{"id":"https://openalex.org/W4390188307","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","title":"Enhancing Malware Detection Using \u201cGenetic Markers\u201d and Machine Learning","display_name":"Enhancing Malware Detection Using \u201cGenetic Markers\u201d and Machine Learning","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188307","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025037378","display_name":"Jae-Hyun Lim","orcid":"https://orcid.org/0000-0001-7169-8969"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jaehyun Lim","raw_affiliation_strings":["Saratoga High School, Silicon Valley Cybersecurity Institute,CA,USA","Saratoga High School, Silicon Valley Cybersecurity Institute, CA, USA"],"affiliations":[{"raw_affiliation_string":"Saratoga High School, Silicon Valley Cybersecurity Institute,CA,USA","institution_ids":[]},{"raw_affiliation_string":"Saratoga High School, Silicon Valley Cybersecurity Institute, CA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007268081","display_name":"Quang Duy Tran","orcid":"https://orcid.org/0000-0002-3639-2179"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Quang Duy Tran","raw_affiliation_strings":["San Jose State University,Department of Computer Science,CA,USA","Department of Computer Science, San Jose State University, CA, USA"],"affiliations":[{"raw_affiliation_string":"San Jose State University,Department of Computer Science,CA,USA","institution_ids":["https://openalex.org/I51504820"]},{"raw_affiliation_string":"Department of Computer Science, San Jose State University, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074325073","display_name":"Fabio Di Troia","orcid":"https://orcid.org/0000-0003-2355-7146"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]},{"id":"https://openalex.org/I4210148712","display_name":"Silicon Valley University","ror":"https://ror.org/04jk6hn97","country_code":"US","type":"education","lineage":["https://openalex.org/I4210148712"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fabio Di Troia","raw_affiliation_strings":["Silicon Valley Cybersecurity Institute, San Jose State University,CA,USA","Silicon Valley Cybersecurity Institute, San Jose State University, CA, USA"],"affiliations":[{"raw_affiliation_string":"Silicon Valley Cybersecurity Institute, San Jose State University,CA,USA","institution_ids":["https://openalex.org/I4210148712","https://openalex.org/I51504820"]},{"raw_affiliation_string":"Silicon Valley Cybersecurity Institute, San Jose State University, CA, USA","institution_ids":["https://openalex.org/I4210148712","https://openalex.org/I51504820"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025037378"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19267606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"0975","last_page":"0977"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.9636825323104858},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9374237060546875},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8143092393875122},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6958446502685547},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6786714196205139},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6041742563247681},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5379185676574707},{"id":"https://openalex.org/keywords/genetic-programming","display_name":"Genetic programming","score":0.4886956512928009},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.43206924200057983},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2044433355331421},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09369444847106934}],"concepts":[{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.9636825323104858},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9374237060546875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8143092393875122},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6958446502685547},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6786714196205139},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6041742563247681},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5379185676574707},{"id":"https://openalex.org/C110332635","wikidata":"https://www.wikidata.org/wiki/Q629498","display_name":"Genetic programming","level":2,"score":0.4886956512928009},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.43206924200057983},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2044433355331421},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09369444847106934},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2095577883","https://openalex.org/W2171035369","https://openalex.org/W2793223501","https://openalex.org/W2964242288","https://openalex.org/W2996806689","https://openalex.org/W3005941094","https://openalex.org/W3007032623","https://openalex.org/W3007481080","https://openalex.org/W3181531606","https://openalex.org/W4224305508","https://openalex.org/W4317349506"],"related_works":["https://openalex.org/W2900526031","https://openalex.org/W4382794599","https://openalex.org/W4296272594","https://openalex.org/W2903602818","https://openalex.org/W36091977","https://openalex.org/W4388157251","https://openalex.org/W4360993664","https://openalex.org/W2384735743","https://openalex.org/W2465235098","https://openalex.org/W2470029541"],"abstract_inverted_index":{"Despite":[0],"the":[1,44,70,77,122,125],"advanced":[2],"techniques":[3,120],"of":[4,22,47,69,72,128],"malware":[5,23,34,49,60,64,78,98,118,130],"detection":[6,35,111],"using":[7,87],"machine":[8],"learning":[9],"and":[10,26,91,113],"deep":[11],"learning,":[12],"our":[13,102,104],"community":[14],"has":[15,66],"been":[16],"still":[17],"suffering":[18],"from":[19],"new":[20,32,105],"variants":[21],"in":[24],"networks":[25],"systems.":[27],"This":[28,74],"paper":[29,75],"proposes":[30],"a":[31,39,58],"NLP-based":[33],"method":[36,123],"to":[37,56,95],"generate":[38],"genetic":[40,53],"marker":[41],"by":[42,86],"capturing":[43],"semantic":[45],"behaviors":[46],"each":[48,63,84,97,129],"family.":[50,99],"The":[51],"unique":[52],"markers":[54],"aim":[55],"identify":[57,96],"specific":[59],"family":[61,65,85],"since":[62,121],"different":[67,93],"characteristics":[68],"distribution":[71],"opcodes.":[73],"evaluates":[76],"behavior":[79],"based":[80],"on":[81,101],"opcodes":[82],"for":[83],"an":[88],"NLP":[89],"model":[90],"creates":[92],"templates":[94],"Based":[100],"experiments,":[103],"approach":[106],"achieved":[107],"more":[108],"than":[109],"99%":[110],"rates":[112],"is":[114],"fault-tolerant":[115],"against":[116],"various":[117],"obfuscation":[119],"captures":[124],"meaningful":[126],"context":[127],"sample.":[131]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
