{"id":"https://openalex.org/W4390098783","doi":"https://doi.org/10.1109/commnet60167.2023.10365252","title":"Early Malware Characterization based on Online Social Networks","display_name":"Early Malware Characterization based on Online Social Networks","publication_year":2023,"publication_date":"2023-12-11","ids":{"openalex":"https://openalex.org/W4390098783","doi":"https://doi.org/10.1109/commnet60167.2023.10365252"},"language":"en","primary_location":{"id":"doi:10.1109/commnet60167.2023.10365252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet60167.2023.10365252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063803574","display_name":"Alireza Sadighian","orcid":"https://orcid.org/0000-0001-5244-7726"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Alireza Sadighian","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049708885","display_name":"Ines Abbes","orcid":"https://orcid.org/0000-0001-6222-979X"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ines Abbes","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062407436","display_name":"Gabriele Oligeri","orcid":"https://orcid.org/0000-0002-9637-0430"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Gabriele Oligeri","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063803574"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72480724,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9441642761230469},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.847465991973877},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.66893070936203},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5724891424179077},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.4916730523109436},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4301597476005554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4228714108467102},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42274782061576843},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3425951600074768}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9441642761230469},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.847465991973877},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.66893070936203},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5724891424179077},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.4916730523109436},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4301597476005554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4228714108467102},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42274782061576843},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3425951600074768},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet60167.2023.10365252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet60167.2023.10365252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2572916411","https://openalex.org/W2743411104","https://openalex.org/W2888251217","https://openalex.org/W2892724803","https://openalex.org/W2913462649","https://openalex.org/W2914789242","https://openalex.org/W2959217865","https://openalex.org/W2962892082","https://openalex.org/W2964294337","https://openalex.org/W2978864691","https://openalex.org/W3038151835","https://openalex.org/W3155613024","https://openalex.org/W3194513570","https://openalex.org/W3216894255","https://openalex.org/W4291653275","https://openalex.org/W4293678437","https://openalex.org/W4297374033","https://openalex.org/W4310249178","https://openalex.org/W4313066228","https://openalex.org/W4360605004","https://openalex.org/W4376118231","https://openalex.org/W6731892534","https://openalex.org/W6793764510"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2964256930","https://openalex.org/W2008790809","https://openalex.org/W2768892939","https://openalex.org/W3164408430","https://openalex.org/W4285507391","https://openalex.org/W2397240470","https://openalex.org/W2602767565","https://openalex.org/W170652726","https://openalex.org/W4292056024"],"abstract_inverted_index":{"Online":[0],"social":[1],"networks":[2],"(OSNs)":[3],"spread":[4],"information":[5,35],"worldwide":[6],"and":[7,11,27,49,105,129,136],"in":[8,67,121,159],"a":[9,41,55,141],"fast":[10],"effective":[12,158],"way.":[13],"Given":[14],"the":[15,31,46,59,71,74,173],"terrific":[16],"number":[17],"of":[18,34,43,51,69,164,172,176],"sources,":[19],"OSNs":[20,38],"can":[21,39,63,167],"be":[22,40,64,168],"used":[23],"for":[24,45,58],"event":[25],"forecasting":[26],"its":[28],"characterization.":[29],"Although":[30],"vast":[32],"majority":[33],"is":[36,157],"noise,":[37],"source":[42],"data":[44],"early":[47,82,160],"detection":[48],"characterization":[50,84],"malware":[52,72,83,101],"spreading-this":[53],"representing":[54],"significant":[56],"advantage":[57],"defense":[60],"team,":[61],"which":[62],"informed":[65],"much":[66],"advance":[68],"when":[70],"affects":[73],"system.":[75],"In":[76],"this":[77,96],"paper,":[78],"we":[79,98],"propose":[80],"an":[81],"technique":[85],"that":[86,146,154],"combines":[87],"statistical":[88],"analysis":[89],"with":[90],"Natural":[91],"Language":[92],"Processing":[93],"(NLP).":[94],"Using":[95],"approach,":[97],"analyze":[99],"various":[100,162],"behaviors":[102],"over":[103],"time":[104],"discover":[106],"their":[107,126],"characteristics,":[108],"such":[109],"as":[110,170],"target":[111,114],"system":[112],"types,":[113],"applications,":[115],"vulnerabilities,":[116],"locations,":[117],"propagation":[118],"scale,":[119],"etc.,":[120],"order":[122],"to":[123],"appropriately":[124],"prevent/detect/mitigate":[125],"malicious":[127],"activities":[128],"implement":[130],"suitable":[131],"actions":[132],"effectively.":[133],"We":[134],"tested":[135],"evaluated":[137],"our":[138,155],"approach":[139,156],"on":[140],"dataset":[142],"collected":[143],"from":[144],"Twitter":[145],"includes":[147],"widespread":[148],"ransomware":[149],"indicators.":[150],"The":[151],"results":[152],"show":[153],"characterizing":[161],"types":[163],"malware,":[165],"thus":[166],"considered":[169],"one":[171],"first":[174],"line":[175],"defense.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
