{"id":"https://openalex.org/W2765851855","doi":"https://doi.org/10.1109/ccoms.2017.8075178","title":"Comparative study of recent MEA malware phylogeny","display_name":"Comparative study of recent MEA malware phylogeny","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2765851855","doi":"https://doi.org/10.1109/ccoms.2017.8075178","mag":"2765851855"},"language":"en","primary_location":{"id":"doi:10.1109/ccoms.2017.8075178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccoms.2017.8075178","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 2nd International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058471570","display_name":"Joanna Moubarak","orcid":"https://orcid.org/0000-0001-5605-6095"},"institutions":[{"id":"https://openalex.org/I184679254","display_name":"Saint Joseph University","ror":"https://ror.org/044fxjq88","country_code":"LB","type":"education","lineage":["https://openalex.org/I184679254"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Joanna Moubarak","raw_affiliation_strings":["Faculty of Engineering, USJ, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, USJ, Beirut, Lebanon","institution_ids":["https://openalex.org/I184679254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087009047","display_name":"Maroun Chamoun","orcid":null},"institutions":[{"id":"https://openalex.org/I184679254","display_name":"Saint Joseph University","ror":"https://ror.org/044fxjq88","country_code":"LB","type":"education","lineage":["https://openalex.org/I184679254"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Maroun Chamoun","raw_affiliation_strings":["Faculty of Engineering, USJ, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, USJ, Beirut, Lebanon","institution_ids":["https://openalex.org/I184679254"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089725479","display_name":"\u00c9ric Filiol","orcid":null},"institutions":[{"id":"https://openalex.org/I35298706","display_name":"ESIEA University","ror":"https://ror.org/00g6cx256","country_code":"FR","type":"education","lineage":["https://openalex.org/I35298706"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Eric Filiol","raw_affiliation_strings":["ESIA, (C + V)\u25cb Lab, Laval, France"],"affiliations":[{"raw_affiliation_string":"ESIA, (C + V)\u25cb Lab, Laval, France","institution_ids":["https://openalex.org/I35298706"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058471570"],"corresponding_institution_ids":["https://openalex.org/I184679254"],"apc_list":null,"apc_paid":null,"fwci":1.2945,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.82060305,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"16","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.886651337146759},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.7234001159667969},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6698456406593323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5937698483467102},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5647263526916504},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.5444314479827881},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.4177483320236206},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.39090242981910706},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11774158477783203}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.886651337146759},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.7234001159667969},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6698456406593323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5937698483467102},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5647263526916504},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.5444314479827881},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.4177483320236206},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39090242981910706},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11774158477783203},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccoms.2017.8075178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccoms.2017.8075178","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 2nd International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W157706324","https://openalex.org/W1981229864","https://openalex.org/W1996975221","https://openalex.org/W2145056020","https://openalex.org/W2310301607","https://openalex.org/W2516372287","https://openalex.org/W4242554684","https://openalex.org/W4246127556","https://openalex.org/W6606400708"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2783112941","https://openalex.org/W2526398307","https://openalex.org/W2470029541","https://openalex.org/W4387065217","https://openalex.org/W4368275542","https://openalex.org/W2470502009","https://openalex.org/W3152957156","https://openalex.org/W350155893"],"abstract_inverted_index":{"Governments":[0],"in":[1,49,126,137,172],"the":[2,24,40,46,77,109,117,122,127,134,145,168],"MEA":[3],"did":[4],"not":[5],"take":[6],"cyberwarfare":[7],"seriously":[8],"a":[9,16,19,30,68,72],"few":[10],"years":[11],"ago.":[12],"Nowadays,":[13],"there":[14],"is":[15,67,165],"shift":[17],"to":[18,112,166],"more":[20],"concerned":[21],"posture":[22],"on":[23],"subject":[25],"of":[26,32,35,74,76,121,148,162],"cyber":[27],"security":[28],"after":[29],"series":[31],"public":[33],"revelations":[34],"networks":[36],"being":[37],"penetrated":[38],"around":[39,144],"region.":[41],"The":[42,159],"struggle":[43],"unpacked":[44],"by":[45,81],"Stuxnet":[47],"malware":[48,150],"2009":[50],"and":[51,62,71,90,95,98,114,119,132,152],"then":[52],"pursued":[53],"through":[54,116],"Duqu,":[55],"Flame,":[56],"Shamoon,":[57],"Gauss,":[58],"Duqu2.0,":[59],"Shamoon":[60],"2.0":[61],"Stonedrill":[63],"malware.":[64,83],"This":[65],"paper":[66,164],"technical":[69],"survey":[70],"proof":[73],"concept":[75],"operating":[78],"vectors":[79],"utilized":[80],"these":[82],"It":[84,107],"takes":[85],"this":[86,105,143,163],"very":[87],"complex":[88],"approach,":[89],"shows":[91],"how":[92],"common":[93],"stealth":[94,100],"evasion":[96],"functions":[97],"similar":[99],"methodologies":[101],"have":[102],"greatly":[103],"abridged":[104],"undertaking.":[106],"provides":[108],"understanding":[110],"needed":[111],"analyze":[113],"go":[115],"history":[118],"development":[120],"most":[123],"remarkable":[124],"attacks":[125],"Middle":[128],"East,":[129],"their":[130],"objectives":[131],"describes":[133],"similarities":[135],"involved":[136],"that":[138],"process.":[139],"However,":[140],"it":[141,155],"focuses":[142],"actual":[146],"downsides":[147],"each":[149],"analyzed":[151],"what":[153],"make":[154],"vulnerable":[156],"or":[157],"detected.":[158],"main":[160],"purpose":[161],"highlight":[167],"phylogenetic":[169],"aspects":[170],"infused":[171],"cyberattacks.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
