{"id":"https://openalex.org/W4404032780","doi":"https://doi.org/10.1109/icccnt61001.2024.10724079","title":"A Comprehensive Review of Natural Language Processing Techniques for Malware Detection","display_name":"A Comprehensive Review of Natural Language Processing Techniques for Malware Detection","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404032780","doi":"https://doi.org/10.1109/icccnt61001.2024.10724079"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724079","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724079","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069813052","display_name":"Nachaat Mohamed","orcid":"https://orcid.org/0000-0002-4202-1294"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nachaat Mohamed","raw_affiliation_strings":["Rabdan Academy,Homeland Ssecurity Department,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Rabdan Academy,Homeland Ssecurity Department,Abu Dhabi,UAE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5069813052"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3225,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64285714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.803674578666687},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7795181274414062},{"id":"https://openalex.org/keywords/natural-language","display_name":"Natural language","score":0.42942890524864197},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4265042543411255},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3833436965942383},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25113582611083984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.803674578666687},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7795181274414062},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.42942890524864197},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4265042543411255},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3833436965942383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25113582611083984}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724079","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724079","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2584414817","https://openalex.org/W2768073432","https://openalex.org/W2780450026","https://openalex.org/W2806534592","https://openalex.org/W2908421325","https://openalex.org/W2931858311","https://openalex.org/W2950005521","https://openalex.org/W2951146859","https://openalex.org/W2969525277","https://openalex.org/W2982413766","https://openalex.org/W3009683167","https://openalex.org/W3036491774","https://openalex.org/W3036603968","https://openalex.org/W3118888569","https://openalex.org/W3136638767","https://openalex.org/W3197120839","https://openalex.org/W4205635956","https://openalex.org/W4214835615","https://openalex.org/W4224038789","https://openalex.org/W4226079614","https://openalex.org/W4243826588","https://openalex.org/W4285114033","https://openalex.org/W4285407531","https://openalex.org/W4308531312","https://openalex.org/W4313331425","https://openalex.org/W4316658374","https://openalex.org/W4321510782","https://openalex.org/W4327499880","https://openalex.org/W4362474252","https://openalex.org/W4377704022","https://openalex.org/W4383333925","https://openalex.org/W4384302192","https://openalex.org/W4384302263","https://openalex.org/W4385190251","https://openalex.org/W4385192734","https://openalex.org/W4385192756","https://openalex.org/W4385193072"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W3204019825","https://openalex.org/W4226226396","https://openalex.org/W3153750606","https://openalex.org/W4308854837"],"abstract_inverted_index":{"In":[0],"an":[1,73],"era":[2],"marked":[3,62],"by":[4,16,87],"the":[5,37,41,81,114,125,150,162,195],"unprecedented":[6],"proliferation":[7],"of":[8,43,76,83,91,106,116,127],"cybersecurity":[9,38,120,198],"threats,":[10],"conventional":[11],"malware":[12,32,66,84],"detection":[13,67,102],"paradigms":[14],"characterized":[15],"signature-based":[17],"and":[18,30,112,137,147,155,167,190,197],"heuristic":[19],"methodologies":[20,78],"are":[21],"encountering":[22],"limitations":[23,154],"in":[24,36,57,119],"their":[25,142],"ability":[26],"to":[27,80,169,176,186],"address":[28],"zero-day":[29],"polymorphic":[31],"variants.":[33],"This":[34,122],"lacuna":[35],"landscape":[39],"necessitates":[40],"exploration":[42],"innovative,":[44],"efficacious":[45],"approaches.":[46],"Natural":[47],"Language":[48],"Processing":[49],"(NLP)":[50],"has":[51],"emerged":[52],"as":[53,131,178],"a":[54,61,88,170,179],"formidable":[55],"technique":[56],"this":[58,183],"arena,":[59],"exhibiting":[60],"capability":[63],"for":[64,164],"enhancing":[65],"frameworks.":[68],"The":[69],"current":[70,188],"manuscript":[71,151],"offers":[72],"exhaustive":[74],"review":[75,123,184],"NLP":[77,128,196],"applied":[79],"domain":[82],"detection,":[85],"substantiated":[86],"rigorous":[89],"categorization":[90],"extant":[92],"literature.":[93],"Empirical":[94],"evidence":[95],"suggests":[96],"that":[97],"NLP-driven":[98],"techniques":[99,129],"have":[100],"realized":[101],"accuracy":[103],"rates":[104],"upwards":[105],"98.7%,":[107],"thereby":[108],"outclassing":[109],"traditional":[110],"methods":[111],"underscoring":[113],"efficacy":[115],"linguistic":[117],"analysis":[118],"applications.":[121],"delineates":[124,156],"multitude":[126],"such":[130],"tokenization,":[132],"Named":[133],"Entity":[134],"Recognition":[135],"(NER),":[136],"sentiment":[138],"analysis,":[139],"whilst":[140],"evaluating":[141],"operational":[143],"practicability,":[144],"computational":[145],"efficiency,":[146],"scalability.":[148],"Furthermore,":[149],"elucidates":[152],"existing":[153],"future":[157],"research":[158,199],"vectors,":[159],"notably":[160],"emphasizing":[161],"requisite":[163],"real-time":[165],"analytics":[166],"adaptability":[168],"dynamically":[171],"evolving":[172],"threat":[173],"landscape.":[174],"Intended":[175],"serve":[177],"seminal":[180],"reference":[181],"point,":[182],"aims":[185],"synthesize":[187],"knowledge":[189],"foster":[191],"interdisciplinary":[192],"dialogue":[193],"between":[194],"communities.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
