{"id":"https://openalex.org/W2887324343","doi":"https://doi.org/10.1109/icc.2018.8422083","title":"Modeling Malware as a Language","display_name":"Modeling Malware as a Language","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2887324343","doi":"https://doi.org/10.1109/icc.2018.8422083","mag":"2887324343"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422083","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007695262","display_name":"Yara Abu Awad","orcid":"https://orcid.org/0000-0003-1166-5000"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yara Awad","raw_affiliation_strings":["Department of Computer Science, Boston University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043344581","display_name":"Mohamed Nassar","orcid":"https://orcid.org/0000-0001-8857-4436"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Mohamed Nassar","raw_affiliation_strings":["Department of Computer Science, American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108526386","display_name":"Ha\u0131\u0308dar Safa","orcid":null},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Haidar Safa","raw_affiliation_strings":["Department of Computer Science, American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007695262"],"corresponding_institution_ids":["https://openalex.org/I111088046"],"apc_list":null,"apc_paid":null,"fwci":2.985,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.9243681,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9275075793266296},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.857767641544342},{"id":"https://openalex.org/keywords/word2vec","display_name":"Word2vec","score":0.6038157343864441},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5667930841445923},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5619720220565796},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.5147988200187683},{"id":"https://openalex.org/keywords/closeness","display_name":"Closeness","score":0.4893872141838074},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4804379642009735},{"id":"https://openalex.org/keywords/distributional-semantics","display_name":"Distributional semantics","score":0.44281861186027527},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.438279390335083},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41100144386291504},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35004812479019165},{"id":"https://openalex.org/keywords/semantic-similarity","display_name":"Semantic similarity","score":0.3036896586418152},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20737895369529724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1559424102306366},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.07722574472427368}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9275075793266296},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.857767641544342},{"id":"https://openalex.org/C2776461190","wikidata":"https://www.wikidata.org/wiki/Q22673982","display_name":"Word2vec","level":3,"score":0.6038157343864441},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5667930841445923},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5619720220565796},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.5147988200187683},{"id":"https://openalex.org/C2779545769","wikidata":"https://www.wikidata.org/wiki/Q5135364","display_name":"Closeness","level":2,"score":0.4893872141838074},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4804379642009735},{"id":"https://openalex.org/C2778828372","wikidata":"https://www.wikidata.org/wiki/Q5283209","display_name":"Distributional semantics","level":3,"score":0.44281861186027527},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.438279390335083},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41100144386291504},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35004812479019165},{"id":"https://openalex.org/C130318100","wikidata":"https://www.wikidata.org/wiki/Q2268914","display_name":"Semantic similarity","level":2,"score":0.3036896586418152},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20737895369529724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1559424102306366},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.07722574472427368},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc.2018.8422083","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.newhaven.edu:electricalcomputerengineering-facpubs-1114","is_oa":false,"landing_page_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8422083","pdf_url":null,"source":{"id":"https://openalex.org/S4377196522","display_name":"Digital Commons - New Heaven (University of New Haven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40253897","host_organization_name":"University of New Haven","host_organization_lineage":["https://openalex.org/I40253897"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electrical & Computer Engineering and Computer Science Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W168564468","https://openalex.org/W658020064","https://openalex.org/W1482612322","https://openalex.org/W1495745096","https://openalex.org/W1581009051","https://openalex.org/W1614298861","https://openalex.org/W1670263352","https://openalex.org/W1851403712","https://openalex.org/W1987684126","https://openalex.org/W2010065958","https://openalex.org/W2057787526","https://openalex.org/W2084979543","https://openalex.org/W2099053789","https://openalex.org/W2111038628","https://openalex.org/W2132874238","https://openalex.org/W2136255210","https://openalex.org/W2138644293","https://openalex.org/W2144112223","https://openalex.org/W2153579005","https://openalex.org/W2164463255","https://openalex.org/W2165612380","https://openalex.org/W2950577311","https://openalex.org/W4294170691","https://openalex.org/W6606906144","https://openalex.org/W6621906925","https://openalex.org/W6629849569","https://openalex.org/W6635142148","https://openalex.org/W6638913510","https://openalex.org/W6680370740","https://openalex.org/W6682691769"],"related_works":["https://openalex.org/W2294271284","https://openalex.org/W3107848922","https://openalex.org/W2556436093","https://openalex.org/W2949530433","https://openalex.org/W3034938332","https://openalex.org/W3046869600","https://openalex.org/W1230873221","https://openalex.org/W4387800396","https://openalex.org/W2341557172","https://openalex.org/W4301121195"],"abstract_inverted_index":{"Malware":[0],"detection":[1,30],"and":[2,24,31,69,113,157,202],"malware":[3,10,16,29,51,56,65,95,107,136],"construction":[4],"are":[5,138],"evolving":[6],"in":[7,76,141,206],"parallel.":[8],"As":[9],"authors":[11],"incorporate":[12,21],"evasive":[13,39],"techniques":[14,27],"into":[15,28,86,98],"construction,":[17],"antivirus":[18],"software":[19],"developers":[20],"new":[22,47],"static":[23,50],"dynamic":[25],"analysis":[26,57],"classification":[32,88,190],"with":[33],"the":[34,71,110,146,162,174],"aim":[35],"of":[36,73,78,94,109,119,127,154,164,192],"thwarting":[37],"such":[38,155],"techniques.":[40],"In":[41],"this":[42,83],"paper,":[43],"we":[44,101,187,199],"propose":[45,63],"a":[46,67,87,91,122,128,133,151,159,189],"approach":[48,125],"to":[49,54,121,149,194],"analysis,":[52],"aiming":[53],"treat":[55],"as":[58,66,161],"natural":[59],"language":[60,68],"analysis.":[61],"We":[62,81,144,169,196],"modeling":[64],"assess":[70],"feasibility":[72],"finding":[74],"semantics":[75,205],"instances":[77,96,108,116,137],"that":[79,142,198],"language.":[80,143],"concretize":[82],"abstract":[84],"problem":[85],"task.":[89],"Given":[90],"large":[92],"dataset":[93],"categorized":[97],"9":[99],"classes,":[100],"isolate":[102],"strong":[103],"semantic":[104,165],"similarities":[105],"between":[106,167],"same":[111],"class":[112],"classify":[114,170],"unknown":[115],"by":[117,172],"strength":[118],"similarity":[120],"class.":[123],"Our":[124],"consists":[126],"proposed":[129],"method":[130],"for":[131],"defining":[132],"malware-language,":[134],"where":[135],"documents":[139,156],"written":[140],"use":[145],"word2vec":[147],"model":[148,182],"generate":[150],"computational":[152],"representation":[153],"choose":[158],"document-distance":[160],"measure":[163],"closeness":[166],"them.":[168],"malware-documents":[171],"applying":[173],"k":[175],"nearest":[176],"neighbors":[177],"algorithm":[178],"(kNN).":[179],"Validating":[180],"our":[181],"using":[183],"leave-one-out":[184],"cross":[185],"validation,":[186],"record":[188],"accuracy":[191],"up":[193],"98%.":[195],"conclude":[197],"can":[200],"find,":[201],"ultimately":[203],"manipulate":[204],"malware.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
