{"id":"https://openalex.org/W2035925615","doi":"https://doi.org/10.1109/isias.2011.6122799","title":"Ensemble based categorization and adaptive model for malware detection","display_name":"Ensemble based categorization and adaptive model for malware detection","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2035925615","doi":"https://doi.org/10.1109/isias.2011.6122799","mag":"2035925615"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2011.6122799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001820599","display_name":"Muhammad Najmi Ahmad Zabidi","orcid":"https://orcid.org/0000-0003-3196-936X"},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Muhammad Najmi Ahmad Zabidi","raw_affiliation_strings":["Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Kuala Lumpur, Malaysia","Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 53100 Gombak, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4164984"]},{"raw_affiliation_string":"Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 53100 Gombak, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4164984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111408872","display_name":"Mohd Aizaini Maarof","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Aizaini Maarof","raw_affiliation_strings":["Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 81310 Skudai, Johor Bahru, Malaysia"],"affiliations":[{"raw_affiliation_string":"Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 81310 Skudai, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062591167","display_name":"Anazida Zainal","orcid":"https://orcid.org/0000-0003-0022-3039"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Anazida Zainal","raw_affiliation_strings":["Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 81310 Skudai, Johor Bahru, Malaysia"],"affiliations":[{"raw_affiliation_string":"Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Information Assurance and Security Research Group, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 81310 Skudai, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001820599"],"corresponding_institution_ids":["https://openalex.org/I4164984"],"apc_list":null,"apc_paid":null,"fwci":0.9187,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73198483,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"80","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9577000141143799,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9724279046058655},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8396238088607788},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6964200139045715},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6319321990013123},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.6000086665153503},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5948666334152222},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.5282755494117737},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5280424356460571},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5240193605422974},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5231158137321472},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.5082730650901794},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4853162169456482},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.48315876722335815},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.4595246911048889},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4419117271900177},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40274280309677124},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2862513065338135},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11565142869949341}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9724279046058655},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8396238088607788},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6964200139045715},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6319321990013123},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.6000086665153503},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5948666334152222},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.5282755494117737},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5280424356460571},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5240193605422974},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5231158137321472},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.5082730650901794},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4853162169456482},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.48315876722335815},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.4595246911048889},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4419117271900177},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40274280309677124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2862513065338135},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11565142869949341},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2011.6122799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323300","display_name":"Universiti Teknologi Malaysia","ror":"https://ror.org/026w31v75"},{"id":"https://openalex.org/F4320324298","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W166319575","https://openalex.org/W1505217784","https://openalex.org/W1505580166","https://openalex.org/W1506167567","https://openalex.org/W1534477342","https://openalex.org/W1542270631","https://openalex.org/W1564385211","https://openalex.org/W1586252162","https://openalex.org/W1760401052","https://openalex.org/W1851017036","https://openalex.org/W1851403712","https://openalex.org/W1906766771","https://openalex.org/W1995732348","https://openalex.org/W2036230352","https://openalex.org/W2041950317","https://openalex.org/W2044660163","https://openalex.org/W2065311994","https://openalex.org/W2075715173","https://openalex.org/W2085807744","https://openalex.org/W2096144800","https://openalex.org/W2099312541","https://openalex.org/W2100805904","https://openalex.org/W2105041868","https://openalex.org/W2111038628","https://openalex.org/W2114065168","https://openalex.org/W2115445295","https://openalex.org/W2121749752","https://openalex.org/W2129838208","https://openalex.org/W2131523719","https://openalex.org/W2132874238","https://openalex.org/W2136504847","https://openalex.org/W2138471478","https://openalex.org/W2155951082","https://openalex.org/W4239320016","https://openalex.org/W4285719527","https://openalex.org/W4403126783","https://openalex.org/W6603356650","https://openalex.org/W6649229026","https://openalex.org/W6674922120","https://openalex.org/W6676967041","https://openalex.org/W6678051712"],"related_works":["https://openalex.org/W4256304280","https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W2395100307","https://openalex.org/W2909615516","https://openalex.org/W3183826413","https://openalex.org/W4243179955","https://openalex.org/W3205001643","https://openalex.org/W4360996742","https://openalex.org/W2150675148"],"abstract_inverted_index":{"Malware,":[0],"a":[1,45,81,90],"term":[2],"which":[3,47,106],"was":[4,23,55,65,80],"derived":[5],"from":[6],"two":[7],"words;":[8],"malicious":[9],"software":[10,38],"has":[11],"caused":[12],"many":[13,26,33],"problem":[14],"to":[15,57,67,85,89],"the":[16,20,59,69,72,109,115],"computer":[17],"users":[18],"throughout":[19],"world.":[21],"Previously":[22,79],"known":[24],"as":[25,41,49],"names;":[27],"trojan,":[28],"virus,":[29],"worms,":[30],"dialers":[31],"and":[32,83,92,133],"others,":[34],"thid":[35],"potientially":[36],"unwanted":[37],"simply":[39],"labeled":[40],"malware.":[42],"Malware":[43],"is":[44],"software,":[46,53],"works":[48],"any":[50],"other":[51],"benigh":[52],"but":[54],"designed":[56],"accomplish":[58],"goal":[60],"of":[61,71,96,117],"its":[62],"writers.":[63],"It":[64],"written":[66,94],"exploit":[68],"vulnerability":[70],"target":[73],"victim's":[74],"operating":[75],"system":[76],"or":[77],"application.":[78],"primitive":[82],"easy":[84],"detect,":[86],"it":[87],"evolves":[88],"sophisticated":[91],"professionally":[93],"piece":[95],"software.":[97],"Current":[98],"malware":[99],"detection":[100],"method":[101],"involved":[102],"string":[103],"search":[104],"algorithm":[105],"based":[107,119],"on":[108],"pattern":[110],"detection.":[111],"This":[112],"may":[113],"include":[114],"use":[116],"signature":[118],"method.":[120],"In":[121],"this":[122],"paper,":[123],"we":[124],"propose":[125],"an":[126],"ensemble":[127,131],"categorization":[128],"by":[129],"using":[130],"classification":[132],"clustering":[134],"together":[135],"with":[136],"adaptive":[137],"learning":[138],"model.":[139]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
