{"id":"https://openalex.org/W4378364131","doi":"https://doi.org/10.1109/isdfs58141.2023.10131709","title":"IEWS: a Free Open Source Intelligent Early Warning System Based on Machine Learning","display_name":"IEWS: a Free Open Source Intelligent Early Warning System Based on Machine Learning","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4378364131","doi":"https://doi.org/10.1109/isdfs58141.2023.10131709"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs58141.2023.10131709","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs58141.2023.10131709","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092023136","display_name":"Abdulrahman A. El Tawil","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090878","display_name":"Arab Open University","ror":"https://ror.org/00d260p98","country_code":"LB","type":"education","lineage":["https://openalex.org/I4210090878","https://openalex.org/I4210093932"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Abdulrahman A. El Tawil","raw_affiliation_strings":["Arab Open University,Cybersecurity and Forensics Department,Beirut,Lebanon","Cybersecurity and Forensics Department, Arab Open University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Arab Open University,Cybersecurity and Forensics Department,Beirut,Lebanon","institution_ids":["https://openalex.org/I4210090878"]},{"raw_affiliation_string":"Cybersecurity and Forensics Department, Arab Open University, Beirut, Lebanon","institution_ids":["https://openalex.org/I4210090878"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059047296","display_name":"Khouloud Samrouth","orcid":"https://orcid.org/0000-0003-2696-2024"},"institutions":[{"id":"https://openalex.org/I4210090878","display_name":"Arab Open University","ror":"https://ror.org/00d260p98","country_code":"LB","type":"education","lineage":["https://openalex.org/I4210090878","https://openalex.org/I4210093932"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Khouloud Samrouth","raw_affiliation_strings":["Arab Open University,Cybersecurity and Forensics Department,Beirut,Lebanon","Cybersecurity and Forensics Department, Arab Open University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Arab Open University,Cybersecurity and Forensics Department,Beirut,Lebanon","institution_ids":["https://openalex.org/I4210090878"]},{"raw_affiliation_string":"Cybersecurity and Forensics Department, Arab Open University, Beirut, Lebanon","institution_ids":["https://openalex.org/I4210090878"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092023136"],"corresponding_institution_ids":["https://openalex.org/I4210090878"],"apc_list":null,"apc_paid":null,"fwci":0.2038,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.4058216,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.942523717880249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8108773231506348},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.6635771989822388},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6581757068634033},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.5722939968109131},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.5264908671379089},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5187932848930359},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4614812731742859},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.4562888741493225},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4325258731842041},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42863720655441284},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4274091124534607},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.4156852960586548},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18595370650291443},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12431293725967407}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.942523717880249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8108773231506348},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.6635771989822388},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6581757068634033},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.5722939968109131},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.5264908671379089},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5187932848930359},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4614812731742859},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.4562888741493225},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4325258731842041},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42863720655441284},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4274091124534607},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.4156852960586548},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18595370650291443},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12431293725967407},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs58141.2023.10131709","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs58141.2023.10131709","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1893133781","https://openalex.org/W1996975221","https://openalex.org/W2140062727","https://openalex.org/W2508249987","https://openalex.org/W2543289462","https://openalex.org/W2732916693","https://openalex.org/W2799784398","https://openalex.org/W3157814027","https://openalex.org/W6649752630","https://openalex.org/W6680750234"],"related_works":["https://openalex.org/W3211746486","https://openalex.org/W4381279634","https://openalex.org/W3195170298","https://openalex.org/W4368275542","https://openalex.org/W3170525725","https://openalex.org/W2470502009","https://openalex.org/W4319151772","https://openalex.org/W2526398307","https://openalex.org/W1991979340","https://openalex.org/W2044423349"],"abstract_inverted_index":{"With":[0],"the":[1,11,19,27,33,60,82,112,149,164,174,181,199],"introduction":[2],"of":[3,13,78,111,115,152,169,210],"new":[4],"technologies":[5],"and":[6,50,56,107,166],"numerous":[7],"services":[8],"provided":[9],"in":[10,21,85,109],"framework":[12],"computer":[14],"networks,":[15],"as":[16,18,47,176],"well":[17],"growth":[20],"malicious":[22,42,186],"software":[23,43],"that":[24,59,190],"is":[25,62,102,129],"abusing":[26],"Internet":[28,34],"on":[29],"a":[30,37,53,96,131,156,177,185,191,207],"regular":[31],"basis,":[32],"has":[35,198],"become":[36,52],"severe":[38],"threat.":[39],"In":[40,134],"particular,":[41],"called":[44],"Malware,":[45],"such":[46],"viruses,":[48],"ransomware":[49],"spyware,":[51],"worldwide":[54],"epidemic,":[55],"studies":[57],"indicate":[58],"effect":[61],"worsening.":[63],"Many":[64],"approaches":[65],"have":[66,81],"been":[67],"presented":[68],"so":[69],"far":[70],"to":[71,87,179,201],"cope":[72],"with":[73,194,206],"these":[74,79],"many":[75],"dangers.":[76],"All":[77],"tactics":[80],"same":[83],"purpose":[84],"mind:":[86],"prevent":[88],"attackers":[89],"from":[90,184],"achieving":[91],"their":[92],"non-innocent":[93],"goals.":[94],"Without":[95],"doubt,":[97],"manual":[98],"heuristic":[99],"Malware":[100,116,122,153,170],"analysis":[101,151],"no":[103],"longer":[104],"deemed":[105],"useful":[106],"efficient":[108],"light":[110],"rapid":[113],"pace":[114],"dissemination.":[117],"Therefore,":[118],"automated":[119],"behaviour":[120,154],"based":[121],"detection":[123,208],"using":[124,155],"advanced":[125],"machine":[126,157],"learning":[127,158],"techniques":[128],"considered":[130],"profound":[132],"solution.":[133],"this":[135],"study,":[136],"we":[137],"propose":[138],"an":[139],"Open":[140],"Source":[141],"free":[142],"Intelligent":[143],"Early":[144],"Warning":[145],"System":[146],"(IEWS)":[147],"for":[148],"autonomous":[150],"algorithm.":[159],"The":[160],"proposed":[161,196],"system":[162,175],"enables":[163],"early":[165],"fast":[167],"identification":[168],"before":[171],"it\u2019s":[172],"into":[173],"way":[178],"protect":[180],"network":[182,192],"environment":[183],"activity.":[187],"Results":[188],"show":[189],"equipped":[193],"our":[195],"IEWS":[197],"ability":[200],"identify":[202],"possible":[203],"malware":[204],"attacks":[205],"accuracy":[209],"99.9%.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
