{"id":"https://openalex.org/W1988541877","doi":"https://doi.org/10.1109/icosc.2015.7050805","title":"Cluster-oriented ensemble classifiers for intelligent malware detection","display_name":"Cluster-oriented ensemble classifiers for intelligent malware detection","publication_year":2015,"publication_date":"2015-02-01","ids":{"openalex":"https://openalex.org/W1988541877","doi":"https://doi.org/10.1109/icosc.2015.7050805","mag":"1988541877"},"language":"en","primary_location":{"id":"doi:10.1109/icosc.2015.7050805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icosc.2015.7050805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110964699","display_name":"Shifu Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shifu Hou","raw_affiliation_strings":["Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA","Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA","institution_ids":["https://openalex.org/I12097938"]},{"raw_affiliation_string":"Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091369584","display_name":"Lifei Chen","orcid":"https://orcid.org/0000-0003-3568-8899"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lifei Chen","raw_affiliation_strings":["School of Mathematics and Computer Science, Fujian Normal University Fuzhou, China","School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350117, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science, Fujian Normal University Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350117, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080681305","display_name":"Egemen Tas","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093191","display_name":"Soliton Ocean Services (United States)","ror":"https://ror.org/00ms9d710","country_code":"US","type":"company","lineage":["https://openalex.org/I4210093191"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Egemen Tas","raw_affiliation_strings":["Comodo Security Solutons, Inc., New Jersey, NJ, USA","Comodo Security Solutons, Inc, New Jersey, 07130, USA"],"affiliations":[{"raw_affiliation_string":"Comodo Security Solutons, Inc., New Jersey, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Comodo Security Solutons, Inc, New Jersey, 07130, USA","institution_ids":["https://openalex.org/I4210093191"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064816121","display_name":"Igor Demihovskiy","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093191","display_name":"Soliton Ocean Services (United States)","ror":"https://ror.org/00ms9d710","country_code":"US","type":"company","lineage":["https://openalex.org/I4210093191"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Igor Demihovskiy","raw_affiliation_strings":["Comodo Security Solutons, Inc., New Jersey, NJ, USA","Comodo Security Solutons, Inc, New Jersey, 07130, USA"],"affiliations":[{"raw_affiliation_string":"Comodo Security Solutons, Inc., New Jersey, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Comodo Security Solutons, Inc, New Jersey, 07130, USA","institution_ids":["https://openalex.org/I4210093191"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027601906","display_name":"Yanfang Ye","orcid":"https://orcid.org/0000-0002-6038-2173"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanfang Ye","raw_affiliation_strings":["Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA","Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA","institution_ids":["https://openalex.org/I12097938"]},{"raw_affiliation_string":"Department of Computer Science & Electrical Engineering, West Virginia University, Morgantown, 26506, USA","institution_ids":["https://openalex.org/I12097938"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5110964699"],"corresponding_institution_ids":["https://openalex.org/I12097938"],"apc_list":null,"apc_paid":null,"fwci":1.6641,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.85727872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"189","last_page":"196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.927852988243103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8507872819900513},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7260974049568176},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.554657518863678},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5210092067718506},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4628753960132599},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4540950655937195},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.45051872730255127},{"id":"https://openalex.org/keywords/application-programming-interface","display_name":"Application programming interface","score":0.42118188738822937},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.41272732615470886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18960237503051758},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14900866150856018}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.927852988243103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8507872819900513},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7260974049568176},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.554657518863678},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5210092067718506},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4628753960132599},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4540950655937195},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.45051872730255127},{"id":"https://openalex.org/C99613125","wikidata":"https://www.wikidata.org/wiki/Q165194","display_name":"Application programming interface","level":2,"score":0.42118188738822937},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.41272732615470886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18960237503051758},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14900866150856018}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icosc.2015.7050805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icosc.2015.7050805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W150153386","https://openalex.org/W1482228399","https://openalex.org/W1502620665","https://openalex.org/W1506884343","https://openalex.org/W1985737644","https://openalex.org/W1996350342","https://openalex.org/W2009185755","https://openalex.org/W2020801795","https://openalex.org/W2021264330","https://openalex.org/W2021308105","https://openalex.org/W2043128754","https://openalex.org/W2044660163","https://openalex.org/W2050918226","https://openalex.org/W2099053789","https://openalex.org/W2107889964","https://openalex.org/W2110143557","https://openalex.org/W2122492127","https://openalex.org/W2137314966","https://openalex.org/W2138644293","https://openalex.org/W2143156479","https://openalex.org/W2144112223","https://openalex.org/W2147564534","https://openalex.org/W2150795982","https://openalex.org/W2152442131","https://openalex.org/W2153233077","https://openalex.org/W2154223969","https://openalex.org/W2154642793","https://openalex.org/W2156050321","https://openalex.org/W2164163973","https://openalex.org/W2167671111","https://openalex.org/W2171010205","https://openalex.org/W2775569191","https://openalex.org/W6630015158","https://openalex.org/W6646861099","https://openalex.org/W6680604901","https://openalex.org/W6682837551","https://openalex.org/W6682933111"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2768892939","https://openalex.org/W3164408430","https://openalex.org/W4285507391","https://openalex.org/W2397240470","https://openalex.org/W2602767565","https://openalex.org/W170652726","https://openalex.org/W2883822334","https://openalex.org/W2380730281"],"abstract_inverted_index":{"With":[0],"explosive":[1],"growth":[2],"of":[3,17,24,53,72,98,119,145,153,193],"malware":[4,13,36,54,102,135,158,181],"and":[5,167,191],"due":[6],"to":[7,10,178],"its":[8],"damage":[9],"computer":[11],"security,":[12],"detection":[14,37,103,136,182,203],"is":[15,108,149,176],"one":[16],"the":[18,70,73,78,96,117,128,133,143,150,189],"cyber":[19],"security":[20],"topics":[21],"that":[22,60,188],"are":[23],"great":[25],"interests.":[26],"Many":[27],"research":[28],"efforts":[29],"have":[30,45,58],"been":[31],"conducted":[32],"on":[33,69,116,164],"developing":[34],"intelligent":[35,134],"systems":[38],"applying":[39,154],"data":[40,169,200],"mining":[41,201],"techniques.":[42,204],"Such":[43],"techniques":[44],"successes":[46],"in":[47],"clustering":[48,86],"or":[49,87],"classifying":[50],"particular":[51],"sets":[52],"samples,":[55,80,130],"but":[56,90],"they":[57],"limitations":[59],"leave":[61],"a":[62,109,165],"large":[63,168],"room":[64],"for":[65,101,157],"improvement.":[66],"Specifically,":[67],"based":[68,202],"analysis":[71,118],"file":[74,79,129],"contents":[75],"extracted":[76,126],"from":[77,127,171],"existing":[81],"researches":[82],"apply":[83],"only":[84],"specific":[85],"classification":[88],"methods,":[89],"not":[91],"integrate":[92],"them":[93],"together.":[94],"Actually,":[95],"learning":[97],"class":[99,106],"boundaries":[100],"between":[104],"overlapping":[105],"patterns":[107],"difficult":[110],"problem.":[111],"In":[112],"this":[113,148],"paper,":[114],"resting":[115],"Windows":[120],"Application":[121],"Programming":[122],"Interface":[123],"(API)":[124],"calls":[125],"we":[131],"develop":[132],"system":[137],"using":[138],"cluster-oriented":[139],"ensemble":[140],"classifiers.":[141],"To":[142],"best":[144],"our":[146,194],"knowledge,":[147],"first":[151],"work":[152],"such":[155],"method":[156,196],"detection.":[159],"A":[160],"comprehensive":[161],"experimental":[162,185],"study":[163],"real":[166],"collection":[170],"Comodo":[172],"Cloud":[173],"Security":[174],"Center":[175],"performed":[177],"compare":[179],"various":[180],"approaches.":[183],"Promising":[184],"results":[186],"demonstrate":[187],"accuracy":[190],"efficiency":[192],"proposed":[195],"outperform":[197],"other":[198],"alternate":[199]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
