{"id":"https://openalex.org/W2995242986","doi":"https://doi.org/10.1109/tencon.2019.8929513","title":"NITRSCT: A Software Security tool for collection and analysis of Kernel Calls","display_name":"NITRSCT: A Software Security tool for collection and analysis of Kernel Calls","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2995242986","doi":"https://doi.org/10.1109/tencon.2019.8929513","mag":"2995242986"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2019.8929513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102126034","display_name":"Pushkar Kishore","orcid":null},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pushkar Kishore","raw_affiliation_strings":["Dept. of CSE, NIT Rourkela, Rourkela, India"],"affiliations":[{"raw_affiliation_string":"Dept. of CSE, NIT Rourkela, Rourkela, India","institution_ids":["https://openalex.org/I16292982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020147267","display_name":"Swadhin Kumar Barisal","orcid":"https://orcid.org/0000-0002-5226-2657"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Swadhin Kumar Barisal","raw_affiliation_strings":["Dept. of CSE, NIT Rourkela, Rourkela, India"],"affiliations":[{"raw_affiliation_string":"Dept. of CSE, NIT Rourkela, Rourkela, India","institution_ids":["https://openalex.org/I16292982"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084869467","display_name":"Shikhar Vaish","orcid":null},"institutions":[{"id":"https://openalex.org/I887998513","display_name":"Bharati Vidyapeeth Deemed University","ror":"https://ror.org/0052mmx10","country_code":"IN","type":"education","lineage":["https://openalex.org/I887998513"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shikhar Vaish","raw_affiliation_strings":["Dept. of IT, Bharati Vidyapeeth COE, Pune, India"],"affiliations":[{"raw_affiliation_string":"Dept. of IT, Bharati Vidyapeeth COE, Pune, India","institution_ids":["https://openalex.org/I887998513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102126034"],"corresponding_institution_ids":["https://openalex.org/I16292982"],"apc_list":null,"apc_paid":null,"fwci":1.2379,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82205077,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"510","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784554660320282},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.7540314793586731},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5810414552688599},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.449327290058136},{"id":"https://openalex.org/keywords/microsoft-windows","display_name":"Microsoft Windows","score":0.4458765983581543},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43278244137763977},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.4298325181007385},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.41894274950027466}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784554660320282},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.7540314793586731},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5810414552688599},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.449327290058136},{"id":"https://openalex.org/C508378895","wikidata":"https://www.wikidata.org/wiki/Q1406","display_name":"Microsoft Windows","level":3,"score":0.4458765983581543},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43278244137763977},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.4298325181007385},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.41894274950027466}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2019.8929513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1539745582","https://openalex.org/W1572811218","https://openalex.org/W1591480890","https://openalex.org/W1639956611","https://openalex.org/W1962980066","https://openalex.org/W1981738628","https://openalex.org/W1988918299","https://openalex.org/W2100044265","https://openalex.org/W2128217000","https://openalex.org/W2129860818","https://openalex.org/W2136159049","https://openalex.org/W2137365926","https://openalex.org/W2138209477","https://openalex.org/W2167240430","https://openalex.org/W2773175795","https://openalex.org/W2952743015","https://openalex.org/W3136767761","https://openalex.org/W6632363105","https://openalex.org/W6635345633"],"related_works":["https://openalex.org/W2377509977","https://openalex.org/W2937484179","https://openalex.org/W753420207","https://openalex.org/W4256444941","https://openalex.org/W25917909","https://openalex.org/W2504308523","https://openalex.org/W2353896575","https://openalex.org/W618686436","https://openalex.org/W1550839482","https://openalex.org/W4239548142"],"abstract_inverted_index":{"Software":[0],"security":[1],"is":[2],"the":[3,39,57,84,90,104,113,117,130,134,141,154,159],"way":[4],"of":[5,56,86,92,116,126],"developing":[6],"software":[7],"such":[8],"that,":[9],"it":[10],"should":[11],"function":[12],"well":[13,97,138],"under":[14],"malicious":[15],"attack.":[16],"In":[17],"this":[18],"paper,":[19],"we":[20],"design":[21],"and":[22,75],"develop":[23],"an":[24],"automation":[25],"tool":[26],"named":[27],"NITRSCT":[28],"(NITR":[29],"System":[30,60],"Call":[31],"Tracer),":[32],"using":[33],"Microsoft's":[34],"package":[35],"to":[36,38,61,136],"listen":[37],"system":[40,65,87],"calls":[41,88],"generated":[42],"by":[43,164],"processes":[44],"or":[45],"threads":[46],"during":[47],"a":[48,64,93,99],"context":[49],"switch.":[50],"It":[51],"will":[52,156],"allow":[53],"any":[54],"version":[55],"Windows":[58,70,78],"Operating":[59],"serve":[62],"as":[63,96,98],"call":[66],"tracer.":[67],"The":[68],"said":[69],"Service":[71,79],"can":[72],"be":[73,137],"installed":[74],"controlled":[76],"through":[77],"Manager.":[80],"This":[81,110],"service":[82],"stores":[83],"sequence":[85,111],"in":[89],"form":[91],"trace":[94],"file":[95,101,122],"text":[100],"along":[102,128],"with":[103,123,129],"SQL":[105],"database":[106],"for":[107],"more":[108],"verbosity.":[109],"represents":[112],"normal":[114],"behaviour":[115],"software.":[118],"A":[119],"well-defined":[120],"log":[121],"different":[124],"level":[125],"verbosity":[127],"Event":[131],"Manager":[132],"enables":[133],"user":[135],"informed":[139],"about":[140],"errors":[142],"that":[143],"might":[144],"have":[145],"incurred":[146],"while":[147],"running":[148],"services":[149],"on":[150],"their":[151],"systems.":[152,167],"Therefore,":[153],"dataset":[155],"help":[157],"improve":[158],"true":[160],"positive":[161],"rates":[162],"detected":[163],"anomaly":[165],"detection":[166]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
