Work place: Department of Information Technology, The Charutar Vidya Mandal (CVM) University, Vallabh Vidyanagar, Gujarat, 388120, India
E-mail: it.nayanmali@adit.ac.in
Website:
Research Interests:
Biography
Nayankumar M. Mali is an Assistant Professor in the Department of Information Technology at A. D. Patel Institute of Technology (ADIT). He is currently pursuing a Ph.D. in Malware Behavior Analysis and Detection using Machine Learning. His research interests include cybersecurity, malware detection, web security, and applied machine learning. He has guided M.Tech dissertations, mentored award-winning hackathon teams, and contributed to industry-based projects. With expertise in Java, Spring Boot, Python, and cybersecurity, he has delivered expert talks, conducted FDPs, and developed academic web portals. He is also an active member of CoE in Information Network Security and a consultant for IT projects.
By Nayankumar M. Mali Narendrasinh C. Chauhan
DOI: https://doi.org/10.5815/ijcnis.2026.02.04, Pub. Date: 8 Apr. 2026
With the rapid increase in malware threats, robust classification methods have become essential to protect digital environments. This study conducts a comparative analysis of machine learning and deep learning methods for malware detection. A variety of models are used from both machine learning and deep learning paradigms to determine their effectiveness in distinguishing malware. To further refine the models, several feature selection techniques are applied to reduce the dimensionality of the data and enhance performance. Performance metrics, including accuracy, precision, recall, and F1-score is used to evaluate each model. The findings indicate that while deep learning approaches generally provide higher detection accuracy, feature selection methods contribute significantly to improving machine learning models in terms of performance and computational efficiency. This analysis offers valuable insights into the balance between model complexity and effectiveness, providing practical recommendations for implementing malware classification systems in real-world applications.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals