{"id":"https://openalex.org/W3215947916","doi":"https://doi.org/10.1109/isncc52172.2021.9615812","title":"Toward Efficient and Robust Deep Learning-based Malware Detection in Fog Computing","display_name":"Toward Efficient and Robust Deep Learning-based Malware Detection in Fog Computing","publication_year":2021,"publication_date":"2021-10-31","ids":{"openalex":"https://openalex.org/W3215947916","doi":"https://doi.org/10.1109/isncc52172.2021.9615812","mag":"3215947916"},"language":"en","primary_location":{"id":"doi:10.1109/isncc52172.2021.9615812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc52172.2021.9615812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005378746","display_name":"Danila Morozovskii","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Danila Morozovskii","raw_affiliation_strings":["Applied Computer Science, University Of Winnipeg, Manitoba, Canada"],"affiliations":[{"raw_affiliation_string":"Applied Computer Science, University Of Winnipeg, Manitoba, Canada","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023157184","display_name":"Krunal Thummar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Krunal Thummar","raw_affiliation_strings":["Applied Computer Science, University Of Winnipeg, Manitoba, Canada"],"affiliations":[{"raw_affiliation_string":"Applied Computer Science, University Of Winnipeg, Manitoba, Canada","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055415812","display_name":"Talal Halabi","orcid":"https://orcid.org/0000-0002-1922-5803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Talal Halabi","raw_affiliation_strings":["Applied Computer Science, University Of Winnipeg, Manitoba, Canada"],"affiliations":[{"raw_affiliation_string":"Applied Computer Science, University Of Winnipeg, Manitoba, Canada","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011188941","display_name":"Sheela Ramanna","orcid":"https://orcid.org/0000-0003-4169-6115"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sheela Ramanna","raw_affiliation_strings":["Applied Computer Science, University Of Winnipeg, Manitoba, Canada"],"affiliations":[{"raw_affiliation_string":"Applied Computer Science, University Of Winnipeg, Manitoba, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5005378746"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16133145,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8655507564544678},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.822890043258667},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6856693625450134},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5876988768577576},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.5843480825424194},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5582698583602905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5040580034255981},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46779924631118774},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4520546793937683},{"id":"https://openalex.org/keywords/snapshot","display_name":"Snapshot (computer storage)","score":0.415775865316391},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34513330459594727},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19578516483306885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8655507564544678},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.822890043258667},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6856693625450134},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5876988768577576},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5843480825424194},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5582698583602905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5040580034255981},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46779924631118774},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4520546793937683},{"id":"https://openalex.org/C55282118","wikidata":"https://www.wikidata.org/wiki/Q252683","display_name":"Snapshot (computer storage)","level":2,"score":0.415775865316391},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34513330459594727},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19578516483306885}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc52172.2021.9615812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc52172.2021.9615812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W36091977","https://openalex.org/W1506049862","https://openalex.org/W1538131130","https://openalex.org/W2010065958","https://openalex.org/W2095705004","https://openalex.org/W2113099534","https://openalex.org/W2124136621","https://openalex.org/W2267635142","https://openalex.org/W2732916693","https://openalex.org/W2792716682","https://openalex.org/W2889384500","https://openalex.org/W3047417042","https://openalex.org/W3091876964","https://openalex.org/W3099258169","https://openalex.org/W6674330103","https://openalex.org/W6754452578"],"related_works":["https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4313526662","https://openalex.org/W4312996489","https://openalex.org/W3111395152","https://openalex.org/W3106131444","https://openalex.org/W3216099748","https://openalex.org/W4205963435","https://openalex.org/W4313463379","https://openalex.org/W3214037210"],"abstract_inverted_index":{"Machine":[0],"learning":[1,4,36],"and":[2,21,34,107,132,138,160],"deep":[3,35],"have":[5,38],"proven":[6],"to":[7,15,28,42,53,88,204,207,217],"be":[8,50,98,114],"very":[9],"useful":[10],"for":[11,94,143,154],"malware":[12,26,31,47,66,109],"detection.":[13],"Due":[14],"their":[16],"ability":[17],"of":[18,24,79,122,129,152,158,180,188,201,211,221,229],"data":[19,27,159],"generalization":[20],"the":[22,65,77,80,89,178,199,205,209],"usage":[23,179],"past":[25],"detect":[29,218],"new":[30,92,141,219],"versions,":[32],"machine":[33],"techniques":[37],"been":[39],"widely":[40],"used":[41,191],"secure":[43],"cloud":[44],"computing.":[45,118],"Nonetheless,":[46],"files":[48],"might":[49],"too":[51],"large":[52,169],"handle":[54],"by":[55,146],"a":[56,60,123,127,130,140,149,168,185,193],"simple":[57],"device":[58],"with":[59],"small":[61],"RAM,":[62],"especially":[63],"when":[64,214],"detection":[67,110],"system":[68,111],"is":[69,190],"located":[70],"on":[71],"fog":[72,117],"computing":[73],"nodes":[74],"or":[75],"at":[76,192],"edge":[78],"network":[81],"where":[82],"computational":[83],"resources":[84],"are":[85],"limited":[86],"compared":[87],"cloud.":[90],"Therefore,":[91],"methods":[93,176],"feature":[95,144],"reduction":[96,145],"should":[97],"used.":[99],"In":[100],"this":[101],"paper,":[102],"we":[103,197],"propose":[104,139,198],"an":[105,136,162,227],"efficient":[106],"robust":[108],"that":[112,125],"can":[113],"deployed":[115],"in":[116],"We":[119],"make":[120],"use":[121],"technique":[124],"takes":[126],"snapshot":[128],"file":[131,170],"converts":[133],"it":[134,215],"into":[135,164,171],"image,":[137],"method":[142],"reading":[147],"only":[148,184],"specific":[150,194],"number":[151],"bytes":[153],"each":[155],"1":[156],"KB":[157],"splitting":[161],"image":[163],"chunks,":[165],"which":[166],"separates":[167],"fixed-size":[172],"output":[173],"images.":[174],"Such":[175],"reduce":[177],"RAM":[181],"drastically,":[182],"as":[183],"fixed":[186],"amount":[187],"memory":[189],"time.":[195],"Additionally,":[196],"addition":[200],"Poisson":[202],"noise":[203],"dataset":[206],"improve":[208],"accuracy":[210,228],"our":[212],"model":[213,225],"needs":[216],"variations":[220],"malware.":[222],"Our":[223],"best":[224],"achieves":[226],"97.2&#x0025;.":[230]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
