{"id":"https://openalex.org/W4415003706","doi":"https://doi.org/10.1109/acit65614.2025.11185604","title":"A Method for Classifying Polymorphic Viruses Based on Fuzzy Logical Inference","display_name":"A Method for Classifying Polymorphic Viruses Based on Fuzzy Logical Inference","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415003706","doi":"https://doi.org/10.1109/acit65614.2025.11185604"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185604","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185604","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031610860","display_name":"Maksym Chaikovskyi","orcid":"https://orcid.org/0000-0002-7854-7036"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Maksym Chaikovskyi","raw_affiliation_strings":["Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine"],"affiliations":[{"raw_affiliation_string":"Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine","institution_ids":["https://openalex.org/I164756455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050278704","display_name":"\u041e\u043b\u0435\u0433 \u0421\u0430\u0432\u0435\u043d\u043a\u043e","orcid":"https://orcid.org/0000-0002-4104-745X"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleg Savenko","raw_affiliation_strings":["Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine"],"affiliations":[{"raw_affiliation_string":"Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine","institution_ids":["https://openalex.org/I164756455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032094840","display_name":"Sergii Lysenko","orcid":"https://orcid.org/0000-0001-7243-8747"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Sergii Lysenko","raw_affiliation_strings":["Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine"],"affiliations":[{"raw_affiliation_string":"Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine","institution_ids":["https://openalex.org/I164756455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119925075","display_name":"Vladyslav Ivanyna","orcid":null},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Vladyslav Ivanyna","raw_affiliation_strings":["West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine"],"affiliations":[{"raw_affiliation_string":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006328477","display_name":"Inna Chaikovska","orcid":"https://orcid.org/0000-0001-7482-1010"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Inna Chaikovska","raw_affiliation_strings":["Khmelnytskyi National University,Department of Economics, Analytics, Modelling and Information Technologies in Business,Khmelnytskyi,Ukraine"],"affiliations":[{"raw_affiliation_string":"Khmelnytskyi National University,Department of Economics, Analytics, Modelling and Information Technologies in Business,Khmelnytskyi,Ukraine","institution_ids":["https://openalex.org/I164756455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025762439","display_name":"Bohdan Savenko","orcid":"https://orcid.org/0000-0001-5647-9979"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Bohdan Savenko","raw_affiliation_strings":["Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine"],"affiliations":[{"raw_affiliation_string":"Khmelnytskyi National University,Computer Engineering and Information Systems Department,Khmelnytskyi,Ukraine","institution_ids":["https://openalex.org/I164756455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5031610860"],"corresponding_institution_ids":["https://openalex.org/I164756455"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29016281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"516","last_page":"521"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9264000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5396999716758728},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5217999815940857},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.47049999237060547},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4474000036716461},{"id":"https://openalex.org/keywords/fuzzy-classification","display_name":"Fuzzy classification","score":0.3368000090122223},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.3287999927997589}],"concepts":[{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5396999716758728},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5250999927520752},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5217999815940857},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5156999826431274},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.47049999237060547},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4474000036716461},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3953000009059906},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36959999799728394},{"id":"https://openalex.org/C127385683","wikidata":"https://www.wikidata.org/wiki/Q1475696","display_name":"Fuzzy classification","level":4,"score":0.3368000090122223},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.3287999927997589},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3174999952316284},{"id":"https://openalex.org/C186108316","wikidata":"https://www.wikidata.org/wiki/Q352530","display_name":"Adaptive neuro fuzzy inference system","level":4,"score":0.31709998846054077},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.289900004863739},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.2842999994754791},{"id":"https://openalex.org/C21847791","wikidata":"https://www.wikidata.org/wiki/Q191081","display_name":"Logical conjunction","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C2780049643","wikidata":"https://www.wikidata.org/wiki/Q5511139","display_name":"Fuzzy rule","level":4,"score":0.2702000141143799},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2632000148296356}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185604","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185604","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2679944888","https://openalex.org/W2969395615","https://openalex.org/W2996806689","https://openalex.org/W3004280948","https://openalex.org/W3011213835","https://openalex.org/W3014356165","https://openalex.org/W3094374491","https://openalex.org/W3132223643","https://openalex.org/W3208789089","https://openalex.org/W4231878650","https://openalex.org/W4280569680","https://openalex.org/W4312707592","https://openalex.org/W4317207812","https://openalex.org/W4320490818","https://openalex.org/W4322730960","https://openalex.org/W4324137424","https://openalex.org/W4377703001","https://openalex.org/W4377970503","https://openalex.org/W4379874965","https://openalex.org/W4385276836","https://openalex.org/W4387804020","https://openalex.org/W4394029380","https://openalex.org/W4404368853"],"related_works":[],"abstract_inverted_index":{"A":[0,54],"paper":[1],"presents":[2],"a":[3,70,85],"comprehensive":[4],"study":[5],"on":[6,15],"the":[7,63,126,134],"modeling":[8],"and":[9,19,49,82,103,120,128],"classification":[10,57,95,131],"of":[11,21,26,65,69,75,79,84,96,130,136],"polymorphic":[12,27,97,141],"viruses":[13,28,98],"based":[14],"their":[16],"structural":[17],"complexity":[18,101],"levels":[20,102],"polymorphism.":[22],"Six":[23],"distinct":[24],"classes":[25],"are":[29],"developed,":[30],"ranging":[31],"from":[32],"basic":[33],"forms":[34,43],"that":[35],"utilize":[36],"constant":[37],"values":[38],"in":[39],"decryptors":[40],"to":[41],"advanced":[42],"employing":[44],"highly":[45],"sophisticated":[46],"code":[47,51],"obfuscation":[48],"internal":[50],"mixing":[52],"techniques.":[53],"novel":[55],"fuzzy":[56,86,109],"method":[58],"is":[59],"proposed,":[60],"which":[61],"includes":[62],"identification":[64],"virus":[66],"characteristics,":[67],"construction":[68],"logical":[71],"inference":[72,87],"tree,":[73],"definition":[74],"linguistic":[76,110],"variables,":[77],"assignment":[78],"membership":[80],"functions,":[81],"formation":[83],"system":[88],"knowledge":[89],"base.":[90],"This":[91],"approach":[92],"enables":[93],"probabilistic":[94],"across":[99],"six":[100],"allows":[104],"for":[105],"nuanced":[106],"assessments":[107],"using":[108],"terms":[111],"such":[112],"as":[113],"low,":[114],"below":[115],"average,":[116,117,119],"above":[118],"high.":[121],"The":[122],"proposed":[123],"methodology":[124],"enhances":[125],"accuracy":[127],"reliability":[129],"outcomes,":[132],"supporting":[133],"development":[135],"more":[137],"effective":[138],"countermeasures":[139],"against":[140],"malware":[142],"threats.":[143]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
