{"id":"https://openalex.org/W2944012984","doi":"https://doi.org/10.1109/cybersa.2019.8899533","title":"Efficient and Interpretable Real-Time Malware Detection Using Random-Forest","display_name":"Efficient and Interpretable Real-Time Malware Detection Using Random-Forest","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2944012984","doi":"https://doi.org/10.1109/cybersa.2019.8899533","mag":"2944012984"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2019.8899533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899533","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprints.uwe.ac.uk/40289/","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014349746","display_name":"Alan Mills","orcid":"https://orcid.org/0000-0003-4187-2270"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Alan Mills","raw_affiliation_strings":["Computer Science Research Centre, University of the West of England,Bristol,UK","Computer Science Research Centre, University of the West of England, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England,Bristol,UK","institution_ids":["https://openalex.org/I178535277"]},{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England, Bristol, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025514379","display_name":"Theodoros Spyridopoulos","orcid":"https://orcid.org/0000-0001-7575-9909"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Theodoros Spyridopoulos","raw_affiliation_strings":["Computer Science Research Centre, University of the West of England,Bristol,UK","Computer Science Research Centre, University of the West of England, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England,Bristol,UK","institution_ids":["https://openalex.org/I178535277"]},{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England, Bristol, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053235466","display_name":"Phil Legg","orcid":"https://orcid.org/0000-0003-3460-5609"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Phil Legg","raw_affiliation_strings":["Computer Science Research Centre, University of the West of England,Bristol,UK","Computer Science Research Centre, University of the West of England, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England,Bristol,UK","institution_ids":["https://openalex.org/I178535277"]},{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England, Bristol, UK","institution_ids":["https://openalex.org/I178535277"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014349746"],"corresponding_institution_ids":["https://openalex.org/I178535277"],"apc_list":null,"apc_paid":null,"fwci":2.3375,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.89166159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.92332923412323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8501825332641602},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7384722232818604},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.7348463535308838},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5650135278701782},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5386689901351929},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45996007323265076},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3885079324245453},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38795411586761475},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3481595516204834},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24611443281173706}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.92332923412323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8501825332641602},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7384722232818604},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.7348463535308838},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5650135278701782},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5386689901351929},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45996007323265076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3885079324245453},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38795411586761475},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3481595516204834},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24611443281173706}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cybersa.2019.8899533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899533","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.uwe.ac.uk:40289","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/40289/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":{"id":"pmh:oai:eprints.uwe.ac.uk:40289","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/40289/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},"sustainable_development_goals":[{"display_name":"Life in Land","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1545528966","https://openalex.org/W1893133781","https://openalex.org/W2036575863","https://openalex.org/W2085807744","https://openalex.org/W2307930854","https://openalex.org/W2508015754","https://openalex.org/W2584414817","https://openalex.org/W2617675595","https://openalex.org/W2747715470","https://openalex.org/W2891073441","https://openalex.org/W2900633536","https://openalex.org/W6754564904"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W4390569940","https://openalex.org/W2888392564","https://openalex.org/W4361193272","https://openalex.org/W4310278675","https://openalex.org/W4388422664","https://openalex.org/W2806259446","https://openalex.org/W2963326959","https://openalex.org/W4312407344","https://openalex.org/W4361806667"],"abstract_inverted_index":{"Malicious":[0],"software,":[1],"often":[2],"described":[3],"as":[4,106],"malware,":[5],"is":[6,49,173],"one":[7],"of":[8,43,62,70,83,114,159],"the":[9,60,81,126],"greatest":[10],"threats":[11],"to":[12,19,24,36,73,123,132,168],"modern":[13],"computer":[14],"systems,":[15,72],"and":[16,26,29,45,48,56,68],"attackers":[17],"continue":[18],"develop":[20],"more":[21],"sophisticated":[22],"methods":[23,33],"access":[25],"compromise":[27],"data":[28],"resources.":[30],"Machine":[31],"learning":[32],"have":[34],"potential":[35],"improve":[37],"malware":[38,93],"detection":[39,46,84,94,152,157],"both":[40],"in":[41],"terms":[42],"accuracy":[44,67,150],"runtime,":[47,153],"an":[50,119,139,155],"active":[51],"area":[52],"within":[53],"academic":[54],"research":[55,63],"commercial":[57],"development.":[58],"Whilst":[59],"majority":[61],"focused":[64],"on":[65,80,102],"improving":[66],"runtime":[69],"these":[71],"date":[74],"there":[75],"has":[76],"been":[77],"little":[78],"focus":[79],"interpretability":[82,146],"results.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89],"propose":[90],"a":[91,107,129],"lightweight":[92],"system":[95,144],"called":[96],"NODENS":[97,111],"that":[98,118],"can":[99,121],"be":[100,133,169],"deployed":[101],"affordable":[103],"hardware":[104],"such":[105],"Raspberry":[108],"Pi.":[109],"Crucially,":[110],"provides":[112,145],"transparency":[113],"output":[115],"results":[116],"so":[117],"end-user":[120],"begin":[122],"examine":[124],"why":[125],"classifier":[127],"believes":[128],"software":[130],"sample":[131],"either":[134],"malicious":[135],"or":[136,151],"benign.":[137],"Using":[138],"efficient":[140],"Random-Forest":[141],"approach,":[142],"our":[143],"whilst":[147],"not":[148],"sacrificing":[149],"with":[154],"average":[156],"speed":[158],"between":[160],"3-8":[161],"seconds,":[162],"allowing":[163],"for":[164],"early":[165],"remedial":[166],"action":[167],"taken":[170],"before":[171],"damage":[172],"caused.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
