{"id":"https://openalex.org/W2056729444","doi":"https://doi.org/10.1109/icosc.2015.7050784","title":"Intelligent malware detection based on file relation graphs","display_name":"Intelligent malware detection based on file relation graphs","publication_year":2015,"publication_date":"2015-02-01","ids":{"openalex":"https://openalex.org/W2056729444","doi":"https://doi.org/10.1109/icosc.2015.7050784","mag":"2056729444"},"language":"en","primary_location":{"id":"doi:10.1109/icosc.2015.7050784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icosc.2015.7050784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017524689","display_name":"Lingwei Chen","orcid":"https://orcid.org/0000-0003-1550-6170"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lingwei Chen","raw_affiliation_strings":["Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, Igchen","Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, Igchen","institution_ids":["https://openalex.org/I12097938"]},{"raw_affiliation_string":"Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455259","display_name":"Tao Li","orcid":"https://orcid.org/0000-0001-9277-1539"},"institutions":[{"id":"https://openalex.org/I145608581","display_name":"University of Miami","ror":"https://ror.org/02dgjyy92","country_code":"US","type":"education","lineage":["https://openalex.org/I145608581"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["School of Computer Science, Florida Int'l University, Miami, FL","School of Computer Science, Florida Int'l University, Miami, 33199, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Florida Int'l University, Miami, FL","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science, Florida Int'l University, Miami, 33199, USA","institution_ids":["https://openalex.org/I145608581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038148456","display_name":"Melih Abdulhayoglu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Melih Abdulhayoglu","raw_affiliation_strings":["Comodo Security Solutons, Inc, New Jersey, NJ 07130, USA"],"affiliations":[{"raw_affiliation_string":"Comodo Security Solutons, Inc, New Jersey, NJ 07130, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101586436","display_name":"Yanfang Ye","orcid":"https://orcid.org/0000-0001-8376-7239"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanfang Ye","raw_affiliation_strings":["Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, Igchen","Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, Igchen","institution_ids":["https://openalex.org/I12097938"]},{"raw_affiliation_string":"Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA","institution_ids":["https://openalex.org/I12097938"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017524689"],"corresponding_institution_ids":["https://openalex.org/I12097938"],"apc_list":null,"apc_paid":null,"fwci":3.4461,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.93248207,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"85","last_page":"92"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9153667688369751},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8479738235473633},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.4781718850135803},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.45601633191108704},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.435053288936615},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4312751889228821},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42731714248657227},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33613336086273193},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32566696405410767}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9153667688369751},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8479738235473633},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.4781718850135803},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.45601633191108704},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.435053288936615},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4312751889228821},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42731714248657227},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33613336086273193},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32566696405410767}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icosc.2015.7050784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icosc.2015.7050784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W5748870","https://openalex.org/W67486310","https://openalex.org/W152196245","https://openalex.org/W1482228399","https://openalex.org/W1506884343","https://openalex.org/W2019599312","https://openalex.org/W2021264330","https://openalex.org/W2021308105","https://openalex.org/W2043128754","https://openalex.org/W2044660163","https://openalex.org/W2050918226","https://openalex.org/W2066220442","https://openalex.org/W2099053789","https://openalex.org/W2099505562","https://openalex.org/W2103156296","https://openalex.org/W2107889964","https://openalex.org/W2110143557","https://openalex.org/W2122492127","https://openalex.org/W2125055259","https://openalex.org/W2129650357","https://openalex.org/W2138644293","https://openalex.org/W2144112223","https://openalex.org/W2152442131","https://openalex.org/W2154223969","https://openalex.org/W2156094048","https://openalex.org/W2164163973","https://openalex.org/W2166128942","https://openalex.org/W2482374127","https://openalex.org/W6600261166","https://openalex.org/W6655383422","https://openalex.org/W6667106371","https://openalex.org/W6674743644","https://openalex.org/W6675393156","https://openalex.org/W6680604901","https://openalex.org/W6683068184"],"related_works":["https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W4256304280","https://openalex.org/W2395100307","https://openalex.org/W2909615516","https://openalex.org/W3183826413","https://openalex.org/W4243179955","https://openalex.org/W3205001643","https://openalex.org/W2557742076","https://openalex.org/W2968504645"],"abstract_inverted_index":{"Due":[0],"to":[1,4,108,118,158,181],"its":[2,9],"damage":[3],"Internet":[5],"security,":[6],"malware":[7,32,76,89,144,184],"and":[8,19,58,68,86,115,146,170,194],"detection":[10,33,145,185,206],"has":[11],"caught":[12],"the":[13,40,47,81,110,131,155,192],"attention":[14],"of":[15,42,88,196],"both":[16,84],"anti-malware":[17,97],"industry":[18,98],"researchers":[20],"for":[21,75,100,143],"decades.":[22],"Many":[23],"research":[24],"efforts":[25],"have":[26,72,90],"been":[27,73],"conducted":[28],"on":[29,39,126,154,167],"developing":[30],"intelligent":[31],"systems.":[34],"In":[35,120],"these":[36],"systems,":[37],"resting":[38],"analysis":[41],"file":[43,48,127,132,137],"contents":[44,128],"extracted":[45,129],"from":[46,130,174],"samples,":[49,133],"like":[50],"Application":[51],"Programming":[52],"Interface":[53],"(API)":[54],"calls,":[55],"instruction":[56],"sequences,":[57],"binary":[59],"strings,":[60],"data":[61,172,203],"mining":[62,204],"methods":[63,104],"such":[64],"as":[65],"Naive":[66],"Bayes":[67],"Support":[69],"Vector":[70],"Machines":[71],"used":[74,142],"detection.":[77],"However,":[78],"driven":[79],"by":[80],"economic":[82],"benefits,":[83],"diversity":[85],"sophistication":[87],"significantly":[91],"increased":[92],"in":[93],"recent":[94],"years.":[95],"Therefore,":[96],"calls":[99],"much":[101],"more":[102,116],"novel":[103,149],"which":[105],"are":[106],"capable":[107],"protect":[109],"users":[111],"against":[112],"new":[113],"threats,":[114],"difficult":[117],"evade.":[119],"this":[121],"paper,":[122],"other":[123,201],"than":[124],"based":[125,153,205],"we":[134],"study":[135,166],"how":[136],"relation":[138],"graphs":[139,157],"can":[140],"be":[141],"propose":[147],"a":[148,168],"Belief":[150],"Propagation":[151],"algorithm":[152],"constructed":[156],"detect":[159],"newly":[160],"unknown":[161],"malware.":[162],"A":[163],"comprehensive":[164],"experimental":[165,188],"real":[169],"large":[171],"collection":[173],"Comodo":[175],"Cloud":[176],"Security":[177],"Center":[178],"is":[179],"performed":[180],"compare":[182],"various":[183],"approaches.":[186],"Promising":[187],"results":[189],"demonstrate":[190],"that":[191],"accuracy":[193],"efficiency":[195],"our":[197],"proposed":[198],"method":[199],"outperform":[200],"alternate":[202],"techniques.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
