{"id":"https://openalex.org/W4403162616","doi":"https://doi.org/10.1093/jigpal/jzae105","title":"Study of infostealers using Graph Neural Networks","display_name":"Study of infostealers using Graph Neural Networks","publication_year":2024,"publication_date":"2024-08-16","ids":{"openalex":"https://openalex.org/W4403162616","doi":"https://doi.org/10.1093/jigpal/jzae105"},"language":"en","primary_location":{"id":"doi:10.1093/jigpal/jzae105","is_oa":false,"landing_page_url":"https://doi.org/10.1093/jigpal/jzae105","pdf_url":null,"source":{"id":"https://openalex.org/S2734381524","display_name":"Logic Journal of IGPL","issn_l":"1367-0751","issn":["1367-0751","1368-9894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logic Journal of the IGPL","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10366/163133","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038759912","display_name":"\u00c1lvaro Bustos-Tabernero","orcid":"https://orcid.org/0000-0003-4215-8933"},"institutions":[{"id":"https://openalex.org/I184999862","display_name":"Universidad de Salamanca","ror":"https://ror.org/02f40zc51","country_code":"ES","type":"education","lineage":["https://openalex.org/I184999862"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"\u00c1lvaro Bustos-Tabernero","raw_affiliation_strings":["University of Salamanca , Plaza de los Ca\u00eddos, 37008 Salamanca, Spain, alvarob97@usal.es"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Salamanca , Plaza de los Ca\u00eddos, 37008 Salamanca, Spain, alvarob97@usal.es","institution_ids":["https://openalex.org/I184999862"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050534076","display_name":"Daniel L\u00f3pez-S\u00e1nchez","orcid":"https://orcid.org/0000-0003-2224-4957"},"institutions":[{"id":"https://openalex.org/I184999862","display_name":"Universidad de Salamanca","ror":"https://ror.org/02f40zc51","country_code":"ES","type":"education","lineage":["https://openalex.org/I184999862"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Daniel L\u00f3pez-S\u00e1nchez","raw_affiliation_strings":["University of Salamanca , Plaza de los Ca\u00eddos, 37008 Salamanca, Spain, lope@usal.es"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Salamanca , Plaza de los Ca\u00eddos, 37008 Salamanca, Spain, lope@usal.es","institution_ids":["https://openalex.org/I184999862"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029724469","display_name":"Ang\u00e9lica Gonz\u00e1lez Arrieta","orcid":"https://orcid.org/0000-0002-4726-7103"},"institutions":[{"id":"https://openalex.org/I184999862","display_name":"Universidad de Salamanca","ror":"https://ror.org/02f40zc51","country_code":"ES","type":"education","lineage":["https://openalex.org/I184999862"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Ang\u00e9lica Gonz\u00e1lez-Arrieta","raw_affiliation_strings":["University of Salamanca , Plaza de los Ca\u00eddos, 37008 Salamanca, Spain, angelica@usal.es"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Salamanca , Plaza de los Ca\u00eddos, 37008 Salamanca, Spain, angelica@usal.es","institution_ids":["https://openalex.org/I184999862"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048119697","display_name":"Paulo Nov\u00e1is","orcid":"https://orcid.org/0000-0002-3549-0754"},"institutions":[{"id":"https://openalex.org/I99682543","display_name":"University of Minho","ror":"https://ror.org/037wpkx04","country_code":"PT","type":"education","lineage":["https://openalex.org/I99682543"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Paulo Novais","raw_affiliation_strings":["University of Minho , Gualtar Campus, 4710-057 Braga, Portugal, paulitinho@gmail.com"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Minho , Gualtar Campus, 4710-057 Braga, Portugal, paulitinho@gmail.com","institution_ids":["https://openalex.org/I99682543"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5038759912"],"corresponding_institution_ids":["https://openalex.org/I184999862"],"apc_list":{"value":4151,"currency":"USD","value_usd":4151},"apc_paid":null,"fwci":0.3222,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6049451,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"33","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8905847668647766},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7364383339881897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6066782474517822},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5741937756538391},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5623908042907715},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.499420166015625},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.49733737111091614},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44527488946914673},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4314934313297272},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.41634491086006165},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27755463123321533},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.18850335478782654},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10269632935523987}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8905847668647766},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7364383339881897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6066782474517822},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5741937756538391},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5623908042907715},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.499420166015625},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.49733737111091614},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44527488946914673},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4314934313297272},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.41634491086006165},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27755463123321533},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.18850335478782654},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10269632935523987},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/jigpal/jzae105","is_oa":false,"landing_page_url":"https://doi.org/10.1093/jigpal/jzae105","pdf_url":null,"source":{"id":"https://openalex.org/S2734381524","display_name":"Logic Journal of IGPL","issn_l":"1367-0751","issn":["1367-0751","1368-9894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logic Journal of the IGPL","raw_type":"journal-article"},{"id":"pmh:oai:gredos.usal.es:10366/163133","is_oa":true,"landing_page_url":"http://hdl.handle.net/10366/163133","pdf_url":null,"source":{"id":"https://openalex.org/S4377196290","display_name":"Gredos (University of Salamanca)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184999862","host_organization_name":"Universidad de Salamanca","host_organization_lineage":["https://openalex.org/I184999862"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:gredos.usal.es:10366/163133","is_oa":true,"landing_page_url":"http://hdl.handle.net/10366/163133","pdf_url":null,"source":{"id":"https://openalex.org/S4377196290","display_name":"Gredos (University of Salamanca)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184999862","host_organization_name":"Universidad de Salamanca","host_organization_lineage":["https://openalex.org/I184999862"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W429766147","https://openalex.org/W1797761079","https://openalex.org/W2041130390","https://openalex.org/W2104742133","https://openalex.org/W2116341502","https://openalex.org/W2592285292","https://openalex.org/W2788919350","https://openalex.org/W2926178846","https://openalex.org/W3006711782","https://openalex.org/W3133719257","https://openalex.org/W3209735630","https://openalex.org/W4292820477","https://openalex.org/W4294558607","https://openalex.org/W4307548881","https://openalex.org/W4328005947","https://openalex.org/W4328028694","https://openalex.org/W6631190155","https://openalex.org/W6636510571","https://openalex.org/W6677316912","https://openalex.org/W6713582119","https://openalex.org/W6726873649","https://openalex.org/W6738964360","https://openalex.org/W6748524405","https://openalex.org/W6755207826","https://openalex.org/W6846892523"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W3152891574","https://openalex.org/W2160606508"],"abstract_inverted_index":{"Abstract":[0],"Cybersecurity":[1],"technology":[2],"has":[3],"the":[4,21,51,63,86,120],"ability":[5],"to":[6,38,53,137],"detect":[7],"malware":[8,25,44],"through":[9],"a":[10,28,95,113,124,129,130],"variety":[11],"of":[12,23,42,50,62,88,123],"methods,":[13],"such":[14],"as":[15],"signature":[16],"recognition,":[17],"logical":[18],"rules":[19],"or":[20,30,47,72],"identification":[22],"known":[24],"stored":[26],"in":[27],"database":[29],"public":[31],"source.":[32],"However,":[33],"threat":[34],"actors":[35],"continuously":[36],"try":[37],"create":[39],"new":[40],"variants":[41],"existing":[43],"by":[45,56],"obfuscating":[46],"altering":[48],"parts":[49],"code":[52,122],"evade":[54],"detection":[55],"antivirus":[57],"engines.":[58],"Infostealers":[59],"are":[60,85],"one":[61],"most":[64],"common":[65],"malicious":[66],"programs":[67],"aimed":[68],"at":[69],"obtaining":[70],"personal":[71],"banking":[73],"information":[74],"from":[75,119],"an":[76,146],"infected":[77],"system":[78],"and":[79,101,127],"exfiltrating":[80],"it.":[81],"In":[82],"addition,":[83],"they":[84],"precursors":[87],"potentially":[89],"high-security":[90],"incidents":[91],"because":[92],"attackers":[93],"gain":[94],"entry":[96],"into":[97],"companies\u2019":[98],"internal":[99],"systems":[100],"may":[102],"even":[103],"access":[104],"them":[105],"with":[106,139],"administrator":[107],"permissions.":[108],"This":[109],"article":[110],"demonstrates":[111],"how":[112,128],"feature":[114],"vector":[115],"can":[116,134],"be":[117,135],"obtained":[118],"assembly":[121],"Windows":[125],"binary":[126],"Graph":[131],"Neural":[132],"Network":[133],"used":[136],"determine,":[138],"ninety":[140],"percent":[141],"accuracy,":[142],"whether":[143],"it":[144],"is":[145],"infostealer.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
