{"id":"https://openalex.org/W2011424284","doi":"https://doi.org/10.1109/malware.2014.6999413","title":"Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing","display_name":"Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W2011424284","doi":"https://doi.org/10.1109/malware.2014.6999413","mag":"2011424284"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2014.6999413","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2014.6999413","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071414477","display_name":"Andreas Clementi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127303","display_name":"Institute for Comparative Media and Communication Studies","ror":"https://ror.org/02yf6ha74","country_code":"AT","type":"facility","lineage":["https://openalex.org/I138211613","https://openalex.org/I4210127303"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Andreas Clementi","raw_affiliation_strings":["AV-Comparatives, Austria"],"affiliations":[{"raw_affiliation_string":"AV-Comparatives, Austria","institution_ids":["https://openalex.org/I4210127303"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072574379","display_name":"Peter Stelzhammer","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127303","display_name":"Institute for Comparative Media and Communication Studies","ror":"https://ror.org/02yf6ha74","country_code":"AT","type":"facility","lineage":["https://openalex.org/I138211613","https://openalex.org/I4210127303"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Peter Stelzhammer","raw_affiliation_strings":["AV-Comparatives, Austria"],"affiliations":[{"raw_affiliation_string":"AV-Comparatives, Austria","institution_ids":["https://openalex.org/I4210127303"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059090211","display_name":"Fernando C. Col\u00f3n Osorio","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fernando C. Colon Osorio","raw_affiliation_strings":["Wireless Systems Security Research Laboratory, Marlborough, MA, USA","Wireless Systems Security Research Laboratory, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Systems Security Research Laboratory, Marlborough, MA, USA","institution_ids":[]},{"raw_affiliation_string":"Wireless Systems Security Research Laboratory, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071414477"],"corresponding_institution_ids":["https://openalex.org/I4210127303"],"apc_list":null,"apc_paid":null,"fwci":0.5823,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.65870031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7747297286987305},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.636347770690918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5671250820159912},{"id":"https://openalex.org/keywords/weighting","display_name":"Weighting","score":0.45848625898361206},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4532445967197418},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.33227741718292236}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7747297286987305},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.636347770690918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5671250820159912},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.45848625898361206},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4532445967197418},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.33227741718292236},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2014.6999413","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2014.6999413","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2039529994"],"related_works":["https://openalex.org/W2180954594","https://openalex.org/W2052835778","https://openalex.org/W2097492617","https://openalex.org/W2049003611","https://openalex.org/W2127804977","https://openalex.org/W2000785801","https://openalex.org/W2108418243","https://openalex.org/W986318368","https://openalex.org/W164103134","https://openalex.org/W2052701014"],"abstract_inverted_index":{"In":[0,210],"the":[1,13,29,38,118,126,133,137,147,164,176,187,197,201,208,215,224,232,236,257,282,318,322,327,333],"past,":[2],"several":[3,135],"methods":[4],"have":[5],"been":[6],"used":[7,18,190],"to":[8,46,60,77,98,115,158,174,205,256,330,395],"select":[9],"Malware":[10,81,325],"attack":[11,82],"samples,":[12],"so-called":[14],"Stimulus":[15,247],"Workload":[16],"(SW),":[17],"in":[19,28,171,207,292],"Malware-detection":[20],"tests":[21],"of":[22,120,149,166,180,217,259,269,281,324,350,362],"endpoint":[23],"security":[24,219,271,303],"products.":[25],"For":[26,129,339],"example,":[27,340],"selection":[30,119],"process":[31,148],"one":[32,388],"must":[33,191],"be":[34,86,96,192],"aware":[35],"that":[36,154,186,200,345,368,399],"amongst":[37,337],"samples":[39,83,121,326],"selected,":[40],"some":[41],"pose":[42],"a":[43,62,67,151,193,309],"greater":[44],"threat":[45],"users":[47],"than":[48],"others":[49],"as":[50,235,255,377],"they":[51],"are":[52,57,203,265],"more":[53,58,393],"widespread":[54],"and":[55,109,113,123,178,249,294,353,364,382],"hence":[56],"likely":[59,394],"affect":[61,91],"user.":[63],"Some":[64],"may":[65,84],"target":[66],"specific":[68,89,92],"company":[69],"or":[70,94,103,245],"user":[71],"base,":[72],"but":[73],"present":[74,214],"less":[75],"risk":[76],"other":[78],"users.":[79],"Other":[80],"only":[85,95],"found":[87],"on":[88,286],"websites,":[90],"countries/regions,":[93],"relevant":[97],"particular":[99],"operating":[100],"system":[101],"versions":[102],"interface":[104],"languages":[105],"(English,":[106],"German,":[107],"Chinese,":[108],"so":[110,383],"forth).":[111],"Unfortunately,":[112],"due":[114],"such":[116,234,263,308,376],"variability,":[117],"can":[122],"will":[124],"skew":[125],"results":[127,216,251,312],"dramatically.":[128],"this":[130,211],"reason,":[131],"over":[132],"last":[134],"years,":[136],"Security":[138],"Effectiveness":[139],"Measurement":[140],"Community":[141],"&":[142],"Ecosystem":[143],"(SEMCE),":[144],"has":[145],"begun":[146],"adopting":[150],"test":[152,181],"methodology":[153,184],"requires":[155,185],"strict":[156],"adherence":[157],"standards.":[159],"The":[160,279,311],"primary":[161],"reason":[162],"for":[163,196,296,374],"adoption":[165],"said":[167],"methodology,":[168],"first":[169],"described":[170,238],"[1],":[172],"is":[173],"assure":[175],"reproducibility":[177],"reliability":[179],"results.":[182],"These":[183],"stimulus":[188,226],"workload":[189,227],"reliable/good":[194],"proxy":[195],"actual":[198],"environment":[199],"products":[202,221,261,272,304,344],"expected":[204],"encounter":[206],"wild.":[209],"manuscript,":[212],"we":[213],"end-point":[218,260,270,302,342],"protection":[220,343],"effectiveness":[222,258],"when":[223,262,369],"selected":[225],"(SW)":[228],"takes":[229],"into":[230],"consideration":[231],"variabilities":[233],"ones":[237],"above.":[239],"We":[240],"called":[241],"these":[242],"workloads":[243],"CSW":[244],"Customizable":[246],"Workloads,":[248],"our":[250],"show":[252,314],"great":[253,315],"variance":[254],"CSW's":[264],"used.":[266],"Our":[267],"evaluation":[268],"uses":[273],"simple":[274],"metric,":[275],"namely":[276],"missed":[277],"detections.":[278],"generation":[280],"CSWs":[283],"depended":[284],"heavily":[285],"Microsoft's":[287],"Global":[288],"telemetry":[289],"data":[290],"gathered":[291],"2013":[293],"2014":[295],"Microsoft":[297],"Windows":[298],"updates.":[299],"Twenty-two":[300],"(22)":[301],"were":[305,372,390],"evaluated":[306],"using":[307],"methodology.":[310],"obtained":[313],"variability":[316],"between":[317],"miss":[319,348,370],"ratios,":[320],"meaning":[321],"number":[323],"product":[328],"failed":[329],"detect":[331],"versus":[332],"customer":[334,358],"impact":[335,359],"coefficient":[336,360],"vendors.":[338],"two":[341],"had":[346],"similar":[347],"percentages":[349,371],"0.2":[351],"%":[352,355],"0.4":[354],"showed":[356],"dramatic":[357],"differences":[361],"0.001209":[363],"0.018903":[365],"respectively.":[366],"Meaning,":[367],"normalized":[373],"factors":[375],"prevalence,":[378],"Operating":[379],"System,":[380],"languages,":[381],"fort,":[384],"systems":[385],"protected":[386],"by":[387],"vendor":[389],"18":[391],"times":[392],"suffer":[396],"an":[397],"infection":[398],"their":[400],"counterpart.":[401]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
