{"id":"https://openalex.org/W4404739899","doi":"https://doi.org/10.1109/isncc62547.2024.10758952","title":"An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection","display_name":"An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection","publication_year":2024,"publication_date":"2024-10-22","ids":{"openalex":"https://openalex.org/W4404739899","doi":"https://doi.org/10.1109/isncc62547.2024.10758952"},"language":"en","primary_location":{"id":"doi:10.1109/isncc62547.2024.10758952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc62547.2024.10758952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007103197","display_name":"Tosin Ige","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tosin Ige","raw_affiliation_strings":["The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020091080","display_name":"Christopher Kiekintveld","orcid":"https://orcid.org/0000-0003-0615-9584"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christopher Kiekintveld","raw_affiliation_strings":["The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014855298","display_name":"Aritran Piplai","orcid":"https://orcid.org/0000-0002-6437-1324"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aritran Piplai","raw_affiliation_strings":["The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044859381","display_name":"Amy Wagler","orcid":"https://orcid.org/0000-0001-9799-6059"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amy Wagler","raw_affiliation_strings":["The University of Texas,Dept. of Public Health Science,EI Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas,Dept. of Public Health Science,EI Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077082299","display_name":"Olukunle Kolade","orcid":null},"institutions":[{"id":"https://openalex.org/I3130687028","display_name":"United States Department of the Navy","ror":"https://ror.org/03ar0mv07","country_code":"US","type":"funder","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028"]},{"id":"https://openalex.org/I175003984","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57","country_code":"US","type":"funder","lineage":["https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Olukunle Kolade","raw_affiliation_strings":["Office of Naval Research, United State Navy,Pentagon,USA"],"affiliations":[{"raw_affiliation_string":"Office of Naval Research, United State Navy,Pentagon,USA","institution_ids":["https://openalex.org/I3130687028","https://openalex.org/I175003984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084787336","display_name":"Bolanle Hafiz Matti","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108451","display_name":"Palo Alto Networks (United States)","ror":"https://ror.org/01rn6rn86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210108451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bolanle Hafiz Matti","raw_affiliation_strings":["Office of Network Security, Palo Alto Networks Inc,Texas,USA"],"affiliations":[{"raw_affiliation_string":"Office of Network Security, Palo Alto Networks Inc,Texas,USA","institution_ids":["https://openalex.org/I4210108451"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5007103197"],"corresponding_institution_ids":["https://openalex.org/I164936912"],"apc_list":null,"apc_paid":null,"fwci":1.5001,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83981154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shot","display_name":"Shot (pellet)","score":0.944901704788208},{"id":"https://openalex.org/keywords/single-shot","display_name":"Single shot","score":0.8255839347839355},{"id":"https://openalex.org/keywords/one-shot","display_name":"One shot","score":0.6948140859603882},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6703101396560669},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.6435583829879761},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5391194820404053},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3941219449043274},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.3295339345932007},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.21864888072013855},{"id":"https://openalex.org/keywords/optics","display_name":"Optics","score":0.1976320445537567},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19743072986602783},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15938779711723328},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.0711182951927185}],"concepts":[{"id":"https://openalex.org/C2778344882","wikidata":"https://www.wikidata.org/wiki/Q278938","display_name":"Shot (pellet)","level":2,"score":0.944901704788208},{"id":"https://openalex.org/C3019835501","wikidata":"https://www.wikidata.org/wiki/Q1310130","display_name":"Single shot","level":2,"score":0.8255839347839355},{"id":"https://openalex.org/C2992734406","wikidata":"https://www.wikidata.org/wiki/Q413267","display_name":"One shot","level":2,"score":0.6948140859603882},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6703101396560669},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.6435583829879761},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5391194820404053},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3941219449043274},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.3295339345932007},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.21864888072013855},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.1976320445537567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19743072986602783},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15938779711723328},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0711182951927185},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C191897082","wikidata":"https://www.wikidata.org/wiki/Q11467","display_name":"Metallurgy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc62547.2024.10758952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc62547.2024.10758952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2732916693","https://openalex.org/W2963545832","https://openalex.org/W2963943197","https://openalex.org/W3008497156","https://openalex.org/W3012943290","https://openalex.org/W3153387614","https://openalex.org/W4285193763","https://openalex.org/W4308457255","https://openalex.org/W4313252134","https://openalex.org/W4319163914","https://openalex.org/W4323341592","https://openalex.org/W4362676597","https://openalex.org/W4382239180","https://openalex.org/W4386065385","https://openalex.org/W4386076660","https://openalex.org/W4386076688","https://openalex.org/W4388015968","https://openalex.org/W4394911077","https://openalex.org/W4400205905","https://openalex.org/W4401164124","https://openalex.org/W6718171111","https://openalex.org/W6736057607","https://openalex.org/W6849272240","https://openalex.org/W6858581726","https://openalex.org/W6861608039","https://openalex.org/W7026373518"],"related_works":["https://openalex.org/W3142396426","https://openalex.org/W2471333042","https://openalex.org/W2497720472","https://openalex.org/W4292659306","https://openalex.org/W2955491601","https://openalex.org/W4396643691","https://openalex.org/W146529714","https://openalex.org/W4402383816","https://openalex.org/W2316500695","https://openalex.org/W1999226266"],"abstract_inverted_index":{"N-shot":[0,233],"learning":[1,9,19,83,102],"has":[2],"emerge":[3],"in":[4,140],"recent":[5,28],"year":[6],"as":[7,190],"poten-tial":[8],"approach":[10],"to":[11,40,61,156,179,199],"solve":[12],"the":[13,77,94,136,141,158,173,195,203,230],"problem":[14],"of":[15,69,79,96,128,138,161,202,205,229],"data":[16,185],"scarcity":[17],"by":[18],"underlying":[20],"pattern":[21],"from":[22,45],"a":[23,50],"few":[24,46],"training":[25,133],"sample.":[26],"Despite":[27],"state-of-the-art":[29,81,97,232],"research":[30],"on":[31,53,104,111,164,219,235],"model-agnostic":[32],"metal":[33],"learning,":[34,36],"transfer":[35],"and":[37,100,117,181,214,222],"optimization":[38],"strategy":[39],"rapidly":[41],"learn":[42],"valid":[43],"information":[44],"sample,":[47],"there":[48],"remains":[49],"big":[51],"challenge":[52],"an":[54,70,90,129,187,191],"actual":[55,159],"out-of-distribution":[56,106,130,142,165,192,217,236],"zero-day":[57,105],"without":[58],"any":[59],"similarity":[60],"previously":[62,183],"known":[63],"malware":[64,72,107],"family":[65,189],"or":[66],"new":[67],"variant":[68],"existing":[71],"family.":[73],"This":[74],"ultimately":[75],"questions":[76],"effectiveness":[78],"cur-rent":[80],"few-shot":[82,101,223],"approach.":[84],"In":[85],"this":[86],"research,":[87],"we":[88,170],"did":[89],"in-depth":[91],"investigation":[92],"into":[93,186],"performance":[95],"Zero-shot,":[98,220],"Single-shot,":[99],"approaches":[103,234],"attack":[108],"detection":[109],"based":[110],"their":[112],"static":[113],"properties":[114],"using":[115,153],"Malimg":[116],"Malevis":[118],"mal":[119,166],"ware":[120,167],"dataset.":[121],"We":[122],"ensure":[123],"our":[124],"model":[125,174,196],"was":[126,197],"aware":[127,201],"class":[131,143],"during":[132,208],"while":[134,152],"varying":[135],"number":[137,160],"samples":[139],"accordingly":[144],"zero-shot(no":[145],"sample),":[146,149],"single-shot":[147],"(1":[148],"few-shot(S":[150],"samples)":[151],"confusion":[154],"matrix":[155],"get":[157],"correct":[162,216],"prediction":[163],"validation":[168],"samples.":[169],"assert":[171],"that":[172,194],"should":[175],"be":[176,200],"smart":[177],"enough":[178],"detect":[180],"classify":[182],"unseen":[184],"empty":[188],"considering":[193],"made":[198],"existence":[204],"such":[206],"distribution":[207],"training.":[209],"Result":[210],"shows":[211],"0,":[212,213],"3":[215],"predictions":[218],"single-shot,":[221],"experiments":[224],"respectively,":[225],"thereby":[226],"showing":[227],"limitation":[228],"current":[231],"attack.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
