{"id":"https://openalex.org/W4405401739","doi":"https://doi.org/10.1093/cybsec/tyae016","title":"A novel visual interface enables human detection of malware in portable document format","display_name":"A novel visual interface enables human detection of malware in portable document format","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4405401739","doi":"https://doi.org/10.1093/cybsec/tyae016"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyae016","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae016","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyae016","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013691543","display_name":"Robert S. Gutzwiller","orcid":"https://orcid.org/0000-0002-2159-8131"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Robert S Gutzwiller","raw_affiliation_strings":["Fulton Schools of Engineering, Arizona State University , Mesa, Arizona, 85201 ,"],"raw_orcid":"https://orcid.org/0000-0002-2159-8131","affiliations":[{"raw_affiliation_string":"Fulton Schools of Engineering, Arizona State University , Mesa, Arizona, 85201 ,","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050187102","display_name":"Sunny Fugate","orcid":"https://orcid.org/0000-0002-6733-3219"},"institutions":[{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sunny J Fugate","raw_affiliation_strings":["Naval Information Warfare Center Pacific , San Diego, California, 92106 ,"],"raw_orcid":"https://orcid.org/0000-0002-6733-3219","affiliations":[{"raw_affiliation_string":"Naval Information Warfare Center Pacific , San Diego, California, 92106 ,","institution_ids":["https://openalex.org/I1339224429"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053643910","display_name":"Jamie R. Lukos","orcid":"https://orcid.org/0000-0002-6955-1965"},"institutions":[{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jamie R Lukos","raw_affiliation_strings":["Naval Information Warfare Center Pacific , San Diego, California, 92106 ,"],"raw_orcid":"https://orcid.org/0000-0002-6955-1965","affiliations":[{"raw_affiliation_string":"Naval Information Warfare Center Pacific , San Diego, California, 92106 ,","institution_ids":["https://openalex.org/I1339224429"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038341011","display_name":"Karl Wiegand","orcid":"https://orcid.org/0000-0003-3820-8678"},"institutions":[{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karl Wiegand","raw_affiliation_strings":["Naval Information Warfare Center Pacific , San Diego, California, 92106 ,"],"raw_orcid":"https://orcid.org/0000-0003-3820-8678","affiliations":[{"raw_affiliation_string":"Naval Information Warfare Center Pacific , San Diego, California, 92106 ,","institution_ids":["https://openalex.org/I1339224429"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013691543"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24693845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6482319235801697},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6183148622512817},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5857237577438354},{"id":"https://openalex.org/keywords/large-format","display_name":"Large format","score":0.5396623015403748},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.45553210377693176},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.4231330156326294},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.41683071851730347},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3300052285194397},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.0637870728969574},{"id":"https://openalex.org/keywords/visual-arts","display_name":"Visual arts","score":0.057739317417144775}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6482319235801697},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6183148622512817},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5857237577438354},{"id":"https://openalex.org/C2780478481","wikidata":"https://www.wikidata.org/wiki/Q1189460","display_name":"Large format","level":2,"score":0.5396623015403748},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.45553210377693176},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.4231330156326294},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.41683071851730347},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3300052285194397},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0637870728969574},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.057739317417144775},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyae016","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae016","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyae016","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae016","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1485200701","https://openalex.org/W1494756088","https://openalex.org/W1498728415","https://openalex.org/W1582830784","https://openalex.org/W1604896212","https://openalex.org/W1813811056","https://openalex.org/W1970586813","https://openalex.org/W1987684126","https://openalex.org/W1988554886","https://openalex.org/W2008653298","https://openalex.org/W2022812372","https://openalex.org/W2043515850","https://openalex.org/W2057748516","https://openalex.org/W2064655388","https://openalex.org/W2117734318","https://openalex.org/W2123179704","https://openalex.org/W2133394319","https://openalex.org/W2146246854","https://openalex.org/W2147505368","https://openalex.org/W2150932122","https://openalex.org/W2169294099","https://openalex.org/W2171035369","https://openalex.org/W2321770479","https://openalex.org/W2332550897","https://openalex.org/W2476055623","https://openalex.org/W2748347163","https://openalex.org/W2892759841","https://openalex.org/W2996806689","https://openalex.org/W3114468998","https://openalex.org/W3128739477","https://openalex.org/W4246731700","https://openalex.org/W4252145668","https://openalex.org/W4255593377","https://openalex.org/W6628996700","https://openalex.org/W6636532815","https://openalex.org/W6656392571","https://openalex.org/W6684830120"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W1979131826","https://openalex.org/W2370066713","https://openalex.org/W1984979050","https://openalex.org/W2978161533","https://openalex.org/W2379338802"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"this":[2],"human":[3,185],"subjects":[4],"study,":[5],"we":[6,78,163],"sought":[7],"to":[8,25,44,52,82,91,100,151,156,188],"enable":[9,97,167],"user-based":[10],"detection":[11,30,48,116,139,154,170],"of":[12,140],"malware":[13,21,29,47,56,102,119,141],"within":[14,61,104],"portable":[15],"document":[16],"format":[17],"(PDF)":[18],"files.":[19,106],"Such":[20],"is":[22,57],"often":[23,58],"difficult":[24],"detect":[26,101],"with":[27,113,131,146],"traditional":[28],"tools.":[31],"Humans":[32],"are":[33],"excellent":[34],"sensors":[35],"and":[36,39,64,87,130,148,171,186],"pattern":[37],"detectors":[38],"could":[40,166],"be":[41,70],"a":[42,62,80,89,127,160],"key":[43],"more":[45,168],"robust":[46],"but":[49],"need":[50,177],"something":[51],"sense.":[53],"By":[54],"design,":[55],"hidden":[59,72],"deep":[60],"file":[63,85],"its":[65],"presence":[66],"or":[67],"operation":[68],"may":[69],"completely":[71],"from":[73],"users.":[74],"To":[75],"combat":[76],"this,":[77],"built":[79],"visualization":[81,95],"expose":[83],"underlying":[84],"contents":[86],"conducted":[88],"study":[90],"assess":[92],"whether":[93],"the":[94,114,149,176],"would":[96],"novice":[98],"users":[99,111],"embedded":[103],"PDF":[105,118,143],"We":[107],"found":[108],"that":[109],"when":[110],"engaged":[112],"tool,":[115],"for":[117,178],"was":[120],"well":[121,181],"above":[122],"chance":[123],"performance,":[124],"better":[125],"than":[126],"control":[128],"condition,":[129],"high":[132],"discriminability.":[133],"The":[134],"display":[135],"significantly":[136],"improved":[137],"user":[138],"in":[142,159],"files;":[144],"combined":[145],"feedback":[147],"ability":[150],"provide":[152],"aggregated":[153],"information":[155],"security":[157],"analysts":[158],"future":[161],"version,":[162],"believe":[164],"it":[165],"effective":[169],"response.":[172],"This":[173],"research":[174],"highlights":[175],"integration":[179],"as":[180,182],"experimentation":[183],"between":[184],"machine":[187],"best":[189],"improve":[190],"cyber":[191],"defense.":[192]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
