{"id":"https://openalex.org/W4283071003","doi":"https://doi.org/10.1002/ett.4584","title":"MDCD: A malware detection approach in cloud using deep learning","display_name":"MDCD: A malware detection approach in cloud using deep learning","publication_year":2022,"publication_date":"2022-06-18","ids":{"openalex":"https://openalex.org/W4283071003","doi":"https://doi.org/10.1002/ett.4584"},"language":"en","primary_location":{"id":"doi:10.1002/ett.4584","is_oa":false,"landing_page_url":"https://doi.org/10.1002/ett.4584","pdf_url":null,"source":{"id":"https://openalex.org/S4306425600","display_name":"Transactions on Emerging Telecommunications Technologies","issn_l":"2161-3915","issn":["2161-3915","2161-5748"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Transactions on Emerging Telecommunications Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059751912","display_name":"Donghai Tian","orcid":"https://orcid.org/0000-0003-2217-4514"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Donghai Tian","raw_affiliation_strings":["Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","Key Laboratory of Network Assessment Technology, Institute of Information Engineering Chinese Academy of Sciences Beijing China","Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China","Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Institute of Information Engineering Chinese Academy of Sciences Beijing China","institution_ids":["https://openalex.org/I4210108629"]},{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021375432","display_name":"Runze Zhao","orcid":"https://orcid.org/0009-0000-0224-914X"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Runze Zhao","raw_affiliation_strings":["Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101551878","display_name":"Rui Ma","orcid":"https://orcid.org/0000-0003-1728-0056"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Ma","raw_affiliation_strings":["Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015456692","display_name":"Xiaoqi Jia","orcid":"https://orcid.org/0000-0002-8376-3235"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoqi Jia","raw_affiliation_strings":["Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061938272","display_name":"Qi Shen","orcid":"https://orcid.org/0000-0002-7165-4787"},"institutions":[{"id":"https://openalex.org/I114234892","display_name":"Beijing Union University","ror":"https://ror.org/01hg31662","country_code":"CN","type":"education","lineage":["https://openalex.org/I114234892"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Shen","raw_affiliation_strings":["Teacher's College Beijing Union University Beijing China","Teacher's College, Beijing Union University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Teacher's College Beijing Union University Beijing China","institution_ids":["https://openalex.org/I114234892"]},{"raw_affiliation_string":"Teacher's College, Beijing Union University, Beijing, China","institution_ids":["https://openalex.org/I114234892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102753688","display_name":"Changzhen Hu","orcid":"https://orcid.org/0000-0002-2711-7060"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changzhen Hu","raw_affiliation_strings":["Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115883252","display_name":"Wenmao Liu","orcid":"https://orcid.org/0009-0000-2046-5305"},"institutions":[{"id":"https://openalex.org/I4210142097","display_name":"CardioFocus (United States)","ror":"https://ror.org/04qadzg65","country_code":"US","type":"company","lineage":["https://openalex.org/I4210142097"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenmao Liu","raw_affiliation_strings":["NSFOCUS Inc. Beijing China","NSFOCUS Inc., Beijing, China"],"affiliations":[{"raw_affiliation_string":"NSFOCUS Inc. Beijing China","institution_ids":["https://openalex.org/I4210142097"]},{"raw_affiliation_string":"NSFOCUS Inc., Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5061938272"],"corresponding_institution_ids":["https://openalex.org/I114234892"],"apc_list":null,"apc_paid":null,"fwci":2.3797,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.88681948,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"33","issue":"11","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.871195912361145},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8292787075042725},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7926948666572571},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6397652626037598},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6363903880119324},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.616689920425415},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4933430254459381},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4820057451725006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3841240108013153},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38374054431915283},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36543434858322144},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3426675796508789},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3236449658870697},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20165303349494934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.871195912361145},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8292787075042725},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7926948666572571},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6397652626037598},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6363903880119324},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.616689920425415},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4933430254459381},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4820057451725006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3841240108013153},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38374054431915283},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36543434858322144},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3426675796508789},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3236449658870697},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20165303349494934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/ett.4584","is_oa":false,"landing_page_url":"https://doi.org/10.1002/ett.4584","pdf_url":null,"source":{"id":"https://openalex.org/S4306425600","display_name":"Transactions on Emerging Telecommunications Technologies","issn_l":"2161-3915","issn":["2161-3915","2161-5748"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Transactions on Emerging Telecommunications Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1480663469","display_name":null,"funder_award_id":"61602035","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3853462455","display_name":null,"funder_award_id":"61772078","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4249318937","display_name":null,"funder_award_id":"Z191100007119010","funder_id":"https://openalex.org/F4320325902","funder_display_name":"Beijing Municipal Science and Technology Commission"},{"id":"https://openalex.org/G4451607858","display_name":null,"funder_award_id":"2016QY04W0903","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320325902","display_name":"Beijing Municipal Science and Technology Commission","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1482612322","https://openalex.org/W1544697441","https://openalex.org/W1639956611","https://openalex.org/W1963581527","https://openalex.org/W2014395806","https://openalex.org/W2087740020","https://openalex.org/W2125743503","https://openalex.org/W2131523719","https://openalex.org/W2137964233","https://openalex.org/W2140807364","https://openalex.org/W2151135920","https://openalex.org/W2168760272","https://openalex.org/W2170197386","https://openalex.org/W2470989862","https://openalex.org/W2557513839","https://openalex.org/W2564494760","https://openalex.org/W2660067476","https://openalex.org/W2766465617","https://openalex.org/W2776884785","https://openalex.org/W2801888526","https://openalex.org/W2891539454","https://openalex.org/W2894211014","https://openalex.org/W2899250976","https://openalex.org/W2905130735","https://openalex.org/W2917661079","https://openalex.org/W2921770285","https://openalex.org/W2940752008","https://openalex.org/W2950774332","https://openalex.org/W2962832406","https://openalex.org/W2970528944","https://openalex.org/W2999469381","https://openalex.org/W3006578308","https://openalex.org/W3007070494","https://openalex.org/W3020985685","https://openalex.org/W3113062381","https://openalex.org/W3113774281","https://openalex.org/W3161794458","https://openalex.org/W4256383029","https://openalex.org/W6762122163"],"related_works":["https://openalex.org/W2374855207","https://openalex.org/W2070754358","https://openalex.org/W4301397976","https://openalex.org/W3168304977","https://openalex.org/W4313563103","https://openalex.org/W2182227208","https://openalex.org/W3002766903","https://openalex.org/W48697359","https://openalex.org/W2968586400","https://openalex.org/W2309601263"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,9,26,34,75,80,88,95,100,109,158],"increasing":[3],"popularity":[4],"of":[5,11,42,108,149],"cloud":[6,15,64],"computing":[7],"applications,":[8],"threat":[10],"malware":[12,23,60,117],"attack":[13],"against":[14,22],"environments":[16],"is":[17],"getting":[18],"worse.":[19],"To":[20,50,104],"defend":[21],"attacks":[24],"in":[25,40],"cloud,":[27],"some":[28],"virtualization\u2010based":[29],"approaches":[30],"are":[31],"proposed.":[32],"However,":[33],"existing":[35,159],"methods":[36],"suffer":[37],"from":[38,79,99],"limitations":[39],"terms":[41],"detection":[43,61,142],"accuracy,":[44,143],"deployment":[45,171],"effort,":[46],"and":[47,112,146,153],"performance":[48],"cost.":[49],"address":[51],"these":[52],"issues,":[53],"we":[54,119],"propose":[55,120],"MDCD,":[56],"a":[57,70,121],"novel":[58],"dynamic":[59],"solution":[62],"for":[63,116],"environments.":[65],"This":[66],"method":[67,162],"first":[68],"utilizes":[69],"lightweight":[71],"agent":[72],"to":[73,93],"collect":[74],"run\u2010time":[76,110],"utilization":[77,111],"information":[78,98,115],"target":[81,101],"virtual":[82],"machine":[83],"(VM).":[84],"Then,":[85],"it":[86],"leverages":[87],"memory":[89,96,113],"forensics":[90],"analysis":[91],"technique":[92],"extract":[94],"object":[97,114],"VM's":[102],"memory.":[103],"fully":[105],"make":[106],"use":[107],"detection,":[118],"multi\u2010CNN":[122],"model,":[123],"which":[124],"combines":[125],"multiple":[126,165],"convolutional":[127],"neural":[128],"networks":[129],"(CNNs)":[130],"efficiently.":[131],"The":[132],"evaluation":[133],"shows":[134],"that":[135],"our":[136,161],"approach":[137],"can":[138,163],"achieve":[139],"an":[140],"average":[141],"precision,":[144],"recall,":[145],"F1":[147],"Score":[148],"98.89%,":[150],"97.01%,":[151],"98.17%,":[152],"97.89%":[154],"respectively.":[155],"Compared":[156],"with":[157,169],"solutions,":[160],"detect":[164],"malicious":[166],"processes":[167],"effectively":[168],"little":[170],"effort.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
