{"id":"https://openalex.org/W4404032235","doi":"https://doi.org/10.1109/icccnt61001.2024.10725427","title":"A Deep Learning Framework for Malware Classification using NLP Techniques","display_name":"A Deep Learning Framework for Malware Classification using NLP Techniques","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404032235","doi":"https://doi.org/10.1109/icccnt61001.2024.10725427"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10725427","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10725427","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023048105","display_name":"Bishwajit Prasad Gond","orcid":"https://orcid.org/0000-0003-3640-0463"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bishwajit Prasad Gond","raw_affiliation_strings":["National Institute of Technology,Department of CSE,Rourkela,Odisha,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology,Department of CSE,Rourkela,Odisha,India","institution_ids":["https://openalex.org/I16292982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027090470","display_name":"Atul Kumar Singh","orcid":"https://orcid.org/0000-0003-0081-6109"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Atul Kumar Singh","raw_affiliation_strings":["National Institute of Technology,Department of ECE,Rourkela,Odisha,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology,Department of ECE,Rourkela,Odisha,India","institution_ids":["https://openalex.org/I16292982"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057535978","display_name":"Durga Prasad Mohapatra","orcid":"https://orcid.org/0000-0002-4824-7091"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Durga Prasad Mohapatra","raw_affiliation_strings":["National Institute of Technology,Department of CSE,Rourkela,Odisha,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology,Department of CSE,Rourkela,Odisha,India","institution_ids":["https://openalex.org/I16292982"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023048105"],"corresponding_institution_ids":["https://openalex.org/I16292982"],"apc_list":null,"apc_paid":null,"fwci":0.3721,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58875154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7643071413040161},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7598398923873901},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7587047815322876},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5672850012779236},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.5502706170082092},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3800289034843445},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3350210189819336}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7643071413040161},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7598398923873901},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7587047815322876},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5672850012779236},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.5502706170082092},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3800289034843445},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3350210189819336},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10725427","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10725427","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2065314054","https://openalex.org/W2152565070","https://openalex.org/W2346043832","https://openalex.org/W2557513839","https://openalex.org/W2894236118","https://openalex.org/W2895892359","https://openalex.org/W2990128188","https://openalex.org/W3167995052","https://openalex.org/W4285213288","https://openalex.org/W4297029841","https://openalex.org/W4327952342","https://openalex.org/W4378418748","https://openalex.org/W4388221193","https://openalex.org/W4393276298"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W4380075502"],"abstract_inverted_index":{"Malware":[0],"classification":[1,23,89,116,132],"is":[2],"a":[3,18,53,77,108,113,124,146],"crucial":[4],"aspect":[5],"of":[6,39,41,81,90,97,103,142,163],"cybersecurity,":[7],"vital":[8],"for":[9,149],"recognizing":[10],"and":[11,49,71,84,88,118,134,165],"addressing":[12],"potential":[13],"threats.":[14,172],"This":[15],"study":[16,99],"introduces":[17],"fresh":[19],"perspective":[20],"on":[21,123],"malware":[22,57,74,82,92,126,151],"utilizing":[24],"Natural":[25],"Language":[26],"Processing":[27],"(NLP)":[28],"methods":[29],"in":[30,73,131],"conjunction":[31],"with":[32],"Deep":[33,61,114,166],"Learning.":[34],"We":[35],"propose":[36],"the":[37,68,120,155,161],"use":[38],"n-grams":[40,102],"API":[42,47,104],"call":[43,105],"sequences,":[44],"including":[45],"both":[46],"names":[48],"their":[50],"arguments,":[51],"as":[52,107],"means":[54],"to":[55,137,168],"characterize":[56],"behavior.":[58],"By":[59],"employing":[60],"Learning":[62,167],"techniques,":[63],"we":[64],"can":[65],"effectively":[66],"capture":[67],"nuanced":[69],"patterns":[70],"distinctions":[72],"behaviors,":[75],"enabling":[76],"more":[78],"comprehensive":[79],"understanding":[80],"characteristics":[83],"facilitating":[85],"accurate":[86],"identification":[87],"diverse":[91],"strains.":[93],"The":[94,140],"key":[95],"contributions":[96],"this":[98,143],"include":[100],"leveraging":[101],"sequences":[106],"novel":[109],"feature":[110],"representation,":[111],"developing":[112],"Learning-based":[115],"model,":[117],"evaluating":[119],"proposed":[121],"approach":[122],"large-scale":[125],"dataset,":[127],"demonstrating":[128],"significant":[129],"improvements":[130],"accuracy":[133],"robustness":[135],"compared":[136],"traditional":[138],"methods.":[139],"findings":[141],"research":[144],"present":[145],"promising":[147],"avenue":[148],"improving":[150],"classification,":[152],"ultimately":[153],"strengthening":[154],"overall":[156],"cybersecurity":[157],"landscape":[158],"by":[159],"combining":[160],"strengths":[162],"NLP":[164],"combat":[169],"evolving":[170],"cyber":[171]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
