{"id":"https://openalex.org/W4212859824","doi":"https://doi.org/10.1007/978-3-030-93733-1_6","title":"Metamorphic Malware Behavior Analysis Using Sequential Pattern Mining","display_name":"Metamorphic Malware Behavior Analysis Using Sequential Pattern Mining","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W4212859824","doi":"https://doi.org/10.1007/978-3-030-93733-1_6"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-93733-1_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-93733-1_6","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025418453","display_name":"M. Saqib Nawaz","orcid":"https://orcid.org/0000-0001-9856-2885"},"institutions":[{"id":"https://openalex.org/I160968435","display_name":"University of Sargodha","ror":"https://ror.org/0086rpr26","country_code":"PK","type":"education","lineage":["https://openalex.org/I160968435"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN","PK"],"is_corresponding":true,"raw_author_name":"M. Saqib Nawaz","raw_affiliation_strings":["Department of Computer Science and IT, University of Sargodha, Sargodha, Pakistan","School of Humanities and Social Sciences, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and IT, University of Sargodha, Sargodha, Pakistan","institution_ids":["https://openalex.org/I160968435"]},{"raw_affiliation_string":"School of Humanities and Social Sciences, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038682039","display_name":"Philippe Fournier\u2010Viger","orcid":"https://orcid.org/0000-0002-7680-9899"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Philippe Fournier-Viger","raw_affiliation_strings":["School of Humanities and Social Sciences, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Humanities and Social Sciences, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038971210","display_name":"Menaa Nawaz","orcid":"https://orcid.org/0000-0001-9205-912X"},"institutions":[{"id":"https://openalex.org/I160968435","display_name":"University of Sargodha","ror":"https://ror.org/0086rpr26","country_code":"PK","type":"education","lineage":["https://openalex.org/I160968435"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN","PK"],"is_corresponding":false,"raw_author_name":"M. Zohaib Nawaz","raw_affiliation_strings":["Department of Computer Science and IT, University of Sargodha, Sargodha, Pakistan","School of Humanities and Social Sciences, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and IT, University of Sargodha, Sargodha, Pakistan","institution_ids":["https://openalex.org/I160968435"]},{"raw_affiliation_string":"School of Humanities and Social Sciences, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075765094","display_name":"Guoting Chen","orcid":"https://orcid.org/0000-0003-2072-1588"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoting Chen","raw_affiliation_strings":["School of Science, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Science, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034766193","display_name":"Youxi Wu","orcid":"https://orcid.org/0000-0001-5314-3468"},"institutions":[{"id":"https://openalex.org/I184843921","display_name":"Hebei University of Technology","ror":"https://ror.org/018hded08","country_code":"CN","type":"education","lineage":["https://openalex.org/I184843921"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youxi Wu","raw_affiliation_strings":["Department of Computer Science and Engineering, Hebei University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hebei University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I184843921"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025418453"],"corresponding_institution_ids":["https://openalex.org/I160968435","https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36934169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"90","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9154438972473145},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.8442681431770325},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8225705623626709},{"id":"https://openalex.org/keywords/application-programming-interface","display_name":"Application programming interface","score":0.5868473052978516},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.562107264995575},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.5124312043190002},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41639798879623413},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.41316521167755127},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.35658952593803406}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9154438972473145},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.8442681431770325},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8225705623626709},{"id":"https://openalex.org/C99613125","wikidata":"https://www.wikidata.org/wiki/Q165194","display_name":"Application programming interface","level":2,"score":0.5868473052978516},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.562107264995575},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.5124312043190002},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41639798879623413},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.41316521167755127},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.35658952593803406},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-93733-1_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-93733-1_6","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W83212619","https://openalex.org/W138108058","https://openalex.org/W170728857","https://openalex.org/W1515031132","https://openalex.org/W1573526548","https://openalex.org/W1583484179","https://openalex.org/W1635909507","https://openalex.org/W1800739094","https://openalex.org/W1941427975","https://openalex.org/W1966917005","https://openalex.org/W1970635365","https://openalex.org/W1985328160","https://openalex.org/W2055716572","https://openalex.org/W2112971308","https://openalex.org/W2122468393","https://openalex.org/W2152442131","https://openalex.org/W2237959143","https://openalex.org/W2272376083","https://openalex.org/W2295894764","https://openalex.org/W2344088191","https://openalex.org/W2507635762","https://openalex.org/W2732916693","https://openalex.org/W2895222304","https://openalex.org/W2974285614","https://openalex.org/W3016673788","https://openalex.org/W3036179535","https://openalex.org/W3045322569","https://openalex.org/W3130153679"],"related_works":["https://openalex.org/W1998188341","https://openalex.org/W2400599487","https://openalex.org/W2469346691","https://openalex.org/W2765174411","https://openalex.org/W2965893286","https://openalex.org/W2991580804","https://openalex.org/W2380730281","https://openalex.org/W2351528581","https://openalex.org/W2810666735","https://openalex.org/W4224264605"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
