{"id":"https://openalex.org/W4205796731","doi":"https://doi.org/10.1109/bigdata52589.2021.9671434","title":"Malware Detection and Prevention using Artificial Intelligence Techniques","display_name":"Malware Detection and Prevention using Artificial Intelligence Techniques","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4205796731","doi":"https://doi.org/10.1109/bigdata52589.2021.9671434"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata52589.2021.9671434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671434","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2206.12770","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007582133","display_name":"Md Jobair Hossain Faruk","orcid":"https://orcid.org/0000-0002-6316-5334"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Jobair Hossain Faruk","raw_affiliation_strings":["Department of Software Engineering and Game Development, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering and Game Development, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052820694","display_name":"Hossain Shahriar","orcid":"https://orcid.org/0000-0003-1021-7986"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossain Shahriar","raw_affiliation_strings":["Department of Information Technology, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053766392","display_name":"Maria Valero","orcid":"https://orcid.org/0000-0001-8913-9604"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maria Valero","raw_affiliation_strings":["Department of Information Technology, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049836304","display_name":"Farhat Lamia Barsha","orcid":"https://orcid.org/0000-0002-1657-6798"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farhat Lamia Barsha","raw_affiliation_strings":["Department of Computer Science, Tennessee Tech University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee Tech University, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068038734","display_name":"Shahriar Sobhan","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shahriar Sobhan","raw_affiliation_strings":["Institute for Cyber Workforce Development, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Workforce Development, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108662451","display_name":"Md Abdullah Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Abdullah Khan","raw_affiliation_strings":["Department Computer Science, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Department Computer Science, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083736242","display_name":"Michael E. Whitman","orcid":"https://orcid.org/0000-0002-4075-0995"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Whitman","raw_affiliation_strings":["Institute for Cyber Workforce Development, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Workforce Development, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053225136","display_name":"Alfredo Cuzzocrea","orcid":"https://orcid.org/0000-0002-7104-6415"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR","IT"],"is_corresponding":false,"raw_author_name":"Alfredo Cuzzocrea","raw_affiliation_strings":["LORIA, Nancy, France","iDEA Lab, University of Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"LORIA, Nancy, France","institution_ids":["https://openalex.org/I4210121838"]},{"raw_affiliation_string":"iDEA Lab, University of Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085923839","display_name":"Dan Lo","orcid":"https://orcid.org/0000-0003-4396-0370"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Lo","raw_affiliation_strings":["Department Computer Science, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Department Computer Science, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069063267","display_name":"Akond Rahman","orcid":"https://orcid.org/0000-0002-5056-757X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Akond Rahman","raw_affiliation_strings":["Department of Computer Science, Tennessee Tech University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee Tech University, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101803324","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-6248-2784"},"institutions":[{"id":"https://openalex.org/I6026837","display_name":"Tuskegee University","ror":"https://ror.org/0137n4m74","country_code":"US","type":"education","lineage":["https://openalex.org/I6026837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fan Wu","raw_affiliation_strings":["Department of Computer Science, Tuskegee University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tuskegee University, USA","institution_ids":["https://openalex.org/I6026837"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":11,"corresponding_author_ids":["https://openalex.org/A5007582133"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":14.4626,"has_fulltext":false,"cited_by_count":114,"citation_normalized_percentile":{"value":0.99595687,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"5369","last_page":"5377"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8966305255889893},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8037084341049194},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.7118514776229858},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6046234965324402},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.5271317958831787},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45934635400772095}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8966305255889893},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8037084341049194},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.7118514776229858},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6046234965324402},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.5271317958831787},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45934635400772095},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/bigdata52589.2021.9671434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671434","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2206.12770","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2206.12770","pdf_url":"https://arxiv.org/pdf/2206.12770","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2206.12770","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2206.12770","pdf_url":"https://arxiv.org/pdf/2206.12770","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W26711432","https://openalex.org/W1530476416","https://openalex.org/W1534863513","https://openalex.org/W1598913253","https://openalex.org/W1641762327","https://openalex.org/W1973403081","https://openalex.org/W1978115453","https://openalex.org/W2050918226","https://openalex.org/W2101375295","https://openalex.org/W2113461930","https://openalex.org/W2133590498","https://openalex.org/W2187357304","https://openalex.org/W2332699380","https://openalex.org/W2461961314","https://openalex.org/W2744896416","https://openalex.org/W2889384500","https://openalex.org/W2890850111","https://openalex.org/W2902672843","https://openalex.org/W2921161567","https://openalex.org/W2929438235","https://openalex.org/W2949528415","https://openalex.org/W2958447056","https://openalex.org/W2979443898","https://openalex.org/W3006806536","https://openalex.org/W3016094225","https://openalex.org/W3017221918","https://openalex.org/W3030440928","https://openalex.org/W3039782326","https://openalex.org/W3088520142","https://openalex.org/W3090031345","https://openalex.org/W3186448319","https://openalex.org/W3195121218","https://openalex.org/W3212831909","https://openalex.org/W4205416355","https://openalex.org/W4206096989","https://openalex.org/W4210987936","https://openalex.org/W4233261744","https://openalex.org/W4240326195","https://openalex.org/W4287702949","https://openalex.org/W4388488524","https://openalex.org/W6601051852","https://openalex.org/W6632034255","https://openalex.org/W6636864949","https://openalex.org/W6637110787","https://openalex.org/W6675256322","https://openalex.org/W6687018335","https://openalex.org/W6778265617","https://openalex.org/W6781597694"],"related_works":["https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W4256304280","https://openalex.org/W2395100307","https://openalex.org/W2909615516","https://openalex.org/W3183826413","https://openalex.org/W4243179955","https://openalex.org/W3205001643","https://openalex.org/W2557742076","https://openalex.org/W2968504645"],"abstract_inverted_index":{"With":[0],"the":[1,13,24,42,50,116,181],"rapid":[2],"technological":[3],"advancement,":[4],"security":[5,25],"has":[6],"become":[7],"a":[8,20,88,158],"major":[9],"issue":[10],"due":[11],"to":[12,23,69,83,87,94,110,124,170],"increase":[14],"in":[15],"malware":[16,126,154,163,184,203],"activity":[17],"that":[18,66,176],"poses":[19],"serious":[21],"threat":[22],"and":[26,32,74,78,98,104,137,152,168,205],"safety":[27],"of":[28,49,56,120,161,183,193],"both":[29],"computer":[30,72,102],"systems":[31,73,103],"stakeholders.":[33,117],"To":[34],"maintain":[35],"stakeholder\u2019s,":[36],"particularly,":[37],"end":[38],"user\u2019s":[39],"security,":[40],"protecting":[41,115],"data":[43],"from":[44],"fraudulent":[45],"efforts":[46],"is":[47,67,81],"one":[48],"most":[51],"pressing":[52],"concerns.":[53],"A":[54,118],"set":[55],"malicious":[57,97,112],"programming":[58],"code,":[59],"scripts,":[60],"active":[61],"content,":[62],"or":[63,76],"intrusive":[64],"software":[65],"designed":[68,109],"destroy":[70],"intended":[71],"programs":[75],"mobile":[77,105],"web":[79],"applications":[80,106,186],"referred":[82],"as":[84],"malware.":[85],"According":[86],"study,":[89,142],"naive":[90],"users":[91],"are":[92,122],"unable":[93],"distinguish":[95],"between":[96],"benign":[99],"applications.":[100],"Thus,":[101],"should":[107],"be":[108],"detect":[111,125],"activities":[113,127],"towards":[114],"number":[119],"algorithms":[121],"available":[123],"by":[128],"utilizing":[129],"novel":[130],"concepts":[131],"including":[132],"Artificial":[133,145],"Intelligence,":[134],"Machine":[135],"Learning,":[136],"Deep":[138],"Learning.":[139],"In":[140],"this":[141,194],"we":[143],"emphasize":[144],"Intelligence":[146],"(AI)":[147],"based":[148],"techniques":[149],"for":[150,180,199],"detecting":[151],"preventing":[153],"activity.":[155],"We":[156],"present":[157],"detailed":[159],"review":[160],"current":[162],"detection":[164,185,204],"technologies,":[165],"their":[166],"shortcomings,":[167],"ways":[169],"improve":[171],"efficiency.":[172],"Our":[173],"study":[174],"shows":[175],"adopting":[177],"futuristic":[178],"approaches":[179],"development":[182],"shall":[187,196],"provide":[188],"significant":[189],"advantages.":[190],"The":[191],"comprehension":[192],"synthesis":[195],"help":[197],"researchers":[198],"further":[200],"research":[201],"on":[202],"prevention":[206],"using":[207],"AI.":[208]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":42},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2022-01-26T00:00:00"}
