{"id":"https://openalex.org/W2608581974","doi":"https://doi.org/10.1109/pst.2016.7906998","title":"Taxonomy of malware detection techniques: A systematic literature review","display_name":"Taxonomy of malware detection techniques: A systematic literature review","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2608581974","doi":"https://doi.org/10.1109/pst.2016.7906998","mag":"2608581974"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2016.7906998","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2016.7906998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.researchbank.ac.nz/bitstreams/962a962a-a496-4fd6-b83e-f6617b03d2f8/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033526673","display_name":"Hanif Mohaddes Deylami","orcid":"https://orcid.org/0000-0002-5486-2859"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Hanif Mohaddes Deylami","raw_affiliation_strings":["Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, UKM Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, UKM Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079386779","display_name":"Ravie Chandren Muniyandi","orcid":"https://orcid.org/0000-0002-8999-9548"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ravie Chandren Muniyandi","raw_affiliation_strings":["Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, UKM Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, UKM Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012499208","display_name":"Iman Ardekani","orcid":"https://orcid.org/0000-0001-9476-9539"},"institutions":[{"id":"https://openalex.org/I872614749","display_name":"Unitec Institute of Technology","ror":"https://ror.org/01px84952","country_code":"NZ","type":"education","lineage":["https://openalex.org/I4387152882","https://openalex.org/I872614749"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Iman Tabatabaei Ardekani","raw_affiliation_strings":["Cybersecurity Research Center, Unitec Institute of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Center, Unitec Institute of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I872614749"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102722653","display_name":"Abdolhossein Sarrafzadeh","orcid":"https://orcid.org/0000-0003-0816-589X"},"institutions":[{"id":"https://openalex.org/I872614749","display_name":"Unitec Institute of Technology","ror":"https://ror.org/01px84952","country_code":"NZ","type":"education","lineage":["https://openalex.org/I4387152882","https://openalex.org/I872614749"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Abdolhossein Sarrafzadeh","raw_affiliation_strings":["Cybersecurity Research Center, Unitec Institute of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Center, Unitec Institute of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I872614749"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033526673"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.5104,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.68675977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"629","last_page":"636"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9707676768302917},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.7759853601455688},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7329031825065613},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6186683773994446},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5890920162200928},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.47713351249694824},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44191479682922363},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.4314382076263428},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.39817696809768677},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34341269731521606},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33905547857284546}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9707676768302917},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.7759853601455688},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7329031825065613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6186683773994446},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5890920162200928},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.47713351249694824},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44191479682922363},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.4314382076263428},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39817696809768677},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34341269731521606},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33905547857284546},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst.2016.7906998","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2016.7906998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:www.researchbank.ac.nz:10652/3876","is_oa":true,"landing_page_url":"https://hdl.handle.net/10652/3876","pdf_url":"https://www.researchbank.ac.nz/bitstreams/962a962a-a496-4fd6-b83e-f6617b03d2f8/download","source":{"id":"https://openalex.org/S4306401628","display_name":"Unitec Research Bank (Unitec Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I872614749","host_organization_name":"Unitec Institute of Technology","host_organization_lineage":["https://openalex.org/I872614749"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":{"id":"pmh:oai:www.researchbank.ac.nz:10652/3876","is_oa":true,"landing_page_url":"https://hdl.handle.net/10652/3876","pdf_url":"https://www.researchbank.ac.nz/bitstreams/962a962a-a496-4fd6-b83e-f6617b03d2f8/download","source":{"id":"https://openalex.org/S4306401628","display_name":"Unitec Research Bank (Unitec Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I872614749","host_organization_name":"Unitec Institute of Technology","host_organization_lineage":["https://openalex.org/I872614749"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4399999976158142}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321709","display_name":"Ministry of Higher Education, Malaysia","ror":"https://ror.org/05mcs2t73"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2608581974.pdf","grobid_xml":"https://content.openalex.org/works/W2608581974.grobid-xml"},"referenced_works_count":82,"referenced_works":["https://openalex.org/W18325853","https://openalex.org/W66061580","https://openalex.org/W94505116","https://openalex.org/W168640152","https://openalex.org/W200681053","https://openalex.org/W567160446","https://openalex.org/W598294359","https://openalex.org/W608912260","https://openalex.org/W1485176061","https://openalex.org/W1493813407","https://openalex.org/W1497733019","https://openalex.org/W1503224444","https://openalex.org/W1503700403","https://openalex.org/W1512561322","https://openalex.org/W1516960038","https://openalex.org/W1536221440","https://openalex.org/W1547222988","https://openalex.org/W1560773773","https://openalex.org/W1565581850","https://openalex.org/W1567557924","https://openalex.org/W1598817474","https://openalex.org/W1601913623","https://openalex.org/W1603499488","https://openalex.org/W1633644964","https://openalex.org/W1639353385","https://openalex.org/W1641762327","https://openalex.org/W1827822366","https://openalex.org/W1837888533","https://openalex.org/W1936417930","https://openalex.org/W1968519345","https://openalex.org/W1971139551","https://openalex.org/W1975932506","https://openalex.org/W1989359075","https://openalex.org/W1991768762","https://openalex.org/W1993798783","https://openalex.org/W2004462823","https://openalex.org/W2016557278","https://openalex.org/W2053385741","https://openalex.org/W2057787526","https://openalex.org/W2095648812","https://openalex.org/W2096363125","https://openalex.org/W2113119828","https://openalex.org/W2119251836","https://openalex.org/W2124975206","https://openalex.org/W2131025216","https://openalex.org/W2131523719","https://openalex.org/W2138471478","https://openalex.org/W2139542584","https://openalex.org/W2162034246","https://openalex.org/W2162922797","https://openalex.org/W2167611996","https://openalex.org/W2168412760","https://openalex.org/W2183292139","https://openalex.org/W2186280426","https://openalex.org/W2193428859","https://openalex.org/W2307930854","https://openalex.org/W2410623418","https://openalex.org/W2519120241","https://openalex.org/W2587029634","https://openalex.org/W2600591305","https://openalex.org/W2626788661","https://openalex.org/W3000993043","https://openalex.org/W3018321379","https://openalex.org/W4205472781","https://openalex.org/W4214863042","https://openalex.org/W4285719527","https://openalex.org/W4298068531","https://openalex.org/W6606867374","https://openalex.org/W6618662248","https://openalex.org/W6629915129","https://openalex.org/W6630163193","https://openalex.org/W6633555099","https://openalex.org/W6633846553","https://openalex.org/W6635790276","https://openalex.org/W6635957068","https://openalex.org/W6636663735","https://openalex.org/W6640590293","https://openalex.org/W6642280086","https://openalex.org/W6678752892","https://openalex.org/W6679514067","https://openalex.org/W6680393086","https://openalex.org/W6733273810"],"related_works":["https://openalex.org/W1855034413","https://openalex.org/W193849731","https://openalex.org/W3042673639","https://openalex.org/W1561877636","https://openalex.org/W2623682848","https://openalex.org/W2774686757","https://openalex.org/W201444914","https://openalex.org/W2969309937","https://openalex.org/W1594012544","https://openalex.org/W3174273494"],"abstract_inverted_index":{"Malware":[0],"is":[1,13,38,56,101],"an":[2,139],"international":[3],"software":[4],"disease.":[5],"Research":[6],"shows":[7],"that":[8,40,69],"the":[9,24,33,41,67,74,81,92,106,115,132],"effect":[10],"of":[11,28,45,48,83,87,91,109,114,142],"malware":[12,19,93,110,133],"becoming":[14],"chronic.":[15],"To":[16],"protect":[17],"against":[18],"detectors":[20,30],"are":[21,50,95,126],"fundamental":[22],"to":[23,57,65,80,104,121,128,144],"industry.":[25],"The":[26],"effectiveness":[27],"such":[29,88],"depends":[31],"on":[32,61],"technology":[34,49],"used.":[35],"Therefore,":[36],"it":[37,100],"paramount":[39],"advantages":[42],"and":[43,64,76,85,97,99,117],"disadvantages":[44],"each":[46],"type":[47],"scrutinized":[51],"analytically.":[52],"This":[53,135],"study's":[54],"aim":[55],"scrutinize":[58],"existing":[59],"publications":[60],"this":[62],"subject":[63],"follow":[66],"trend":[68],"has":[70],"taken":[71],"place":[72],"in":[73,146],"advancement":[75],"development":[77],"with":[78],"reference":[79],"amount":[82],"information":[84,111],"sources":[86],"literature.":[89],"Many":[90],"programs":[94],"huge":[96],"complicated":[98],"not":[102],"easy":[103],"comprehend":[105],"details.":[107],"Dissemination":[108],"among":[112],"users":[113,130],"Internet":[116],"also":[118],"training":[119],"them":[120],"correctly":[122],"use":[123],"anti-malware":[124],"products":[125],"crucial":[127],"protecting":[129],"from":[131],"onslaught.":[134],"paper":[136],"will":[137],"provide":[138],"exhaustive":[140],"bibliography":[141],"methods":[143],"assist":[145],"combating":[147],"malware.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2017-05-05T00:00:00"}
