{"id":"https://openalex.org/W4404032162","doi":"https://doi.org/10.1109/icccnt61001.2024.10724407","title":"Deep Learning-Based Malware Detection","display_name":"Deep Learning-Based Malware Detection","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404032162","doi":"https://doi.org/10.1109/icccnt61001.2024.10724407"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724407","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113925852","display_name":"S. Sai Mohan","orcid":null},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sumisha Mohan","raw_affiliation_strings":["SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203"],"affiliations":[{"raw_affiliation_string":"SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087501075","display_name":"S. Babu","orcid":"https://orcid.org/0000-0002-7446-0283"},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Babu","raw_affiliation_strings":["SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203"],"affiliations":[{"raw_affiliation_string":"SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102066567","display_name":"Bharat C. Sahoo","orcid":"https://orcid.org/0000-0002-9866-5988"},"institutions":[{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bhumika Sahoo","raw_affiliation_strings":["SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203"],"affiliations":[{"raw_affiliation_string":"SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203","institution_ids":["https://openalex.org/I145286018"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113925852"],"corresponding_institution_ids":["https://openalex.org/I145286018"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21937022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8303719162940979},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7515411376953125},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5802804827690125},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5588142275810242},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2935423254966736}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8303719162940979},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7515411376953125},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5802804827690125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5588142275810242},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2935423254966736}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724407","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W4400762160","https://openalex.org/W4408504007","https://openalex.org/W6611257893","https://openalex.org/W6727249380"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W4321369474","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W4323565446"],"abstract_inverted_index":{"Machine":[0],"learning":[1,15,28,31,146,240,285],"has":[2],"experienced":[3],"remarkable":[4],"growth":[5],"in":[6,13,167,219,286],"recent":[7],"years,":[8],"largely":[9],"propelled":[10],"by":[11,72],"advances":[12],"deep":[14,27,145,195,220,250],"methodologies.":[16],"This":[17,170],"paper":[18,141,189,256,275],"offers":[19],"an":[20,138],"in-depth":[21],"exploration":[22],"of":[23,26,40,48,93,122,137,238,247,283,295],"the":[24,37,69,120,134,188,191,236,245,260,274,278,287,293],"integration":[25],"into":[29,143],"machine":[30,49,239,248,284],"tasks":[32],"across":[33,265],"various":[34,123],"fields,":[35],"including":[36,126,148,222],"critical":[38],"domain":[39],"malware":[41,124,168,181,253],"analysis.":[42,169],"Deep":[43],"learning,":[44,50,196,221,226,249,251],"a":[45,230],"specialized":[46],"branch":[47],"leverages":[51],"neural":[52,150,154],"networks":[53,151,155,161],"with":[54,194,229],"multiple":[55],"layers":[56],"to":[57,87,101,113,132,211,258,277],"automatically":[58],"extract":[59],"data":[60,106,200],"representations":[61],"and":[62,104,130,158,163,174,183,203,217,224,241,252,268,281,292],"features.":[63],"A":[64],"pressing":[65],"concern":[66],"today":[67],"is":[68,119],"threat":[70],"posed":[71],"malicious":[73],"software,":[74],"which":[75],"often":[76],"employs":[77],"methods":[78],"such":[79,109,197],"as":[80,110,198,206,208],"generating":[81],"invalid":[82],"links":[83],"that":[84],"direct":[85],"users":[86],"compromised":[88],"sites":[89],"or":[90],"launching":[91],"Denial":[92],"Service":[94],"(DDoS)":[95],"attacks.":[96],"These":[97],"cyber":[98,290],"attacks":[99],"aim":[100],"steal":[102],"personal":[103],"sensitive":[105],"using":[107],"techniques":[108],"0-day":[111],"exploits":[112],"facilitate":[114],"rapid":[115],"replication.":[116],"Malware":[117],"analysis":[118,176],"study":[121],"types,":[125],"viruses,":[127],"worms,":[128],"Trojans,":[129],"rootkits,":[131],"assess":[133],"potential":[135,209,262],"impact":[136,234],"infection.":[139],"The":[140],"delves":[142],"key":[144],"architectures,":[147],"convolutional":[149],"(CNNs),":[152],"recurrent":[153],"(RNNs),":[156],"transformers,":[157],"generative":[159],"adversarial":[160],"(GANs),":[162],"their":[164,233],"specific":[165],"roles":[166],"involves":[171],"both":[172],"static":[173],"dynamic":[175],"methods,":[177],"essential":[178],"for":[179],"understanding":[180],"behavior":[182],"mitigating":[184],"its":[185],"effects.":[186],"Moreover,":[187],"discusses":[190],"challenges":[192],"associated":[193],"overfitting,":[199],"availability,":[201],"interpretability,":[202],"computational":[204],"demands,":[205],"well":[207],"solutions":[210],"address":[212],"these":[213,272],"issues.":[214],"Emerging":[215],"trends":[216],"innovations":[218],"self-supervised":[223],"federated":[225],"are":[227],"highlighted,":[228],"focus":[231],"on":[232,235],"future":[237],"cybersecurity.":[242],"By":[243],"examining":[244],"intersection":[246],"analysis,":[254],"this":[255],"aims":[257],"showcase":[259],"transformative":[261],"they":[263],"offer":[264],"different":[266],"industries":[267],"scientific":[269],"disciplines.":[270],"Through":[271],"insights,":[273],"contributes":[276],"ongoing":[279],"development":[280],"application":[282],"fight":[288],"against":[289],"threats":[291],"pursuit":[294],"secure,":[296],"efficient":[297],"digital":[298],"environments.":[299]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
