeting>the 15-th IEEE Intl Conf on Dependable, Autonomic and Secure Computing, 15-th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="716" to="721" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A Model for Detection of Malwares on Edge Devices</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Nwagwu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">E</forename><surname>Taylor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D</forename><surname>Nwiabu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal Of Engineering And Computer Science</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">07</biblScope>
			<biblScope unit="page" from="26274" to="26283" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Generalized Lotka-Volterra model with hierarchical interactions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Poley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">W</forename><surname>Baron</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Galla</surname></persName>
		</author>
		<idno type="DOI">10.1103/PhysRevE.107.024313</idno>
	</analytic>
	<monogr>
		<title level="j">Physical Review E</title>
		<imprint>
			<biblScope unit="volume">107</biblScope>
			<biblScope unit="page">24313</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Dynamic Malware Analysis with Reinforcement Learning</title>
		<author>
			<persName><forename type="first">K</forename><surname>Potter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Shad</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4897267</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Cyber Security</title>
		<imprint>
			<date type="published" when="2024-07-16">July 16. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A method for determining the effectiveness of a distributed system for detecting abnormal manifestations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kashtalian</surname></persName>
		</author>
		<idno type="DOI">10.31891/csit-2022-2-2</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Systems and Information Technologies</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="14" to="22" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Approach for the Unknown Metamorphic Virus Detection</title>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Savenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAACS.2017.8095052</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>IDAACS, Bucharest, Romania</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="71" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Metamorphic Viruses&apos; Detection Technique Based on the Equivalent Functional Block Search</title>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Savenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS</title>
		<imprint>
			<biblScope unit="volume">1844</biblScope>
			<biblScope unit="page" from="555" to="569" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Detection of application-layer DDoS attacks using machine learning and genetic algorithms</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Sharif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Beitollahi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">135</biblScope>
			<biblScope unit="page">103511</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yevseiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pohasii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Milevskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Milov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Melenti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Grod</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Berestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fedorenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kurchenko</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2021.241638</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="30" to="47" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<ptr target="https://fusion809.github.io/LotkaVolterra/" />
		<title level="m">Lotka-Volterra equation solver</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
