{"id":"https://openalex.org/W4285133486","doi":"https://doi.org/10.1109/access.2022.3171775","title":"Malware Detection Using Byte Streams of Different File Formats","display_name":"Malware Detection Using Byte Streams of Different File Formats","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285133486","doi":"https://doi.org/10.1109/access.2022.3171775"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3171775","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3171775","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09772087.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09772087.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005505577","display_name":"Young-Seob Jeong","orcid":"https://orcid.org/0000-0002-9441-2940"},"institutions":[{"id":"https://openalex.org/I163753206","display_name":"Chungbuk National University","ror":"https://ror.org/02wnxgj78","country_code":"KR","type":"education","lineage":["https://openalex.org/I163753206"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Young-Seob Jeong","raw_affiliation_strings":["Department of Computer Engineering, Chungbuk National University, Cheongju-si, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-9441-2940","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Chungbuk National University, Cheongju-si, South Korea","institution_ids":["https://openalex.org/I163753206"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100319624","display_name":"Sangmin Lee","orcid":"https://orcid.org/0000-0002-8606-2549"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sang-Min Lee","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, Daejeon, South Korea","Electronics and Telecommunications Research Institute, Daejeon 34129, Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon 34129, Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016013197","display_name":"Jonghyun Kim","orcid":"https://orcid.org/0000-0002-5532-2117"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong-Hyun Kim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, Daejeon, South Korea","Electronics and Telecommunications Research Institute, Daejeon 34129, Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon 34129, Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027662394","display_name":"Jiyoung Woo","orcid":"https://orcid.org/0000-0001-8231-0018"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jiyoung Woo","raw_affiliation_strings":["Department of Big Data Engineering, Soonchunhyang University, Asan-si, South Korea","Department of Big Data Engineering, Soonchunhyang University, Asan-si 31538, Korea"],"raw_orcid":"https://orcid.org/0000-0001-8231-0018","affiliations":[{"raw_affiliation_string":"Department of Big Data Engineering, Soonchunhyang University, Asan-si, South Korea","institution_ids":["https://openalex.org/I24541011"]},{"raw_affiliation_string":"Department of Big Data Engineering, Soonchunhyang University, Asan-si 31538, Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035974072","display_name":"Ah Reum Kang","orcid":"https://orcid.org/0000-0002-0732-5313"},"institutions":[{"id":"https://openalex.org/I110118728","display_name":"Pai Chai University","ror":"https://ror.org/05drcjw53","country_code":"KR","type":"education","lineage":["https://openalex.org/I110118728"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ah Reum Kang","raw_affiliation_strings":["Department of Information Security, Pai Chai University, Daejeon, South Korea","Department of Information Security, Pai Chai University, Daejeon 35345, Korea"],"raw_orcid":"https://orcid.org/0000-0002-0732-5313","affiliations":[{"raw_affiliation_string":"Department of Information Security, Pai Chai University, Daejeon, South Korea","institution_ids":["https://openalex.org/I110118728"]},{"raw_affiliation_string":"Department of Information Security, Pai Chai University, Daejeon 35345, Korea","institution_ids":["https://openalex.org/I110118728"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005505577"],"corresponding_institution_ids":["https://openalex.org/I163753206"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.0415,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75004172,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"10","issue":null,"first_page":"51041","last_page":"51047"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8862640857696533},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7499260902404785},{"id":"https://openalex.org/keywords/hangul","display_name":"Hangul","score":0.7152363657951355},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6079623103141785},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.5896376371383667},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49906420707702637},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.4845260977745056},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.47679591178894043},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4702932834625244},{"id":"https://openalex.org/keywords/file-format","display_name":"File format","score":0.42201024293899536},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4106988310813904},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.32104724645614624},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2898343801498413},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2790314257144928},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.2608823776245117}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8862640857696533},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7499260902404785},{"id":"https://openalex.org/C554519600","wikidata":"https://www.wikidata.org/wiki/Q8222","display_name":"Hangul","level":2,"score":0.7152363657951355},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6079623103141785},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5896376371383667},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49906420707702637},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.4845260977745056},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47679591178894043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4702932834625244},{"id":"https://openalex.org/C97250363","wikidata":"https://www.wikidata.org/wiki/Q235557","display_name":"File format","level":2,"score":0.42201024293899536},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4106988310813904},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.32104724645614624},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2898343801498413},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2790314257144928},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.2608823776245117},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3171775","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3171775","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09772087.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1242799570864a1cab5c96bf1a2b02cf","is_oa":true,"landing_page_url":"https://doaj.org/article/1242799570864a1cab5c96bf1a2b02cf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 51041-51047 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3171775","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3171775","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09772087.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285133486.pdf","grobid_xml":"https://content.openalex.org/works/W4285133486.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1836465849","https://openalex.org/W1902237438","https://openalex.org/W2095705004","https://openalex.org/W2112796928","https://openalex.org/W2139212933","https://openalex.org/W2143545157","https://openalex.org/W2194775991","https://openalex.org/W2295598076","https://openalex.org/W2476429474","https://openalex.org/W2532612352","https://openalex.org/W2911964244","https://openalex.org/W2921625035","https://openalex.org/W2935152036","https://openalex.org/W2984061032","https://openalex.org/W2991343848","https://openalex.org/W3086765999","https://openalex.org/W3090046868","https://openalex.org/W3141138956","https://openalex.org/W4210257598","https://openalex.org/W4297747285","https://openalex.org/W4300687693","https://openalex.org/W6631190155","https://openalex.org/W6638667902","https://openalex.org/W6674330103","https://openalex.org/W6728337797","https://openalex.org/W6745899033","https://openalex.org/W6750318962","https://openalex.org/W6807384801"],"related_works":["https://openalex.org/W2332916822","https://openalex.org/W3005112969","https://openalex.org/W2963907862","https://openalex.org/W2558220788","https://openalex.org/W2399576855","https://openalex.org/W2396420879","https://openalex.org/W285180403","https://openalex.org/W1995118279","https://openalex.org/W4240624848","https://openalex.org/W3184389706"],"abstract_inverted_index":{"Malware":[0],"detection":[1,84,91],"is":[2,149],"becoming":[3],"more":[4,10,138],"important":[5],"task":[6],"as":[7,23],"we":[8,117],"face":[9],"data":[11],"on":[12,82],"the":[13,64,94],"Internet.":[14],"Web":[15],"users":[16],"are":[17,48,53],"vulnerable":[18],"to":[19,55,70,125,136],"non-executable":[20],"files":[21,25,30,36],"such":[22,35],"Word":[24,28,170],"and":[26,58,77,105,128,168],"Hangul":[27,169],"Processor":[29,171],"because":[31,51],"they":[32,52,78,97],"usually":[33],"open":[34],"without":[37],"paying":[38],"attention.":[39],"As":[40],"new":[41],"infected":[42],"non-executables":[43],"keep":[44],"appearing,":[45],"deep-learning":[46,65,95,129],"models":[47,66,130],"drawing":[49],"attention":[50],"known":[54],"be":[56],"effective":[57],"have":[59,67,88,132],"better":[60,134,142],"generalization":[61],"power.":[62],"Especially,":[63],"been":[68,89],"used":[69],"learn":[71,137],"arbitrary":[72],"patterns":[73,140],"from":[74],"byte":[75],"streams,":[76],"exhibited":[79],"successful":[80],"performance":[81],"malware":[83,90],"task.":[85],"Although":[86],"there":[87],"studies":[92],"using":[93,109],"models,":[96],"commonly":[98],"aimed":[99],"at":[100],"a":[101,133],"single":[102],"file":[103,121,161],"format":[104],"did":[106],"not":[107],"take":[108],"different":[110,120,160],"formats":[111,122,162],"into":[112],"consideration.":[113],"In":[114],"this":[115,147],"paper,":[116],"assume":[118],"that":[119,146],"may":[123],"contribute":[124],"each":[126],"other,":[127],"will":[131],"chance":[135],"promising":[139],"for":[141],"performance.":[143],"We":[144],"demonstrate":[145],"assumption":[148],"possible":[150],"by":[151],"experimental":[152],"results":[153],"with":[154],"our":[155],"annotated":[156],"datasets":[157],"of":[158],"two":[159],"(e.g.,":[163],"Portable":[164],"Document":[165],"Format":[166],"(PDF)":[167],"(HWP)).":[172]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
