<?xml version="1.0" encoding="UTF-8"?>
<doi_batch version="5.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.crossref.org/schema/5.4.0" xsi:schemaLocation="http://www.crossref.org/schema/5.4.0 https://www.crossref.org/schemas/crossref5.4.0.xsd" xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1" xmlns:fr="http://www.crossref.org/fundref.xsd" xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" xmlns:rel="http://www.crossref.org/relations.xsd" xmlns:mml="http://www.w3.org/1998/Math/MathML">
  <head>
    <doi_batch_id>NONE</doi_batch_id>
    <timestamp>20260105084842876</timestamp>
    <depositor>
      <depositor_name>wseas/wseas</depositor_name>
      <email_address>content-registration-form+ja@crossref.org</email_address>
    </depositor>
    <registrant>content-registration-form</registrant>
  </head>
  <body>
    <journal>
      <journal_metadata>
        <full_title>WSEAS TRANSACTIONS ON COMPUTER RESEARCH</full_title>
        <issn media_type="print">1991-8755</issn>
        <issn media_type="electronic">2415-1521</issn>
      </journal_metadata>
      <journal_article>
        <titles>
          <title>Prediction of Malware Threats using Machine Learning Techniques</title>
        </titles>
        <contributors>
          <person_name sequence="first" contributor_role="author">
            <given_name>Raed</given_name>
            <surname>Alazaidah</surname>
            <affiliations>
              <institution>
                <institution_name>Faculty of Information Technology, Zarqa University, JORDAN</institution_name>
              </institution>
            </affiliations>
          </person_name>
          <person_name sequence="additional" contributor_role="author">
            <given_name>Ghassan</given_name>
            <surname>Samara</surname>
            <affiliations>
              <institution>
                <institution_name>Faculty of Information Technology, Zarqa University, JORDAN</institution_name>
              </institution>
            </affiliations>
          </person_name>
          <person_name sequence="additional" contributor_role="author">
            <given_name>Mohammad</given_name>
            <surname>Aljaidi</surname>
            <affiliations>
              <institution>
                <institution_name>Faculty of Information Technology, Zarqa University, JORDAN</institution_name>
              </institution>
            </affiliations>
          </person_name>
          <person_name sequence="additional" contributor_role="author">
            <given_name>Mais Haj</given_name>
            <surname>Qasem</surname>
            <affiliations>
              <institution>
                <institution_name>Faculty of Information Technology, Zarqa University, JORDAN</institution_name>
              </institution>
            </affiliations>
          </person_name>
          <person_name sequence="additional" contributor_role="author">
            <given_name>Abdullah</given_name>
            <surname>Al-Qammaz</surname>
            <affiliations>
              <institution>
                <institution_name>Faculty of Information Technology, Zarqa University, JORDAN</institution_name>
              </institution>
            </affiliations>
          </person_name>
          <person_name sequence="additional" contributor_role="author">
            <given_name>Mohammad Rasmi</given_name>
            <surname>Al-Mousa</surname>
            <affiliations>
              <institution>
                <institution_name>Faculty of Information Technology, Zarqa University, JORDAN</institution_name>
              </institution>
            </affiliations>
          </person_name>
          <person_name sequence="additional" contributor_role="author">
            <given_name>Wael</given_name>
            <surname>Hadi</surname>
            <affiliations>
              <institution>
                <institution_name>Faculty of Information Technology, University of Petra, JORDAN</institution_name>
              </institution>
            </affiliations>
          </person_name>
        </contributors>
        <jats:abstract xml:lang="en">
          <jats:p>Machine learning has been used for decades to analyze vast datasets, classify and cluster data, and make predictions using algorithms. One of its top use areas is cybersecurity, where it can help detect and prevent destructive threats such as malware. The use of machine learning in cybersecurity has proven to be a powerful tool in detecting and predicting malware attacks. In recent years, the number of Internet users has greatly increased and with it the number of malware attacks. This has made predicting malware a challenge. Consequently, to date, there is still a need to examine the numerous existing MLs’ performance. This study is presented to identify the best classification model for predicting malware using two datasets and 18 different classifiers belonging to six learning strategies. The results showed that the RandomForest classifier had the highest accuracy, precision, recall, F1-measure, and ROC Area metrics, Moreover, Trees and Bayes learning strategies showed the best predictive performance on the two datasets compared with the other five learning strategies.</jats:p>
        </jats:abstract>
        <publication_date media_type="print">
          <month>01</month>
          <day>05</day>
          <year>2026</year>
        </publication_date>
        <publication_date media_type="online">
          <month>01</month>
          <day>05</day>
          <year>2026</year>
        </publication_date>
        <pages>
          <first_page>56</first_page>
        </pages>
        <publisher_item>
          <item_number item_number_type="article_number">5</item_number>
        </publisher_item>
        <ai:program name="AccessIndicators">
          <ai:license_ref>https://creativecommons.org/licenses/by/4.0/deed.en_US</ai:license_ref>
        </ai:program>
        <doi_data>
          <doi>10.37394/232018.2026.14.5</doi>
          <resource>https://wseas.com/journals/cr/2026/a105118-238.pdf</resource>
        </doi_data>
        <citation_list>
          <citation key="ref0">
            <unstructured_citation>De Gaspari, F., Hitaj, D., Pagnotta, G., De Carli, L., &amp; Mancini, L. V. . Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques. Neural Comput &amp; Applic 34, 12077–12096 (2022). https://doi.org/10.1007/s00521-022-07096-6.</unstructured_citation>
          </citation>
          <citation key="ref1">
            <unstructured_citation>Alazaidah, R., Samara, G., Almatarneh, S., Hassan, M., Aljaidi, M., &amp; Mansur, H. (2023). Multi-Label Classification Based on Associations. Applied Sciences, 13(8), 5081. https://doi.org/10.3390/app13085081.</unstructured_citation>
          </citation>
          <citation key="ref2">
            <unstructured_citation>Samara, G. (2020, November). Wireless sensor network MAC energy-efficiency protocols: a survey. In 2020 21st International Arab Conference on Information Technology (ACIT) (pp. 1-5), Egypt. IEEE. https://doi.org/10.1109/ACIT50332.2020.9300 065.</unstructured_citation>
          </citation>
          <citation key="ref3">
            <unstructured_citation>Al-Batah, Mohammad Subhi, Mazen Alzyoud, Raed Alazaidah, Malek Toubat, Haneen Alzoubi, and Areej Olaiyat. "Early Prediction o f Cervical Cancer Using Machine Learning Techniques." Jordanian Journal of Computers and Information Technology (JJCIT) 8, no. 04, 357-369, (2022).</unstructured_citation>
          </citation>
          <citation key="ref4">
            <unstructured_citation>Samara, G. (2020). Intelligent reputation system for safety messages in VANET. Int J Artif Intell, 9(3), 439-447. doi: doi.org/10.11591/ijai.v9.i3.pp439-447.</unstructured_citation>
          </citation>
          <citation key="ref5">
            <unstructured_citation>Alazaidah, R., Ahmad, F. K., &amp; Mohsin, M. (2020). Multi label ranking based on positive pairwise correlations among labels. The International Arab Journal of Information Technology, 17(4), 440-449. doi: 10.34028/iajit/17/4/2.</unstructured_citation>
          </citation>
          <citation key="ref6">
            <unstructured_citation>Alazaidah, R., Ahmad, F. K., Mohsen, M. F. M., &amp;Junoh, A. K. (2018). Evaluating conditional and unconditional correlations capturing strategies in multi label classification. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(2-4), 47-51.</unstructured_citation>
          </citation>
          <citation key="ref7">
            <unstructured_citation>Hussain, I., Samara, G., Ullah, I., &amp; Khan, N. (2021, December). Oman. Encryption for enduser privacy: a cyber-secure smart energy management system. In 2021 22nd International Arab Conference on Information Technology (ACIT) (pp. 1-6). IEEE. https://doi.org/10.1109/ACIT53391.2021.9677 341.</unstructured_citation>
          </citation>
          <citation key="ref8">
            <unstructured_citation>Injadat, M. (2023, December). UAE. Optimized Ensemble Model Towards Secured Industrial IoT Devices. In 2023 24th International Arab Conference on Information Technology (ACIT) (pp. 1-5), Ajman, United Arab Emirates. IEEE. https://doi.org/10.1109/ACIT58888.2023.1045 3914.</unstructured_citation>
          </citation>
          <citation key="ref9">
            <unstructured_citation>Han, J., Kamber, M., &amp; Pei, J. (2012). Data Mining: Concepts and. Techniques, Waltham: Morgan Kaufmann Publishers.</unstructured_citation>
          </citation>
          <citation key="ref10">
            <unstructured_citation>Injadat, M., Moubayed, A., Nassif, A. B., &amp; Shami, A. (2020). Multi-stage optimized machine learning framework for network intrusion detection. IEEE Transactions on Network and Service Management, 18(2), 1803-1816. https://doi.org/10.1109/TNSM.2020.3014929.</unstructured_citation>
          </citation>
          <citation key="ref11">
            <unstructured_citation>Witten, I.H. and Frank, E., 2002. Data mining: practical machine learning tools and techniques with Java implementations. AcmSigmod Record, 31(1), pp.76-77. https://doi.org/10.1145/507338.507355.</unstructured_citation>
          </citation>
          <citation key="ref12">
            <unstructured_citation>Agrawal R, Gehrke J, Gunopulos D, Raghavan P. Fast algorithms for mining association rules. In: Proceedings of the International Joint Conference on Very Large Data Bases, Santiago Chile. 1994; 1215: 487– 499.</unstructured_citation>
          </citation>
          <citation key="ref13">
            <unstructured_citation>Sarker, I.H. Context-aware rule learning from smartphone data: survey, challenges and future directions. J Big Data 6, 95 (2019), pp. 1-25. https://doi.org/10.1186/s40537-019-0258-4.</unstructured_citation>
          </citation>
          <citation key="ref14">
            <unstructured_citation>Salloum, S.A., Alshurideh, M., Elnagar, A. and Shaalan, K., 2020. Machine learning and deep learning techniques for cybersecurity: a review. In Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020) (pp. 50-57), Cairo, Egypt. Springer International Publishing. https://doi.org/10.1007/978-3-030-44289-7_5.</unstructured_citation>
          </citation>
          <citation key="ref15">
            <unstructured_citation>Gandotra, E. and Gupta, D., 2021. An efficient approach for phishing detection using machine learning. Multimedia Security: Algorithm Development, Analysis and Applications, pp.239-253. Springer. https://doi.org/10.1007/978-981-15-8711-5_12.</unstructured_citation>
          </citation>
          <citation key="ref16">
            <unstructured_citation>Dharamkar, B. and Singh, R.R., 2014. A review of cyber attack classification technique based on data mining and neural network approach. Int. J. Comput. Trends Technol, 7(2), pp.100-105. doi: 10.14445/22312803/IJCTTV7P106.</unstructured_citation>
          </citation>
          <citation key="ref17">
            <unstructured_citation>Ford, V. and Siraj, A., 2014, October. Applications of machine learning in cyber security. In Proceedings of the 27th international conference on computer applications in industry and engineering (Vol. 118). Kota Kinabalu, Malaysia: IEEE Xplore.</unstructured_citation>
          </citation>
          <citation key="ref18">
            <unstructured_citation>Jiang, H., Nagra, J. and Ahammad, P., 2016. SoK: Applying Machine Learning in SecurityA Survey. arXiv e- prints, pp.arXiv-1611. https://doi.org/10.48550/arXiv.1611.03186.</unstructured_citation>
          </citation>
          <citation key="ref19">
            <unstructured_citation>Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C. and Atkinson, R., 2017. Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv preprint arXiv:1701.02145.</unstructured_citation>
          </citation>
          <citation key="ref20">
            <unstructured_citation>Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A. and Marchetti, M., 2018, May. On the effectiveness of machine and deep learning for cyber security. In 2018 10th international conference on cyber Conflict (CyCon), Tallinn, Estonia. (pp. 371-390). IEEE. https://doi.org/10.23919/CYCON.2018.840502 6.</unstructured_citation>
          </citation>
          <citation key="ref21">
            <unstructured_citation>Kruegel, C., Mutz, D., Robertson, W. and Valeur, F., 2003, December. USA. Bayesian event classification for intrusion detection. In 19th Annual Computer Security Applications Conference, 2003. Proceedings. Las Vegas, NV, USA. (pp. 14- 23). IEEE. https://doi.org/10.1109/CSAC.2003.1254306.</unstructured_citation>
          </citation>
          <citation key="ref22">
            <unstructured_citation>Benferhat, S., Kenaza, T. and Mokhtari, A., 2008, July. Finland. A naive bayes approach for detecting coordinated attacks. In 2008 32nd Annual IEEE International Computer Software and Applications Conference (pp. 704- 709), Turku, Finland. IEEE. https://doi.org/10.1109/COMPSAC.2008.213.</unstructured_citation>
          </citation>
          <citation key="ref23">
            <unstructured_citation>Panda, M. and Patra, M.R., 2007. Network intrusion detection using naive bayes. International journal of computer science and network security, 7(12), pp.258-263.</unstructured_citation>
          </citation>
          <citation key="ref24">
            <unstructured_citation>Koc, L., Mazzuchi, T.A. and Sarkani, S., 2012. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Systems with Applications, 39(18), pp.13492-13500. https://doi.org/10.1016/j.eswa.2012.07.009.</unstructured_citation>
          </citation>
          <citation key="ref25">
            <unstructured_citation>Shapoorifard, H. and Shamsinejad, P., 2017. Intrusion detection using a novel hybrid method incorporating an improved KNN. Int. J. Comput. Appl, 173(1), pp.5-9. doi: 10.5120/ijca2017914340.</unstructured_citation>
          </citation>
          <citation key="ref26">
            <unstructured_citation>Vishwakarma, S., Sharma, V. and Tiwari, A., 2017. An intrusion detection system using KNN-ACO algorithm. Int J Comput Appl, 171(10), pp.18-23. doi: 10.5120/ijca2017914079.</unstructured_citation>
          </citation>
          <citation key="ref27">
            <unstructured_citation>Sharifi, A.M., Amirgholipour, S.K. and Pourebrahimi, A., 2015. Intrusion detection based on joint of k-means and knn. Journal of Convergence Information Technology, 10(5), p.42.</unstructured_citation>
          </citation>
          <citation key="ref28">
            <unstructured_citation>Bapat, R., Mandya, A., Liu, X., Abraham, B., Brown, D.E., Kang, H. and Veeraraghavan, M., 2018, April. USA. Identifying malicious botnet traffic using logistic regression. In 2018 systems and information engineering design symposium (SIEDS), Charlottesville, VA, USA. (pp. 266-271). IEEE. https://doi.org/10.1109/SIEDS.2018.8374749.</unstructured_citation>
          </citation>
          <citation key="ref29">
            <unstructured_citation>Besharati, E., Naderan, M. and Namjoo, E., 2019. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. Journal of Ambient Intelligence and Humanized Computing, 10, pp.3669-3692. https://doi.org/10.1007/s12652-018-1093-8.</unstructured_citation>
          </citation>
          <citation key="ref30">
            <unstructured_citation>Kumar, P.A.R. and Selvakumar, S., 2011. Distributed denial of service attack detection using an ensemble of neural classifier. Computer Communications, 34(11), pp.1328- 1341. https://doi.org/10.1016/j.comcom.2011.01.012.</unstructured_citation>
          </citation>
          <citation key="ref31">
            <unstructured_citation>Dainotti, A., Pescapé, A. and Ventre, G., 2009. A cascade architecture for DoS attacks detection based on the wavelet transform. Journal of Computer Security, 17(6), pp.945- 968. https://dl.acm.org/doi/abs/10.5555/1662641.16 62646</unstructured_citation>
          </citation>
          <citation key="ref32">
            <unstructured_citation>Quinlan, J.R., 1986. Induction of decision trees. Machine learning, 1, pp.81-106. https://doi.org/10.1007/BF00116251.</unstructured_citation>
          </citation>
          <citation key="ref33">
            <unstructured_citation>Quinlan, J.R., 2014. C4. 5: programs for machine learning. Elsevier. https://dl.acm.org/doi/abs/10.5555/152181.</unstructured_citation>
          </citation>
          <citation key="ref34">
            <unstructured_citation>Sarker, I.H., Colman, A., Han, J., Khan, A.I., Abushark, Y.B. and Salah, K., 2020. Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model. Mobile Networks and Applications, 25, pp.1151-1161. https://doi.org/10.1007/s11036- 019-01443-z.</unstructured_citation>
          </citation>
          <citation key="ref35">
            <unstructured_citation>Ingre, B., Yadav, A. and Soni, A.K., 2018. Decision tree based intrusion detection system for NSL-KDD dataset. In Information and Communication Technology for Intelligent Systems (ICTIS 2017)-Volume 2 2 (pp. 207- 218). Springer International Publishing. https://doi.org/10.1007/978-3-319-63645-0_23.</unstructured_citation>
          </citation>
          <citation key="ref36">
            <unstructured_citation>Malik, A.J. and Khan, F.A., 2018. A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Computing, 21, pp.667-680. https://doi.org/10.1007/s10586-017-0971-8.</unstructured_citation>
          </citation>
          <citation key="ref37">
            <unstructured_citation>Moon, D., Im, H., Kim, I. and Park, J.H., 2017. DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. The Journal of supercomputing, 73, pp.2881-2895. https://doi.org/10.1007/s11227-015-1604-8.</unstructured_citation>
          </citation>
          <citation key="ref38">
            <unstructured_citation>Puthran, S. and Shah, K., 2016. Intrusion detection using improved decision tree algorithm with binary and quad split. In Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings 4 (pp. 427-438). Springer Singapore. https://doi.org/10.1007/978-981-10- 2738-3_37.</unstructured_citation>
          </citation>
          <citation key="ref39">
            <unstructured_citation>Alhusenat, A. Y., Owida, H. A., Rababah, H. A., Al-Nabulsi, J. I., &amp; Abuowaida, S. (2023). A Secured Multi-Stages Authentication Protocol for IoT Devices. Mathematical Modelling of Engineering Problems, 10(4). pp. 1352-1358.</unstructured_citation>
          </citation>
          <citation key="ref40">
            <unstructured_citation>Owida, H. A., Migdadi, H. S., Hemied, O. S. M., Alshdaifat, N. F. F., Abuowaida, S. F. A., &amp; Alkhawaldeh, R. S. (2022). Deep learning algorithms to improve COVID-19 classification based on CT images. Bulletin of Electrical Engineering and Informatics, 11(5), 2876- 2885. https://doi.org/10.11591/eei.v11i5.3802.</unstructured_citation>
          </citation>
          <citation key="ref41">
            <unstructured_citation>Owida, H. A., Moh’d, B. A. H., Turab, N., AlNabulsi, J., &amp; Abuowaida, S. (2023). The Evolution and Reliability of Machine Learning Techniques for Oncology. International Journal of Online &amp; Biomedical Engineering, 19(8), pp. 110–129.. doi: doi.org/10.3991/ijoe.v19i08.39433.</unstructured_citation>
          </citation>
          <citation key="ref42">
            <unstructured_citation>Owida, H. A., Hemied, O. S. M., Alkhawaldeh, R. S., Alshdaifat, N. F. F., &amp; Abuowaida, S. F. A. (2022). Improved deep learning approaches for covid-19 recognition in ct images. Journal of Theoretical and Applied Information Technology, 100(13), 4925-4931.</unstructured_citation>
          </citation>
        </citation_list>
      </journal_article>
    </journal>
  </body>
</doi_batch>