{"id":"https://openalex.org/W2897434528","doi":"https://doi.org/10.1109/fuzz-ieee.2018.8491521","title":"Not so Crisp, Malware! Fuzzy Classification of Android Malware Classes","display_name":"Not so Crisp, Malware! Fuzzy Classification of Android Malware Classes","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2897434528","doi":"https://doi.org/10.1109/fuzz-ieee.2018.8491521","mag":"2897434528"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz-ieee.2018.8491521","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2018.8491521","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023695406","display_name":"Francesco Mercaldo","orcid":"https://orcid.org/0000-0002-9425-1657"},"institutions":[{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesco Mercaldo","raw_affiliation_strings":["Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043827499","display_name":"Andrea Saracino","orcid":"https://orcid.org/0000-0001-8149-9322"},"institutions":[{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Saracino","raw_affiliation_strings":["Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023695406"],"corresponding_institution_ids":["https://openalex.org/I4210130157"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11609096,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9279919862747192},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8010550141334534},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7568986415863037},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.7090634107589722},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.6896325349807739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5501846671104431},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5003395080566406},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.4556184411048889},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.45413973927497864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35408076643943787},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24235323071479797},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18911245465278625}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9279919862747192},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8010550141334534},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7568986415863037},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.7090634107589722},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.6896325349807739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5501846671104431},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5003395080566406},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.4556184411048889},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.45413973927497864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35408076643943787},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24235323071479797},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18911245465278625}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzz-ieee.2018.8491521","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2018.8491521","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1486147991","https://openalex.org/W1513366687","https://openalex.org/W1751895447","https://openalex.org/W1915012771","https://openalex.org/W1969733464","https://openalex.org/W1974131586","https://openalex.org/W1978762841","https://openalex.org/W2018382289","https://openalex.org/W2075360618","https://openalex.org/W2092942461","https://openalex.org/W2097994458","https://openalex.org/W2104839588","https://openalex.org/W2109518982","https://openalex.org/W2114275288","https://openalex.org/W2122672392","https://openalex.org/W2132661907","https://openalex.org/W2142827986","https://openalex.org/W2164400088","https://openalex.org/W2168103835","https://openalex.org/W2187419566","https://openalex.org/W2324464293","https://openalex.org/W2461651791","https://openalex.org/W2562302636","https://openalex.org/W2600659481","https://openalex.org/W2608570228","https://openalex.org/W2724122170","https://openalex.org/W2750032202","https://openalex.org/W2779814706","https://openalex.org/W4237049557","https://openalex.org/W4250664506","https://openalex.org/W4285719527","https://openalex.org/W6630540995","https://openalex.org/W6644855837","https://openalex.org/W6676999791","https://openalex.org/W6679643976","https://openalex.org/W6719259792","https://openalex.org/W6743259415","https://openalex.org/W6747295137"],"related_works":["https://openalex.org/W2717179875","https://openalex.org/W3200508744","https://openalex.org/W4249118297","https://openalex.org/W2311926078","https://openalex.org/W2782775281","https://openalex.org/W4312234627","https://openalex.org/W2026973889","https://openalex.org/W2067547021","https://openalex.org/W2810666735","https://openalex.org/W2968504645"],"abstract_inverted_index":{"Mobile":[0],"devices":[1],"have":[2],"been":[3],"spreading":[4],"at":[5],"great":[6],"rate":[7],"in":[8,25,83,121,179,206],"recent":[9],"years.":[10],"Not":[11],"only":[12],"smartphone,":[13],"but":[14],"also":[15],"tablets":[16],"and":[17,38,49,90,173,191],"IoT":[18],"devices,":[19],"are":[20,35,72,161],"gaining":[21],"an":[22,147],"increasingly":[23],"place":[24],"our":[26,47],"everyday":[27],"lives.":[28],"This":[29],"is":[30,58,129,198],"the":[31,43,62,117,195,202,211],"reason":[32],"why":[33],"attackers":[34],"developing":[36],"more":[37,39,88],"aggressive":[40,89],"techniques":[41],"with":[42],"aim":[44],"to":[45,79,85,109,131,154,177,200],"exfiltrate":[46],"sensitive":[48],"private":[50],"information.":[51],"As":[52,96],"many":[53],"studies":[54],"demonstrate,":[55],"mobile":[56,102,118],"malware":[57,70,103,156,180],"not":[59],"developed":[60],"from":[61],"scratch,":[63],"as":[64,163],"a":[65,137,164,170,174,184],"matter":[66,165],"of":[67,98,116,139,166,186,208,210],"fact":[68,167],"new":[69,77],"samples":[71,212],"usually":[73],"generated":[74],"by":[75,92],"adding":[76],"functionalities":[78],"existing":[80],"malicious":[81,111,119,134,204],"payloads,":[82,120],"order":[84],"make":[86],"it":[87],"undetectable":[91],"current":[93,101],"antimalware":[94],"technologies.":[95],"result":[97],"this":[99,114,122],"process,":[100],"exhibits":[104,151],"several":[105,203],"behaviors":[106,152,205],"merged":[107],"belonging":[108,153],"different":[110,155],"families.":[112],"Considering":[113],"nature":[115],"paper":[123],"we":[124,141,158,168,192],"explore":[125],"whether":[126,146],"fuzzy":[127],"logic":[128],"helpful":[130],"(i)":[132],"classify":[133],"applications":[135],"into":[136],"set":[138],"classes":[140,157],"defined":[142],"and,":[143],"(ii)":[144],"identify":[145,201],"application":[148],"under":[149,213],"analysis":[150],"defined.":[159],"Results":[160],"encouraging,":[162],"obtain":[169],"weight":[171],"precision":[172],"recall":[175],"equal":[176],"0.975":[178],"class":[181],"identification":[182],"on":[183],"dataset":[185],"5332":[187],"real-world":[188],"Android":[189],"malware,":[190],"demonstrate":[193],"that":[194],"proposed":[196],"method":[197],"able":[199],"terms":[207],"percentage":[209],"analysis.":[214]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
