{"id":"https://openalex.org/W4389724926","doi":"https://doi.org/10.1109/clei60451.2023.10346179","title":"Static Analysis for Malware Classification Using Machine and Deep Learning","display_name":"Static Analysis for Malware Classification Using Machine and Deep Learning","publication_year":2023,"publication_date":"2023-10-16","ids":{"openalex":"https://openalex.org/W4389724926","doi":"https://doi.org/10.1109/clei60451.2023.10346179"},"language":"en","primary_location":{"id":"doi:10.1109/clei60451.2023.10346179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/clei60451.2023.10346179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 XLIX Latin American Computer Conference (CLEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013179604","display_name":"Marcelo Invert Palma Salas","orcid":"https://orcid.org/0000-0001-6821-0002"},"institutions":[{"id":"https://openalex.org/I181391015","display_name":"Universidade Estadual de Campinas (UNICAMP)","ror":"https://ror.org/04wffgt70","country_code":"BR","type":"education","lineage":["https://openalex.org/I181391015"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Marcelo Invert Palma Salas","raw_affiliation_strings":["Universidade Estadual de Campinas (UNICAMP),Laboratory of Security and Cryptography,Campinas,SP,Brazil","Laboratory of Security and Cryptography, Universidade Estadual de Campinas (UNICAMP), Campinas, SP, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Estadual de Campinas (UNICAMP),Laboratory of Security and Cryptography,Campinas,SP,Brazil","institution_ids":["https://openalex.org/I181391015"]},{"raw_affiliation_string":"Laboratory of Security and Cryptography, Universidade Estadual de Campinas (UNICAMP), Campinas, SP, Brazil","institution_ids":["https://openalex.org/I181391015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024273591","display_name":"Paulo L\u00edcio de Geus","orcid":"https://orcid.org/0000-0002-6540-8686"},"institutions":[{"id":"https://openalex.org/I181391015","display_name":"Universidade Estadual de Campinas (UNICAMP)","ror":"https://ror.org/04wffgt70","country_code":"BR","type":"education","lineage":["https://openalex.org/I181391015"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Paulo De Geus","raw_affiliation_strings":["Universidade Estadual de Campinas (UNICAMP),Laboratory of Security and Cryptography,Campinas,SP,Brazil","Laboratory of Security and Cryptography, Universidade Estadual de Campinas (UNICAMP), Campinas, SP, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Estadual de Campinas (UNICAMP),Laboratory of Security and Cryptography,Campinas,SP,Brazil","institution_ids":["https://openalex.org/I181391015"]},{"raw_affiliation_string":"Laboratory of Security and Cryptography, Universidade Estadual de Campinas (UNICAMP), Campinas, SP, Brazil","institution_ids":["https://openalex.org/I181391015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013179604"],"corresponding_institution_ids":["https://openalex.org/I181391015"],"apc_list":null,"apc_paid":null,"fwci":0.6113,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67818466,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8460230827331543},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8362481594085693},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7613703012466431},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.714316725730896},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6286378502845764},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.612080991268158},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.553589403629303},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5144043564796448},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.47121351957321167},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.43824630975723267},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4212932586669922},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4174419641494751},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.417349636554718},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.4117891490459442},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3715289235115051},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.32677751779556274},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11102735996246338}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8460230827331543},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8362481594085693},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7613703012466431},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.714316725730896},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6286378502845764},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.612080991268158},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.553589403629303},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5144043564796448},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.47121351957321167},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.43824630975723267},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4212932586669922},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4174419641494751},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.417349636554718},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.4117891490459442},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3715289235115051},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.32677751779556274},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11102735996246338},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/clei60451.2023.10346179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/clei60451.2023.10346179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 XLIX Latin American Computer Conference (CLEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2591653665","https://openalex.org/W2784097977","https://openalex.org/W2788864200","https://openalex.org/W2799784398","https://openalex.org/W2895892359","https://openalex.org/W2899250976","https://openalex.org/W2900633536","https://openalex.org/W2910711617","https://openalex.org/W2931858311","https://openalex.org/W2998074434","https://openalex.org/W3023980642","https://openalex.org/W3117219787","https://openalex.org/W3215357191","https://openalex.org/W4297747285","https://openalex.org/W4300687693","https://openalex.org/W4367854065","https://openalex.org/W6745899033","https://openalex.org/W6748641434","https://openalex.org/W6750318962","https://openalex.org/W6804805211"],"related_works":["https://openalex.org/W4362597605","https://openalex.org/W1574414179","https://openalex.org/W4297676672","https://openalex.org/W3009056573","https://openalex.org/W2922073769","https://openalex.org/W4298369531","https://openalex.org/W3155135229","https://openalex.org/W3172545305","https://openalex.org/W3094256312","https://openalex.org/W3214491504"],"abstract_inverted_index":{"Malware,":[0],"or":[1,12],"malicious":[2],"software,":[3],"is":[4],"a":[5,30,75,162],"general":[6],"term":[7],"to":[8,18,34,169,179,182,187],"describe":[9],"any":[10],"program":[11],"code":[13,26,42],"that":[14,139],"can":[15],"be":[16,180],"harmful":[17,25],"systems.":[19],"This":[20],"hostile,":[21],"intrusive,":[22],"and":[23,36,39,49,65,95,98,133,171],"intentionally":[24],"makes":[27],"use":[28,105],"of":[29,32,58,67,106,116,125,142],"variety":[31],"techniques":[33,61],"protect":[35],"evade":[37],"detection":[38,64],"removal":[40],"through":[41,79],"obfuscation,":[43],"polymorphism,":[44],"metamorphism,":[45],"encryption,":[46],"encrypted":[47],"communication,":[48],"more.":[50],"Current":[51],"state-of-the-art":[52],"research":[53],"focuses":[54],"on":[55],"the":[56,63,107,114,117,123,140,153],"application":[57,141],"artificial":[59],"intelligence":[60],"for":[62,122],"classification":[66,78,124],"malware.":[68,189],"In":[69],"this":[70,72],"context,":[71],"paper":[73],"proposes":[74],"new":[76],"malware":[77,127],"static":[80],"analysis":[81],"using":[82],"seven":[83],"machine":[84],"learning":[85,100],"algorithms":[86,145],"(LightGBM,":[87],"XGBoost,":[88],"Logistic":[89],"Regression,":[90],"KNN,":[91],"SVM,":[92],"Naive":[93],"Bayes,":[94],"Random":[96],"Forest)":[97],"deep":[99],"finetuning.":[101],"These":[102],"models":[103],"make":[104],"SelectKBest":[108],"technique":[109],"within":[110],"data":[111],"engineering,":[112],"allowing":[113],"selection":[115],"893":[118],"most":[119],"relevant":[120],"characteristics":[121],"10868":[126],"in":[128,156,184],"9":[129],"families,":[130],"reducing":[131],"overfitting":[132],"training":[134],"time.":[135],"The":[136],"results":[137,155],"show":[138],"Gradient":[143],"Boosting":[144],"such":[146,158],"as":[147,159],"LightGBM":[148],"with":[149,161],"hyperparameter":[150],"optimization":[151],"exceeds":[152],"reference":[154],"competitions":[157],"Kaggle,":[160],"logarithmic":[163],"loss":[164],"0.00118,":[165],"an":[166],"accuracy":[167],"close":[168],"100%,":[170],"prediction":[172],"times":[173],"less":[174],"than":[175],"2.3ms.":[176],"Fast":[177],"enough":[178],"applied":[181],"systems":[183],"real":[185],"time":[186],"classify":[188]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
