{"id":"https://openalex.org/W2783139674","doi":"https://doi.org/10.1109/bigdata.2017.8258483","title":"Automated microsoft office macro malware detection using machine learning","display_name":"Automated microsoft office macro malware detection using machine learning","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2783139674","doi":"https://doi.org/10.1109/bigdata.2017.8258483","mag":"2783139674"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2017.8258483","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2017.8258483","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064200922","display_name":"Ruth Bearden","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruth Bearden","raw_affiliation_strings":["Department of Computer Science, Kennesaw State University, Marietta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, Marietta, GA, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110542130","display_name":"Dan Chai-Tien Lo","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Chai-Tien Lo","raw_affiliation_strings":["Kennesaw State University, Kennesaw, GA, US"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University, Kennesaw, GA, US","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064200922"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":1.8492,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.87407714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"4448","last_page":"4452"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9160023927688599},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.815279483795166},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.7989447712898254},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.7846776247024536},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.7255455255508423},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.5394594669342041},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48481860756874084},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.48404139280319214},{"id":"https://openalex.org/keywords/microsoft-office","display_name":"Microsoft Office","score":0.4439114034175873},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2863870859146118},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2621552348136902},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12699005007743835}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9160023927688599},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.815279483795166},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.7989447712898254},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.7846776247024536},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.7255455255508423},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.5394594669342041},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48481860756874084},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.48404139280319214},{"id":"https://openalex.org/C523788702","wikidata":"https://www.wikidata.org/wiki/Q11255","display_name":"Microsoft Office","level":2,"score":0.4439114034175873},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2863870859146118},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2621552348136902},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12699005007743835}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata.2017.8258483","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2017.8258483","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1987684126","https://openalex.org/W2018428473","https://openalex.org/W2052854541","https://openalex.org/W2162765234","https://openalex.org/W2170770919","https://openalex.org/W2471456063","https://openalex.org/W2765921396","https://openalex.org/W6745221703"],"related_works":["https://openalex.org/W2795382384","https://openalex.org/W3202003292","https://openalex.org/W4401734693","https://openalex.org/W2945832014","https://openalex.org/W4392966178","https://openalex.org/W4240330722","https://openalex.org/W3211746486","https://openalex.org/W4225094272","https://openalex.org/W4293077671","https://openalex.org/W4226034576"],"abstract_inverted_index":{"Macro":[0],"malware":[1,53,92,178],"in":[2],"Microsoft":[3],"(MS)":[4],"Office":[5,51,83,102,152],"files":[6,84,103,153],"has":[7,28],"long":[8],"persisted":[9],"as":[10,30,106,164],"a":[11,35,97,136,142,165],"cybersecurity":[12],"threat.":[13,31],"Though":[14],"it":[15,27,157,172],"ebbed":[16],"after":[17],"its":[18],"initial":[19],"rampages":[20],"around":[21],"the":[22,25,72,87,111,130,159,174],"turn":[23],"of":[24,74,99,145,161],"century,":[26],"reemerged":[29],"Attackers":[32],"are":[33],"taking":[34],"persuasive":[36],"approach":[37,163],"and":[38,80,85,119,148,156,181],"using":[39,110],"document":[40],"engineering,":[41],"aided":[42],"by":[43],"improved":[44],"data":[45],"mining":[46],"methods,":[47],"to":[48,76],"make":[49],"MS":[50,82,101,151],"file":[52,131,138],"appear":[54],"legitimate.":[55],"Recent":[56],"attacks":[57],"have":[58],"targeted":[59],"specific":[60],"corporations":[61],"with":[62],"malicious":[63,79,107,147],"documents":[64],"containing":[65,104,154],"unusually":[66],"relevant":[67],"information.":[68],"This":[69,94,133],"development":[70],"undermines":[71],"ability":[73],"users":[75],"distinguish":[77],"between":[78],"legitimate":[81],"intensifies":[86],"need":[88],"for":[89],"automating":[90],"macro":[91,127,169,177],"detection.":[93],"study":[95,134],"proposes":[96],"method":[98],"classifying":[100],"macros":[105],"or":[108],"benign":[109,150],"K-Nearest":[112],"Neighbors":[113],"machine":[114],"learning":[115],"algorithm,":[116],"feature":[117],"selection,":[118],"TFIDF":[120],"where":[121],"p-code":[122],"opcode":[123],"n-grams":[124],"(translated":[125],"VBA":[126],"code)":[128],"compose":[129],"features.":[132],"achieves":[135],"96.3%":[137],"classification":[139],"accuracy":[140],"on":[141],"sample":[143],"set":[144],"40":[146],"118":[149],"macros,":[155],"demonstrates":[158],"effectiveness":[160],"this":[162],"potential":[166],"defense":[167],"against":[168],"malware.":[170],"Finally,":[171],"discusses":[173],"challenges":[175],"automated":[176],"detection":[179],"faces":[180],"possible":[182],"solutions.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
