{"id":"https://openalex.org/W4385819738","doi":"https://doi.org/10.1109/access.2023.3305274","title":"ACMFNN: A Novel Design of an Augmented Convolutional Model for Intelligent Cross-Domain Malware Localization via Forensic Neural Networks","display_name":"ACMFNN: A Novel Design of an Augmented Convolutional Model for Intelligent Cross-Domain Malware Localization via Forensic Neural Networks","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385819738","doi":"https://doi.org/10.1109/access.2023.3305274"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3305274","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3305274","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216992.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216992.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028236063","display_name":"Rijvan Beg","orcid":"https://orcid.org/0009-0008-6895-3576"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rijvan Beg","raw_affiliation_strings":["Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India"],"raw_orcid":"https://orcid.org/0009-0008-6895-3576","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041506920","display_name":"R. K. Pateriya","orcid":"https://orcid.org/0000-0001-7163-0024"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. K. Pateriya","raw_affiliation_strings":["Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074527311","display_name":"Deepak Singh Tomar","orcid":null},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepak Singh Tomar","raw_affiliation_strings":["Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India","institution_ids":["https://openalex.org/I91277730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028236063"],"corresponding_institution_ids":["https://openalex.org/I91277730"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.9513,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75007746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"11","issue":null,"first_page":"87945","last_page":"87957"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8870905637741089},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8704954385757446},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7073434591293335},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6237699389457703},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5859602689743042},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5353349447250366},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5287021398544312},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4730716645717621},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.453980416059494},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.42707163095474243},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.42292192578315735},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.37532809376716614},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.07556560635566711}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8870905637741089},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8704954385757446},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7073434591293335},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6237699389457703},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5859602689743042},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5353349447250366},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5287021398544312},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4730716645717621},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.453980416059494},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.42707163095474243},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42292192578315735},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.37532809376716614},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.07556560635566711},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3305274","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3305274","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216992.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c669020f4f0c4e0987b82b564c7729a0","is_oa":true,"landing_page_url":"https://doaj.org/article/c669020f4f0c4e0987b82b564c7729a0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 87945-87957 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3305274","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3305274","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216992.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385819738.pdf","grobid_xml":"https://content.openalex.org/works/W4385819738.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W2905130735","https://openalex.org/W2940752008","https://openalex.org/W3027678336","https://openalex.org/W3047318188","https://openalex.org/W3049578105","https://openalex.org/W3091973050","https://openalex.org/W3120848642","https://openalex.org/W3120979750","https://openalex.org/W3157039573","https://openalex.org/W3161004246","https://openalex.org/W3162845755","https://openalex.org/W3167041328","https://openalex.org/W3167818199","https://openalex.org/W3172909833","https://openalex.org/W3173672712","https://openalex.org/W3174621618","https://openalex.org/W3176588888","https://openalex.org/W3181098651","https://openalex.org/W3186605584","https://openalex.org/W3189794512","https://openalex.org/W3194345182","https://openalex.org/W3209316616","https://openalex.org/W3211529384","https://openalex.org/W3214464008","https://openalex.org/W3216490468","https://openalex.org/W4205194689","https://openalex.org/W4206669125","https://openalex.org/W4211030792","https://openalex.org/W4211249255","https://openalex.org/W4225511863","https://openalex.org/W4285238371","https://openalex.org/W4292826151","https://openalex.org/W4319068890","https://openalex.org/W4323338649","https://openalex.org/W4360993664","https://openalex.org/W4361770927","https://openalex.org/W4367016625"],"related_works":["https://openalex.org/W4299822940","https://openalex.org/W2279398222","https://openalex.org/W4313563103","https://openalex.org/W3156786002","https://openalex.org/W4366492315","https://openalex.org/W3021430260","https://openalex.org/W4315783664","https://openalex.org/W2968586400","https://openalex.org/W2946016983","https://openalex.org/W2942650110"],"abstract_inverted_index":{"The":[0,108,131,151,179],"detection":[1,84,191,244],"and":[2,8,33,81,86,129,200,218,245],"localization":[3,87,157,212,216,221,246],"of":[4,15,49,67,138,159,172,242],"malwares":[5],"using":[6,103],"spatial":[7],"temporal":[9],"data":[10,31,177],"patterns":[11],"require":[12],"the":[13,206,225,233],"development":[14],"efficient":[16],"deep":[17],"learning":[18],"models.":[19],"These":[20,229],"models":[21,44,69],"employ":[22],"various":[23],"techniques":[24],"such":[25],"as":[26],"feature":[27,29],"extraction,":[28],"selection,":[30],"classification,":[32],"post-processing":[34],"to":[35,60,73,187,224],"achieve":[36],"their":[37,58],"objectives.":[38],"While":[39],"numerous":[40],"high-efficiency":[41],"malware":[42,75,83,101,114,149,173,190,243],"analysis":[43,102],"have":[45,70],"been":[46,71],"presented,":[47],"most":[48],"them":[50],"are":[51],"designed":[52,72],"for":[53,98,147,238],"application-specific":[54],"purposes,":[55],"which":[56],"limits":[57],"scalability":[59,85],"multiple":[61,113],"domains.":[62],"Additionally,":[63],"only":[64],"a":[65,92,239],"few":[66],"these":[68,79,142,162],"identify":[74],"locations.":[76],"To":[77],"address":[78],"issues":[80],"improve":[82],"performance,":[88],"this":[89],"article":[90],"proposes":[91],"novel":[93],"augmented":[94,226],"convolutional":[95,227],"model":[96,109,133,152,235],"(ACM)":[97],"intelligent":[99],"cross-domain":[100],"forensic":[104,165],"neural":[105],"networks":[106],"(FNNs).":[107],"is":[110,236],"evaluated":[111],"on":[112],"datasets,":[115,163],"including":[116],"Electro":[117],"RAT,":[118],"Pegasus,":[119],"SkyGoFree,":[120],"Viking":[121],"Horde,":[122],"Bat":[123],"Skull,":[124],"Yesmile,":[125],"Wirenet,":[126],"Jigsaw,":[127],"Satana,":[128],"Tapaoux.":[130],"proposed":[132,180,189,207,234],"achieved":[134,154],"an":[135,155,169],"average":[136,156],"accuracy":[137,158],"98.5%":[139],"in":[140,167,175],"classifying":[141],"malwares,":[143],"making":[144],"it":[145],"useful":[146],"real-time":[148],"analysis.":[150],"also":[153],"79.6%":[160],"across":[161],"assisting":[164],"experts":[166],"obtaining":[168],"approximate":[170],"estimate":[171],"locations":[174],"input":[176],"streams.":[178],"ACMFNN":[181],"method":[182],"demonstrated":[183],"better":[184,195,198,202,211,215,220],"performance":[185],"compared":[186],"recently":[188],"models,":[192],"with":[193],"8%":[194],"precision,":[196,217],"6.5%":[197],"recall,":[199,222],"9.4%":[201],"classification":[203],"accuracy.":[204],"Furthermore,":[205],"approach":[208],"had":[209],"15%":[210],"accuracy,":[213],"19%":[214],"14%":[219],"due":[223],"model.":[228],"results":[230],"indicate":[231],"that":[232],"applicable":[237],"wide":[240],"variety":[241],"application":[247],"deployments.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
