{"id":"https://openalex.org/W4404520508","doi":"https://doi.org/10.1109/access.2024.3491185","title":"Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models","display_name":"Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404520508","doi":"https://doi.org/10.1109/access.2024.3491185"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3491185","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3491185","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3491185","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028236063","display_name":"Rijvan Beg","orcid":"https://orcid.org/0009-0008-6895-3576"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rijvan Beg","raw_affiliation_strings":["Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India"],"raw_orcid":"https://orcid.org/0009-0008-6895-3576","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041506920","display_name":"R. K. Pateriya","orcid":"https://orcid.org/0000-0001-7163-0024"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. K. Pateriya","raw_affiliation_strings":["Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074527311","display_name":"Deepak Singh Tomar","orcid":null},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepak Singh Tomar","raw_affiliation_strings":["Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028236063"],"corresponding_institution_ids":["https://openalex.org/I91277730"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.9718,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.7621702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"12","issue":null,"first_page":"175032","last_page":"175055"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9463000297546387,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.808728814125061},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7475133538246155},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6404410600662231},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5714552998542786},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08068600296974182}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.808728814125061},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7475133538246155},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6404410600662231},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5714552998542786},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08068600296974182}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3491185","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3491185","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5840e22565cf49a083a96ae490191949","is_oa":true,"landing_page_url":"https://doaj.org/article/5840e22565cf49a083a96ae490191949","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 175032-175055 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3491185","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3491185","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W2784030825","https://openalex.org/W3023529621","https://openalex.org/W3114468998","https://openalex.org/W3137539372","https://openalex.org/W3161004246","https://openalex.org/W3162825625","https://openalex.org/W3167041328","https://openalex.org/W3167818199","https://openalex.org/W3176588888","https://openalex.org/W3182600083","https://openalex.org/W3196064684","https://openalex.org/W3196664724","https://openalex.org/W3199491448","https://openalex.org/W3210837816","https://openalex.org/W3211821614","https://openalex.org/W3215200515","https://openalex.org/W3216588331","https://openalex.org/W4205521168","https://openalex.org/W4213214906","https://openalex.org/W4214575608","https://openalex.org/W4214746841","https://openalex.org/W4220669394","https://openalex.org/W4224263490","https://openalex.org/W4225511863","https://openalex.org/W4226299747","https://openalex.org/W4226510616","https://openalex.org/W4249476571","https://openalex.org/W4285083769","https://openalex.org/W4285238371","https://openalex.org/W4301603697","https://openalex.org/W4304194063","https://openalex.org/W4319018800","https://openalex.org/W4319225041","https://openalex.org/W4321612103","https://openalex.org/W4321786606","https://openalex.org/W4321787607","https://openalex.org/W4367292709","https://openalex.org/W4381233012","https://openalex.org/W4383340358","https://openalex.org/W4383376739","https://openalex.org/W4385444612","https://openalex.org/W4385492466","https://openalex.org/W4385819738","https://openalex.org/W4386001590","https://openalex.org/W4387782560","https://openalex.org/W4387848549","https://openalex.org/W4388107905","https://openalex.org/W4388145533","https://openalex.org/W4388294841","https://openalex.org/W4390603899","https://openalex.org/W4393072642","https://openalex.org/W4393086681","https://openalex.org/W4400395156","https://openalex.org/W4400823871"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"In":[0,43,198],"the":[1,8,82,93,116,136,155,158,164,175,245,254,257,288,303,324,342],"evolving":[2,334],"cyber":[3],"threat":[4],"landscape,":[5],"one":[6],"of":[7,27,31,39,66,84,118,138,157,172,180,192,256,305],"most":[9],"visible":[10],"and":[11,18,22,36,60,121,127,167,234,247,271,331],"pernicious":[12],"challenges":[13],"is":[14,229],"malware":[15,61,86,133,307],"activity":[16,62,87,308],"detection":[17,21,282],"analysis.":[19,63],"Traditional":[20],"analysis":[23,309],"methods":[24,55],"face":[25],"threats":[26],"data":[28,41,88,169,298],"high-dimensionality,":[29],"lack":[30],"strength":[32],"against":[33,218],"adversarial":[34,207,219,222,232],"attacks,":[35,204],"non-efficient":[37],"use":[38,260,268],"unlabeled":[40,272],"samples.":[42,275],"this":[44],"context,":[45],"we":[46,105,152,205,259,301],"propose":[47],"a":[48,184,195],"comprehensive":[49],"framework":[50],"that":[51],"applies":[52],"machine":[53,74],"learning":[54,75,110],"to":[56,80,144,200,239,267,290,326,329,333],"enhance":[57],"evidence":[58],"collection":[59],"The":[64,160,227],"approach":[65,277],"our":[67],"proposed":[68],"model":[69,162,228,289,325],"innovatively":[70],"uses":[71],"several":[72],"advanced":[73],"methods.":[76],"First,":[77],"in":[78,115,183,187],"order":[79,199],"reduce":[81],"dimensionality":[83],"raw":[85],"by":[89,101,225,283,338],"50%,":[90],"while":[91],"at":[92],"same":[94],"timestamp":[95],"preserving":[96],"critical":[97],"information,":[98],"as":[99],"evidenced":[100],"minimal":[102],"reconstruction":[103],"error,":[104],"apply":[106],"an":[107,190,318],"autoencoder-based":[108],"feature":[109,122,177],"technique.":[111],"This":[112,276,321],"technique":[113],"assists":[114],"extraction":[117,178],"compact,":[119],"informative,":[120],"representations":[123],"covering":[124],"both":[125,244,269],"global":[126],"local":[128],"discriminative":[129],"patterns":[130],"for":[131],"accurate":[132],"detection.":[134,345],"With":[135],"addition":[137],"Gradient":[139],"Boosted":[140],"Decision":[141],"Trees":[142],"(GBDT)":[143],"features":[145],"derived":[146],"from":[147,202],"Convolutional":[148],"Neural":[149],"Networks":[150,212],"(CNN),":[151],"further":[153],"improve":[154],"capability":[156,171,179],"model.":[159],"hybrid":[161],"combines":[163],"outlier":[165],"robustness":[166],"heterogeneous":[168],"handling":[170],"GBDTs":[173],"with":[174,189,317],"hierarchical":[176],"CNNs,":[181],"resulting":[182],"significant":[185],"improvement":[186],"performance,":[188],"F1-score":[191],"0.95":[193],"on":[194],"validation":[196],"set.":[197],"defend":[201],"evasion":[203],"incorporate":[206],"training":[208],"using":[209,231,263],"Generative":[210],"Adversarial":[211],"(GANs).":[213],"It":[214],"enables":[215],"effective":[216],"counteraction":[217],"strategies,":[220],"reducing":[221],"success":[223],"rates":[224],"60%.":[226],"trained":[230],"examples,":[233],"its":[235],"parameters":[236],"are":[237],"optimized":[238],"minimize":[240],"classification":[241],"loss":[242],"across":[243],"normal":[246],"distorted":[248],"inputs,":[249],"thereby":[250,295],"enhancing":[251],"robustness.":[252],"Expanding":[253],"applicability":[255],"framework,":[258],"semi-supervised":[261],"self-training":[262],"Variational":[264],"Autoencoders":[265],"(VAEs)":[266],"labeled":[270],"datasets":[273],"&":[274],"not":[278],"only":[279],"improves":[280],"anomaly":[281],"30%":[284],"but":[285],"also":[286],"allows":[287,323],"learn":[291],"probabilistic":[292],"latent":[293],"representations,":[294],"revealing":[296],"underlying":[297],"structures.":[299],"Finally,":[300],"address":[302],"challenge":[304],"temporal":[306],"through":[310],"Long":[311],"Short-Term":[312],"Memory":[313],"(LSTM)":[314],"networks":[315],"augmented":[316],"attention":[319],"mechanism.":[320],"configuration":[322],"be":[327],"able":[328],"detect":[330],"adapt":[332],"attack":[335,344],"patterns,":[336],"thus,":[337],"25%,":[339],"significantly":[340],"improving":[341],"zero-day":[343]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
