{"id":"https://openalex.org/W4391929870","doi":"https://doi.org/10.1109/ocit59427.2023.10430935","title":"An Empirical Framework for Malware Prediction Using Multi-Layer Perceptron","display_name":"An Empirical Framework for Malware Prediction Using Multi-Layer Perceptron","publication_year":2023,"publication_date":"2023-12-13","ids":{"openalex":"https://openalex.org/W4391929870","doi":"https://doi.org/10.1109/ocit59427.2023.10430935"},"language":"en","primary_location":{"id":"doi:10.1109/ocit59427.2023.10430935","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ocit59427.2023.10430935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 OITS International Conference on Information Technology (OCIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101550869","display_name":"Vikram Singh","orcid":"https://orcid.org/0000-0003-2841-9906"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vikram Singh","raw_affiliation_strings":["NIT, Kurukshetra,Dept. Computer Engineering,Kurukshetra,India","Dept. Computer Engineering, NIT, Kurukshetra, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"NIT, Kurukshetra,Dept. Computer Engineering,Kurukshetra,India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"Dept. Computer Engineering, NIT, Kurukshetra, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075237293","display_name":"Lov Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Lov Kumar","raw_affiliation_strings":["NIT, Kurukshetra,Dept. Computer Engineering,Kurukshetra,India","Dept. Computer Engineering, NIT, Kurukshetra, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"NIT, Kurukshetra,Dept. Computer Engineering,Kurukshetra,India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"Dept. Computer Engineering, NIT, Kurukshetra, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102937529","display_name":"Anoop Kumar Patel","orcid":"https://orcid.org/0000-0002-3249-3888"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anoop Kumar Patel","raw_affiliation_strings":["NIT, Kurukshetra,Dept. Computer Engineering,Kurukshetra,India","Dept. Computer Engineering, NIT, Kurukshetra, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"NIT, Kurukshetra,Dept. Computer Engineering,Kurukshetra,India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"Dept. Computer Engineering, NIT, Kurukshetra, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053327787","display_name":"Aneesh Krishna","orcid":"https://orcid.org/0000-0001-8637-5732"},"institutions":[{"id":"https://openalex.org/I205640436","display_name":"Curtin University","ror":"https://ror.org/02n415q13","country_code":"AU","type":"education","lineage":["https://openalex.org/I205640436"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Aneesh Krishna","raw_affiliation_strings":["Curtin University Perth,EECMS,Perth,Australia","EECMS, Curtin University Perth, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Curtin University Perth,EECMS,Perth,Australia","institution_ids":["https://openalex.org/I205640436"]},{"raw_affiliation_string":"EECMS, Curtin University Perth, Perth, Australia","institution_ids":["https://openalex.org/I205640436"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101550869"],"corresponding_institution_ids":["https://openalex.org/I105094715"],"apc_list":null,"apc_paid":null,"fwci":0.2033,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50359892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"485","last_page":"490"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8165863752365112},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7808851003646851},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.6931580305099487},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.6125339865684509},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5188818573951721},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43842217326164246},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.41249018907546997},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3681678771972656},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3437308073043823},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.26499053835868835},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15309718251228333}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8165863752365112},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7808851003646851},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.6931580305099487},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.6125339865684509},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5188818573951721},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43842217326164246},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.41249018907546997},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3681678771972656},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3437308073043823},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.26499053835868835},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15309718251228333},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ocit59427.2023.10430935","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ocit59427.2023.10430935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 OITS International Conference on Information Technology (OCIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2037026906","https://openalex.org/W2732916693","https://openalex.org/W2765174411","https://openalex.org/W2792310543","https://openalex.org/W2986232939","https://openalex.org/W3009677746","https://openalex.org/W3159337037","https://openalex.org/W3194586437","https://openalex.org/W3208507830"],"related_works":["https://openalex.org/W2076543106","https://openalex.org/W2523437662","https://openalex.org/W89844371","https://openalex.org/W2019891950","https://openalex.org/W2085842814","https://openalex.org/W4286643620","https://openalex.org/W4387048144","https://openalex.org/W4280611221","https://openalex.org/W2492135063","https://openalex.org/W2362514456"],"abstract_inverted_index":{"In":[0,50,82],"today\u2019s":[1],"interconnected":[2],"world,":[3],"where":[4],"sensitive":[5],"data":[6,95,158],"and":[7,12,20,34,58,99,102,122,170],"financial":[8],"transactions":[9],"are":[10,113],"exchanged":[11],"stored":[13],"online,":[14],"the":[15,29,92,103,152,164,184,190],"increasing":[16],"prevalence":[17],"of":[18,31,79,94,105,189],"sophisticated":[19,56],"evolving":[21],"malware":[22,39,53,111,134,145],"attacks":[23],"poses":[24],"a":[25,160],"significant":[26],"threat":[27],"to":[28,43,61,65,125,128,138,201],"cybersecurity":[30],"computer":[32],"systems":[33],"network":[35],"infrastructures.":[36],"Therefore,":[37],"accurate":[38,140],"classification":[40],"is":[41,120],"pivotal":[42],"effectively":[44],"defend":[45],"against":[46],"these":[47,80],"hostile":[48],"attacks.":[49],"recent":[51],"developments,":[52],"variants":[54],"use":[55],"packaging":[57],"obfuscation":[59],"techniques":[60],"gain":[62],"unauthorised":[63],"access":[64],"valuable":[66],"information.":[67],"The":[68,115,147,179],"urgent":[69],"need":[70],"for":[71,110],"improved":[72],"security":[73],"has":[74],"become":[75],"imperative":[76],"in":[77,90],"light":[78],"developments.":[81],"this":[83],"paper,":[84],"we":[85],"conducted":[86],"an":[87],"empirical":[88],"study,":[89],"particular,":[91],"impact":[93],"balancing,":[96],"feature":[97],"selection":[98],"dimensionality":[100],"reduction,":[101],"application":[104],"proposed":[106,116,192],"MLP":[107,162],"(Multi-layer":[108],"perception)":[109],"prediction":[112,118,153],"investigated.":[114],"MLP-enabled":[117],"model":[119],"efficient":[121],"effective,":[123],"due":[124],"its":[126],"ability":[127],"learn":[129],"complex":[130],"patterns":[131],"across":[132],"different":[133],"families,":[135],"allowing":[136],"them":[137],"make":[139],"predictions":[141],"about":[142],"new,":[143],"unseen":[144],"patterns.":[146],"experimental":[148,180],"results":[149,181],"assert":[150],"that":[151,183],"models":[154,185],"trained":[155,186],"on":[156],"sample":[157],"using":[159,171,187],"single-layer":[161],"with":[163],"Adaptive":[165],"Movement":[166],"Estimation":[167],"(ADAM)":[168],"algorithm":[169],"GA":[172,194],"selected":[173],"features":[174,191],"have":[175],"better":[176],"predictive":[177,198],"ability.":[178],"confirmed":[182],"51.44%":[188],"at":[193],"had":[195],"significantly":[196],"similar":[197],"abilities":[199],"compared":[200],"all":[202],"features.":[203]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
