{"id":"https://openalex.org/W3082865669","doi":"https://doi.org/10.1109/fuzz48607.2020.9177636","title":"Fuzzy-Import Hashing: A Malware Analysis Approach","display_name":"Fuzzy-Import Hashing: A Malware Analysis Approach","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3082865669","doi":"https://doi.org/10.1109/fuzz48607.2020.9177636","mag":"3082865669"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz48607.2020.9177636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz48607.2020.9177636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://publications.aston.ac.uk/id/eprint/42063/1/FUZZ_IEEE_20_Fuzzy_Import_Hashing.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["School of Computing, University of Portsmouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Portsmouth, United Kingdom","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["School of Computing, University of Portsmouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Portsmouth, United Kingdom","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008471645","display_name":"Nick Savage","orcid":"https://orcid.org/0000-0001-9391-5100"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nick Savage","raw_affiliation_strings":["School of Computing, University of Portsmouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Portsmouth, United Kingdom","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065079117","display_name":"Longzhi Yang","orcid":"https://orcid.org/0000-0003-2115-4909"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Longzhi Yang","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049097389","display_name":"Tossapon Boongoen","orcid":"https://orcid.org/0009-0009-4849-8948"},"institutions":[{"id":"https://openalex.org/I34002243","display_name":"Mae Fah Luang University","ror":"https://ror.org/00mwhaw71","country_code":"TH","type":"education","lineage":["https://openalex.org/I34002243"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Tossapon Boongoen","raw_affiliation_strings":["School of Information Technology, Mae Fah Luang University, Thailand"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Mae Fah Luang University, Thailand","institution_ids":["https://openalex.org/I34002243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064389509","display_name":"Natthakan Iam-On","orcid":"https://orcid.org/0000-0002-9060-5331"},"institutions":[{"id":"https://openalex.org/I34002243","display_name":"Mae Fah Luang University","ror":"https://ror.org/00mwhaw71","country_code":"TH","type":"education","lineage":["https://openalex.org/I34002243"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Natthakan Iam-On","raw_affiliation_strings":["School of Information Technology, Mae Fah Luang University, Thailand"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Mae Fah Luang University, Thailand","institution_ids":["https://openalex.org/I34002243"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5089628794"],"corresponding_institution_ids":["https://openalex.org/I63072094"],"apc_list":null,"apc_paid":null,"fwci":1.8256,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86033629,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8075572848320007},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7954597473144531},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7529775500297546},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5095317959785461},{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.49352848529815674},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4722687005996704},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.44458431005477905},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40483736991882324},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37361711263656616},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32564496994018555}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8075572848320007},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7954597473144531},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7529775500297546},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5095317959785461},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.49352848529815674},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4722687005996704},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.44458431005477905},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40483736991882324},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37361711263656616},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32564496994018555},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/fuzz48607.2020.9177636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz48607.2020.9177636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},{"id":"pmh:oai:nrl.northumbria.ac.uk:44692","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Book Section"},{"id":"pmh:oai:publications.aston.ac.uk:42063","is_oa":true,"landing_page_url":"https://publications.aston.ac.uk/view/author/aa4db887c0bf748e844ec405f73f8819.html>,","pdf_url":"https://publications.aston.ac.uk/id/eprint/42063/1/FUZZ_IEEE_20_Fuzzy_Import_Hashing.pdf","source":{"id":"https://openalex.org/S4306400483","display_name":"Aston Publications Explorer (Aston University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169199633","host_organization_name":"Aston University","host_organization_lineage":["https://openalex.org/I169199633"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},{"id":"pmh:oai:researchportal.port.ac.uk:publications/9e22c28c-1290-4879-8f08-9ecef825b523","is_oa":false,"landing_page_url":"https://researchportal.port.ac.uk/portal/en/publications/fuzzyimport-hashing(9e22c28c-1290-4879-8f08-9ecef825b523).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306401774","display_name":"Portsmouth Research Portal (University of Portsmouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63072094","host_organization_name":"University of Portsmouth","host_organization_lineage":["https://openalex.org/I63072094"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:publications.aston.ac.uk:42063","is_oa":true,"landing_page_url":"https://publications.aston.ac.uk/view/author/aa4db887c0bf748e844ec405f73f8819.html>,","pdf_url":"https://publications.aston.ac.uk/id/eprint/42063/1/FUZZ_IEEE_20_Fuzzy_Import_Hashing.pdf","source":{"id":"https://openalex.org/S4306400483","display_name":"Aston Publications Explorer (Aston University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169199633","host_organization_name":"Aston University","host_organization_lineage":["https://openalex.org/I169199633"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3082865669.pdf","grobid_xml":"https://content.openalex.org/works/W3082865669.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1549130775","https://openalex.org/W1979260289","https://openalex.org/W1995450389","https://openalex.org/W2083331665","https://openalex.org/W2120688485","https://openalex.org/W2164215197","https://openalex.org/W2167428023","https://openalex.org/W2168154523","https://openalex.org/W2216493166","https://openalex.org/W2520938204","https://openalex.org/W2944304051","https://openalex.org/W2945500821","https://openalex.org/W3004894946","https://openalex.org/W3007286727","https://openalex.org/W3008617927","https://openalex.org/W6684316442","https://openalex.org/W6688795101"],"related_works":["https://openalex.org/W3191226418","https://openalex.org/W2357749344","https://openalex.org/W1539823648","https://openalex.org/W2362200800","https://openalex.org/W4323356230","https://openalex.org/W4290078996","https://openalex.org/W4372352523","https://openalex.org/W3113783116","https://openalex.org/W1579156572","https://openalex.org/W4387328388"],"abstract_inverted_index":{"Malware":[0],"has":[1],"remained":[2],"a":[3,11,39,166],"consistent":[4],"threat":[5],"since":[6],"its":[7],"emergence,":[8],"growing":[9],"into":[10],"plethora":[12],"of":[13,30,50,60,64,72,80,89,98,109,146,160,174,188,215],"types":[14],"and":[15,34,36,48,91,101,112,124,134,157,177,185,210,218],"in":[16,86,95,152],"large":[17,78],"numbers.":[18],"In":[19],"recent":[20],"years,":[21],"numerous":[22],"new":[23,31,51],"malware":[24,52,65,74,103,189,208],"variants":[25],"have":[26,37,131],"enabled":[27],"the":[28,46,57,61,70,77,87,96,110,144,154,161,172,182,202,206],"identification":[29],"attack":[32],"surfaces":[33],"vectors,":[35],"become":[38],"major":[40],"challenge":[41],"to":[42,55,68,180],"security":[43],"experts,":[44],"driving":[45],"enhancement":[47],"development":[49],"analysis":[53,66,97,119],"techniques":[54,106,114,214],"contain":[56],"contagion.":[58],"One":[59],"preliminary":[62,118],"steps":[63],"is":[67,171],"remove":[69],"abundance":[71],"counterfeit":[73],"samples":[75,209],"from":[76],"collection":[79],"suspicious":[81],"samples.":[82,104],"This":[83,163,191],"process":[84],"assists":[85],"management":[88],"man":[90],"machine":[92],"resources":[93],"effectively":[94],"both":[99,128],"unknown":[100],"likely":[102],"Hashing":[105],"are":[107,199],"one":[108],"fastest":[111],"efficient":[113],"for":[115],"performing":[116],"this":[117],"such":[120],"as":[121],"fuzzy":[122,175,216],"hashing":[123,129,168,176,179,194,217],"import":[125,178,219],"hashing.":[126,220],"However,":[127],"methods":[130,149],"their":[132,141],"limitations":[133],"they":[135],"may":[136,150],"not":[137],"be":[138],"effective":[139],"on":[140,205],"own,":[142],"instead":[143],"combination":[145,173],"two":[147],"distinctive":[148],"assist":[151],"improving":[153],"detection":[155,183],"accuracy":[156,184],"overall":[158,186],"performance":[159,187],"analysis.":[162,190],"paper":[164],"proposes":[165],"Fuzzy-Import":[167,193],"technique":[169],"which":[170,198],"improve":[181],"proposed":[192],"offers":[195],"several":[196],"benefits":[197],"demonstrated":[200],"through":[201],"experimentation":[203],"performed":[204],"collected":[207],"compared":[211],"against":[212],"stand-alone":[213]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
