{"id":"https://openalex.org/W7147129125","doi":"https://doi.org/10.1109/cnml68938.2026.11452551","title":"Survey of malware classification Models for Multi-source data","display_name":"Survey of malware classification Models for Multi-source data","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147129125","doi":"https://doi.org/10.1109/cnml68938.2026.11452551"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11452551","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132609227","display_name":"Lu Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lu Hou","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132700830","display_name":"Chao Li","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104324853","display_name":"Ruliang Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruliang Lin","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132663831","display_name":"Xintong Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xintong Lin","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132691300","display_name":"Mengyu Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengyu Xia","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036620476","display_name":"Yiming Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiming Shi","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5132609227"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.93304221,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1034","last_page":"1040"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7247999906539917,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7247999906539917,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.03350000083446503,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.02500000037252903,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7095999717712402},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5936999917030334},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5577999949455261},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.5098999738693237},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.46959999203681946},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.45730000734329224},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.43479999899864197},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3707999885082245}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7095999717712402},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7064999938011169},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5936999917030334},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5577999949455261},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5149000287055969},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.5098999738693237},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.46959999203681946},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.45730000734329224},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.43479999899864197},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4032999873161316},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3707999885082245},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35089999437332153},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3416000008583069},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3050999939441681},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.28839999437332153},{"id":"https://openalex.org/C138958017","wikidata":"https://www.wikidata.org/wiki/Q190087","display_name":"Data type","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C104122410","wikidata":"https://www.wikidata.org/wiki/Q1416406","display_name":"Network model","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11452551","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W575847903","https://openalex.org/W2010065958","https://openalex.org/W2057787526","https://openalex.org/W2296240038","https://openalex.org/W2946483985","https://openalex.org/W3011727199","https://openalex.org/W3025067198","https://openalex.org/W4360615784","https://openalex.org/W4390538908","https://openalex.org/W4393175755","https://openalex.org/W4404758008","https://openalex.org/W4410639444","https://openalex.org/W4416595995"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,8,21,38,62,75,85,112,119,127,143,151,157],"continuous":[2],"evolution":[3],"of":[4,12,23,65,114,121,129,145,153,159],"network":[5,56,160],"security":[6],"threats,":[7],"detection":[9,39],"and":[10,41,55,83,96,124,126,149],"classification":[11,29,67,148],"malicious":[13,27,131,146],"code":[14,28,132,147],"has":[15],"become":[16],"a":[17,140],"core":[18],"topic":[19],"in":[20,156],"field":[22,158],"information":[24,47],"security.":[25,161],"The":[26],"model":[30,42,97,122],"based":[31],"on":[32],"multi-source":[33,71],"data":[34,93,133],"can":[35],"effectively":[36],"improve":[37],"accuracy":[40],"robustness":[43,123],"by":[44,70,80],"fusing":[45],"multi-modal":[46],"such":[48,88],"as":[49,89],"static":[50],"features,":[51],"dynamic":[52],"behavior":[53],"features":[54],"traffic.":[57],"This":[58,135],"paper":[59,104,136],"systematically":[60],"reviews":[61],"research":[63,109,144],"status":[64],"malware":[66],"models":[68],"driven":[69],"data,":[72],"deeply":[73],"analyzes":[74],"main":[76],"pain":[77],"points":[78],"faced":[79],"current":[81],"models,":[82],"summarizes":[84],"key":[86],"technologies":[87,155],"feature":[90],"extraction":[91],"methods,":[92,118],"preprocessing":[94],"processes":[95],"architecture":[98],"design.":[99],"On":[100],"this":[101,103],"basis,":[102],"further":[105],"discusses":[106],"possible":[107],"future":[108],"directions,":[110],"including":[111],"development":[113],"multimodal":[115],"deep":[116],"fusion":[117],"improvement":[120],"interpretability,":[125],"construction":[128],"high-quality":[130],"resources.":[134],"aims":[137],"to":[138],"provide":[139],"reference":[141],"for":[142],"promote":[150],"application":[152],"related":[154]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
