{"id":"https://openalex.org/W7128523034","doi":"https://doi.org/10.1007/978-3-032-11539-3_18","title":"Malware Detection in\u00a0Windows Operating Systems Using AI and\u00a0In-Memory Process Analysis","display_name":"Malware Detection in\u00a0Windows Operating Systems Using AI and\u00a0In-Memory Process Analysis","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7128523034","doi":"https://doi.org/10.1007/978-3-032-11539-3_18"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-032-11539-3_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-11539-3_18","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125478985","display_name":"Jessica C. C. Patricio","orcid":null},"institutions":[{"id":"https://openalex.org/I102939073","display_name":"Universidade Estadual do Cear\u00e1","ror":"https://ror.org/00sec1m50","country_code":"BR","type":"education","lineage":["https://openalex.org/I102939073"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Jessica C. C. Patricio","raw_affiliation_strings":["Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil","institution_ids":["https://openalex.org/I102939073"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125504294","display_name":"Carlos H. Paiva","orcid":null},"institutions":[{"id":"https://openalex.org/I102939073","display_name":"Universidade Estadual do Cear\u00e1","ror":"https://ror.org/00sec1m50","country_code":"BR","type":"education","lineage":["https://openalex.org/I102939073"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Carlos H. Paiva","raw_affiliation_strings":["Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil","institution_ids":["https://openalex.org/I102939073"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106435124","display_name":"Renan L. Rodrigues","orcid":null},"institutions":[{"id":"https://openalex.org/I102939073","display_name":"Universidade Estadual do Cear\u00e1","ror":"https://ror.org/00sec1m50","country_code":"BR","type":"education","lineage":["https://openalex.org/I102939073"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Renan L. Rodrigues","raw_affiliation_strings":["Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil","institution_ids":["https://openalex.org/I102939073"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125510460","display_name":"Vanessa C. Lima","orcid":null},"institutions":[{"id":"https://openalex.org/I102939073","display_name":"Universidade Estadual do Cear\u00e1","ror":"https://ror.org/00sec1m50","country_code":"BR","type":"education","lineage":["https://openalex.org/I102939073"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Vanessa C. Lima","raw_affiliation_strings":["Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil","institution_ids":["https://openalex.org/I102939073"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042774033","display_name":"Rafael Gomes","orcid":"https://orcid.org/0000-0002-4852-5813"},"institutions":[{"id":"https://openalex.org/I102939073","display_name":"Universidade Estadual do Cear\u00e1","ror":"https://ror.org/00sec1m50","country_code":"BR","type":"education","lineage":["https://openalex.org/I102939073"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Rafael L. Gomes","raw_affiliation_strings":["Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Estadual do Cear\u00e1 (UECE), Fortaleza, Cear\u00e1, Brazil","institution_ids":["https://openalex.org/I102939073"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5125478985"],"corresponding_institution_ids":["https://openalex.org/I102939073"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74747475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"311","last_page":"319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8287000060081482,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8287000060081482,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.03020000085234642,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.025299999862909317,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8499000072479248},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6514999866485596},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6000999808311462},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4325000047683716},{"id":"https://openalex.org/keywords/microsoft-windows","display_name":"Microsoft Windows","score":0.41690000891685486},{"id":"https://openalex.org/keywords/response-time","display_name":"Response time","score":0.39660000801086426},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.37619999051094055}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8499000072479248},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8392000198364258},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6514999866485596},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6000999808311462},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4837000072002411},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4325000047683716},{"id":"https://openalex.org/C508378895","wikidata":"https://www.wikidata.org/wiki/Q1406","display_name":"Microsoft Windows","level":3,"score":0.41690000891685486},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.39660000801086426},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.37619999051094055},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.35580000281333923},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3425999879837036},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31380000710487366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2978000044822693},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.29350000619888306},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C163985040","wikidata":"https://www.wikidata.org/wiki/Q1172399","display_name":"Data acquisition","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C89600930","wikidata":"https://www.wikidata.org/wiki/Q1423946","display_name":"Segmentation","level":2,"score":0.25929999351501465}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-032-11539-3_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-11539-3_18","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6688893437385559}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2969701822","https://openalex.org/W4293192140","https://openalex.org/W4312436789","https://openalex.org/W4323021850","https://openalex.org/W4323565799","https://openalex.org/W4385336663","https://openalex.org/W4388107905","https://openalex.org/W4389827903","https://openalex.org/W4401528187","https://openalex.org/W4405261885","https://openalex.org/W4405938049","https://openalex.org/W4413056783"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-02-12T06:13:03.167441","created_date":"2026-02-11T00:00:00"}
