{"id":"https://openalex.org/W3167818199","doi":"https://doi.org/10.1109/access.2021.3087316","title":"Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment","display_name":"Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3167818199","doi":"https://doi.org/10.1109/access.2021.3087316","mag":"3167818199"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3087316","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3087316","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2021.3087316","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086794415","display_name":"\u00d6mer Aslan","orcid":"https://orcid.org/0000-0003-0737-1966"},"institutions":[{"id":"https://openalex.org/I149717392","display_name":"Siirt \u00dcniversitesi","ror":"https://ror.org/05ptwtz25","country_code":"TR","type":"education","lineage":["https://openalex.org/I149717392"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Omer Aslan","raw_affiliation_strings":["University of Siirt, Siirt, Turkey"],"affiliations":[{"raw_affiliation_string":"University of Siirt, Siirt, Turkey","institution_ids":["https://openalex.org/I149717392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083076465","display_name":"Merve Ozkan-Okay","orcid":"https://orcid.org/0000-0002-1071-2541"},"institutions":[{"id":"https://openalex.org/I149218525","display_name":"Ankara University","ror":"https://ror.org/01wntqw50","country_code":"TR","type":"education","lineage":["https://openalex.org/I149218525"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Merve Ozkan-Okay","raw_affiliation_strings":["Ankara University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Ankara University, Ankara, Turkey","institution_ids":["https://openalex.org/I149218525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001893144","display_name":"Deepti Gupta","orcid":"https://orcid.org/0000-0001-7844-9092"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deepti Gupta","raw_affiliation_strings":["The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086794415"],"corresponding_institution_ids":["https://openalex.org/I149717392"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":10.0559,"has_fulltext":false,"cited_by_count":95,"citation_normalized_percentile":{"value":0.98870859,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"83252","last_page":"83271"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8692408800125122},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8540256023406982},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8012320399284363},{"id":"https://openalex.org/keywords/laptop","display_name":"Laptop","score":0.6635013818740845},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.518701434135437},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5152116417884827},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49612292647361755},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4509836435317993},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.42235106229782104},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35975706577301025},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34596383571624756},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34234732389450073},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3352014422416687},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3052469491958618}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8692408800125122},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8540256023406982},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8012320399284363},{"id":"https://openalex.org/C2780008327","wikidata":"https://www.wikidata.org/wiki/Q3962","display_name":"Laptop","level":2,"score":0.6635013818740845},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.518701434135437},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5152116417884827},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49612292647361755},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4509836435317993},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.42235106229782104},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35975706577301025},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34596383571624756},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34234732389450073},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3352014422416687},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3052469491958618}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3087316","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3087316","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b86cad2148ab424c9674a5d05c5d10d4","is_oa":true,"landing_page_url":"https://doaj.org/article/b86cad2148ab424c9674a5d05c5d10d4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 83252-83271 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3087316","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3087316","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W3483648","https://openalex.org/W2005662348","https://openalex.org/W2024046085","https://openalex.org/W2079215333","https://openalex.org/W2080778654","https://openalex.org/W2114312434","https://openalex.org/W2191468669","https://openalex.org/W2246884629","https://openalex.org/W2293923001","https://openalex.org/W2503670963","https://openalex.org/W2598939142","https://openalex.org/W2621187857","https://openalex.org/W2738219410","https://openalex.org/W2775008189","https://openalex.org/W2785022326","https://openalex.org/W2789766369","https://openalex.org/W2791105979","https://openalex.org/W2792618813","https://openalex.org/W2809713955","https://openalex.org/W2889717770","https://openalex.org/W2904613432","https://openalex.org/W2915534549","https://openalex.org/W2963208797","https://openalex.org/W2998074434","https://openalex.org/W3007829065","https://openalex.org/W3012475362","https://openalex.org/W3027431742","https://openalex.org/W3033738801","https://openalex.org/W3037922572","https://openalex.org/W3094360729","https://openalex.org/W3112231659","https://openalex.org/W3127627101","https://openalex.org/W3136082446","https://openalex.org/W6759970828","https://openalex.org/W6779174664","https://openalex.org/W6790434279"],"related_works":["https://openalex.org/W1998188341","https://openalex.org/W1573526548","https://openalex.org/W4360982091","https://openalex.org/W3176864451","https://openalex.org/W2053632570","https://openalex.org/W2187910102","https://openalex.org/W3211525895","https://openalex.org/W2128507946","https://openalex.org/W4254552916","https://openalex.org/W2800331776"],"abstract_inverted_index":{"These":[0],"days,":[1],"cloud":[2,106,234],"computing":[3],"is":[4,68],"one":[5],"of":[6,62,86,154],"the":[7,73,81,87,91,105,131,152,155,176,182,187,194,233],"most":[8],"promising":[9],"technologies":[10],"to":[11,24,76,79,130,137,150,225],"store":[12],"information":[13],"and":[14,55,60,84,133,165,172,211,217],"provide":[15],"services":[16],"online":[17],"efficiently.":[18,124],"Using":[19],"this":[20],"rapidly":[21],"developing":[22],"technology":[23],"protect":[25],"computer-based":[26,45,74],"systems":[27,46,50],"from":[28,140],"cyber-related":[29],"attacks":[30,95],"can":[31,42,161],"bring":[32],"many":[33],"advantages":[34],"over":[35],"traditional":[36],"protection":[37],"schemes.":[38],"The":[39,108,158],"protected":[40],"assets":[41],"be":[43],"any":[44,69],"such":[47],"as":[48],"cyber-physical":[49],"(CPS),":[51],"critical":[52],"systems,":[53],"desktop":[54],"laptop":[56],"computers,":[57],"mobile":[58],"devices,":[59],"Internet":[61],"Things":[63],"(IoT).":[64],"Malicious":[65],"software":[66,70],"(malware)":[67],"which":[71,120],"targets":[72],"system":[75,103,110,160,216,231],"launch":[77],"cyber-attacks":[78],"threaten":[80],"integrity,":[82],"confidentiality":[83],"availability":[85],"data.":[88],"To":[89],"detect":[90,162],"massively":[92],"growing":[93],"malware":[94,114,139,167,229],"surface,":[96],"we":[97],"propose":[98],"an":[99],"intelligent":[100],"behavior-based":[101],"detection":[102,135,171,205,230],"in":[104,186,232],"environment.":[107,235],"proposed":[109,156,159,177,195,215],"first":[111],"creates":[112],"a":[113,227],"dataset":[115],"on":[116],"different":[117],"virtual":[118],"machines":[119],"identify":[121],"distinctive":[122],"features":[123,127],"Then,":[125],"selected":[126],"are":[128],"given":[129],"learning-based":[132],"rule-based":[134],"agents":[136],"separate":[138],"benign":[141],"samples.":[142],"Totally,":[143],"10,000":[144],"program":[145],"samples":[146],"have":[147,180],"been":[148],"analyzed":[149],"evaluate":[151],"performance":[153],"system.":[157],"both":[163],"known":[164],"unknown":[166],"efficiently":[168],"with":[169,198],"high":[170],"accuracy":[173],"rate.":[174],"Besides,":[175],"method":[178],"results":[179,185,191],"outperformed":[181],"leading":[183],"methods'":[184],"literature.":[188],"Our":[189,214],"evaluation":[190],"show":[192],"that":[193],"algorithms":[196,218],"along":[197],"machine":[199],"learning":[200],"(ML)":[201],"classifiers":[202],"achieve":[203],"99.8%":[204],"rate,":[206,210],"0.4%":[207],"false":[208],"positive":[209],"99.7%":[212],"accuracy.":[213],"may":[219],"assist":[220],"those":[221],"who":[222],"would":[223],"like":[224],"develop":[226],"novel":[228]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
