{"id":"https://openalex.org/W2142541493","doi":"https://doi.org/10.1109/isi.2013.6578797","title":"Stealthy software: Next-generation cyber-attacks and defenses","display_name":"Stealthy software: Next-generation cyber-attacks and defenses","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2142541493","doi":"https://doi.org/10.1109/isi.2013.6578797","mag":"2142541493"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2013.6578797","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051312448","display_name":"Kevin W. Hamlen","orcid":"https://orcid.org/0000-0003-0479-6280"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kevin W. Hamlen","raw_affiliation_strings":["Computer Science Department, University of Texas at Dallas, USA","Computer Science Department, University of Texas at Dallas, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Texas at Dallas, USA","institution_ids":["https://openalex.org/I162577319"]},{"raw_affiliation_string":"Computer Science Department, University of Texas at Dallas, Dallas, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5051312448"],"corresponding_institution_ids":["https://openalex.org/I162577319"],"apc_list":null,"apc_paid":null,"fwci":0.3192,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.60712194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.9163905382156372},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9036944508552551},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7367690205574036},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.6661936044692993},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6557978987693787},{"id":"https://openalex.org/keywords/battle","display_name":"Battle","score":0.6377376317977905},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.5880542397499084},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5640909671783447},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19010919332504272},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11900022625923157},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.07213905453681946}],"concepts":[{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.9163905382156372},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9036944508552551},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7367690205574036},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.6661936044692993},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6557978987693787},{"id":"https://openalex.org/C2778627824","wikidata":"https://www.wikidata.org/wiki/Q178561","display_name":"Battle","level":2,"score":0.6377376317977905},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.5880542397499084},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5640909671783447},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19010919332504272},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11900022625923157},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.07213905453681946},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2013.6578797","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332467","display_name":"U.S. Air Force","ror":"https://ror.org/006gmme17"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1571503777","https://openalex.org/W1582350176","https://openalex.org/W1591367040","https://openalex.org/W1998711561","https://openalex.org/W2002716283","https://openalex.org/W2009229808","https://openalex.org/W2059677378","https://openalex.org/W2065890363","https://openalex.org/W2099505562","https://openalex.org/W2100307718","https://openalex.org/W2111029998","https://openalex.org/W2116679534","https://openalex.org/W2132874238","https://openalex.org/W2142778065","https://openalex.org/W2143807210","https://openalex.org/W2143842190","https://openalex.org/W2150053566","https://openalex.org/W2162800072","https://openalex.org/W2168843528","https://openalex.org/W2179301997","https://openalex.org/W2246113026","https://openalex.org/W2542582667","https://openalex.org/W6634105385"],"related_works":["https://openalex.org/W4249009605","https://openalex.org/W2944860159","https://openalex.org/W2900526031","https://openalex.org/W1536360977","https://openalex.org/W4256304280","https://openalex.org/W2395100307","https://openalex.org/W2909615516","https://openalex.org/W3183826413","https://openalex.org/W4243179955","https://openalex.org/W3205001643"],"abstract_inverted_index":{"Weaponized":[0],"software":[1],"is":[2],"the":[3,47,50,71],"latest":[4],"development":[5],"in":[6,46],"a":[7],"decades-old":[8],"battle":[9],"of":[10,73],"virus-antivirus":[11],"co-evolution.":[12],"Reactively":[13],"adaptive":[14],"malware":[15,74],"and":[16,25,39,67,76,80],"automated":[17],"binary":[18],"transformation":[19],"are":[20,78],"two":[21],"recently":[22],"emerging":[23],"offensive":[24],"defensive":[26],"(respectively)":[27],"technologies":[28,66],"that":[29],"may":[30],"shape":[31],"future":[32],"cyberwarfare":[33],"weapons.":[34],"The":[35],"former":[36],"intelligently":[37],"learns":[38],"adapts":[40],"to":[41,56],"antiviral":[42],"defenses":[43],"fully":[44],"automatically":[45],"wild,":[48],"while":[49],"latter":[51],"applies":[52],"code":[53],"mutation":[54],"technology":[55],"defense,":[57],"transforming":[58],"potentially":[59],"dangerous":[60],"programs":[61],"into":[62],"safe":[63],"programs.":[64],"These":[65],"their":[68],"roles":[69],"within":[70],"landscape":[72],"attack":[75],"defense":[77],"examined":[79],"discussed.":[81]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
