{"id":"https://openalex.org/W2583312277","doi":"https://doi.org/10.1109/bigdata.2016.7841031","title":"Towards an effective and efficient malware detection system","display_name":"Towards an effective and efficient malware detection system","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2583312277","doi":"https://doi.org/10.1109/bigdata.2016.7841031","mag":"2583312277"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2016.7841031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2016.7841031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108622100","display_name":"C.-T.D. Lo","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chia Tien Dan Lo","raw_affiliation_strings":["Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108621051","display_name":"Pablo Ord\u00f3\u00f1ez","orcid":"https://orcid.org/0000-0002-0069-5346"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ordonez Pablo","raw_affiliation_strings":["Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023050491","display_name":"Cepeda Mora Carlos","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cepeda Mora Carlos","raw_affiliation_strings":["Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108622100"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":0.7565,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.74056211,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"3648","last_page":"3655"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8375067710876465},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7463430166244507},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4306109845638275}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8375067710876465},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7463430166244507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4306109845638275}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata.2016.7841031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2016.7841031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W150153386","https://openalex.org/W642715168","https://openalex.org/W1020265529","https://openalex.org/W1966948031","https://openalex.org/W1996975221","https://openalex.org/W2036323568","https://openalex.org/W2046437810","https://openalex.org/W2057787526","https://openalex.org/W2085807744","https://openalex.org/W2121398530","https://openalex.org/W2121749752","https://openalex.org/W2149659470","https://openalex.org/W2247776437","https://openalex.org/W2295755339","https://openalex.org/W2326733699","https://openalex.org/W2964051315","https://openalex.org/W6662376325","https://openalex.org/W6678051712","https://openalex.org/W6678079094","https://openalex.org/W6682031295","https://openalex.org/W6691056232","https://openalex.org/W6697196120","https://openalex.org/W7010828136"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453"],"abstract_inverted_index":{"The":[0,95],"ubiquitous":[1],"advance":[2],"of":[3,22,65,73,103,119,153,167,243,256,279],"technology":[4],"used":[5,58,209],"on":[6,164,252],"the":[7,18,84,91,100,117,129,156,165,174,178,185,225,234,272],"Internet,":[8],"computers,":[9],"smart":[10],"phones":[11],"and":[12,20,35,45,52,63,75,81,86,128,182,204,266,269],"tablets":[13],"has":[14],"been":[15,57],"conducive":[16],"to":[17,98,115,144,230],"creation":[19],"proliferation":[21],"cyber":[23,66],"threats":[24],"resulting":[25],"in":[26,113,210,220,224],"attacks":[27],"that":[28,105,139,172,187,214,271],"have":[29,37,56],"grown":[30],"exponentially.":[31],"Consequently,":[32],"anti-virus":[33],"companies":[34],"researchers":[36],"developed":[38],"new":[39,254],"approaches":[40],"for":[41,59,121,131,160,184,277],"dealing":[42],"with":[43,150,240],"discovering":[44],"classifying":[46],"malware.":[47],"Among":[48],"these,":[49],"machine":[50],"learning":[51],"big":[53],"data":[54],"technologies":[55],"feature":[60],"extraction,":[61],"detection,":[62],"clustering":[64],"threats.":[67],"In":[68,133,191],"this":[69,134],"paper":[70],"a":[71,211,241,253],"dataset":[72,242,255],"malware":[74,146,161,189,244,257,281],"clean":[76],"files":[77,149],"(goodware)":[78],"was":[79,137,238,250],"created":[80],"analyzed":[82],"from":[83,147,228],"static":[85],"dynamic":[87],"features":[88,104,127,141,159],"provided":[89],"by":[90,177,260],"online":[92],"framework":[93],"VirusTotal.":[94],"purpose":[96],"is":[97,274],"select":[99],"smallest":[101],"number":[102],"keep":[106],"classification":[107,193],"accuracy":[108,152],"as":[109,111,123,125,196],"high":[110],"possible":[112],"order":[114],"decrease":[116],"use":[118],"resources":[120],"monitoring":[122],"well":[124],"extracting":[126],"time":[130,262],"detection.":[132],"research,":[135],"it":[136],"found":[138],"\u201c9\u201d":[140],"are":[142],"enough":[143],"distinguish":[145],"\u201cgoodware\u201d":[148],"an":[151,169,218],"99.60%.":[154],"Selecting":[155],"most":[157],"representative":[158],"detection":[162,278],"relies":[163],"possibility":[166],"creating":[168],"embedded":[170],"program":[171],"monitors":[173],"processes":[175],"executed":[176],"operating":[179],"system":[180],"(OS)":[181],"looks":[183],"characteristics":[186],"match":[188],"behavior.":[190],"addition,":[192],"algorithms":[194],"such":[195],"Random":[197],"Forest":[198],"(RF),":[199],"Support":[200],"Vector":[201],"Machine":[202],"(SVM)":[203],"Neural":[205],"Networks":[206],"(NN)":[207],"were":[208],"novel":[212],"combination":[213],"not":[215],"only":[216],"showed":[217,270],"increase":[219],"accuracy,":[221],"but":[222],"also":[223],"training":[226],"speed":[227],"hours":[229],"just":[231],"minutes.":[232],"Finally,":[233],"trained":[235,239],"model":[236,273],"(which":[237],"samples":[245,258],"seen":[246,259],"before":[247],"September":[248],"2015)":[249],"tested":[251],"first":[261],"between":[263],"October":[264],"2015":[265],"June":[267],"2016":[268],"still":[275],"effective":[276],"unseen":[280],"files.":[282]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
