{"id":"https://openalex.org/W2186054980","doi":"https://doi.org/10.1109/ic3.2015.7346730","title":"Behavior analysis of malware using machine learning","display_name":"Behavior analysis of malware using machine learning","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2186054980","doi":"https://doi.org/10.1109/ic3.2015.7346730","mag":"2186054980"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2015.7346730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2015.7346730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Eighth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046314035","display_name":"Arshi Dhammi","orcid":null},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Arshi Dhammi","raw_affiliation_strings":["Thapar University, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086900671","display_name":"Maninder Singh","orcid":"https://orcid.org/0000-0001-8489-8759"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Maninder Singh","raw_affiliation_strings":["Thapar University, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046314035"],"corresponding_institution_ids":["https://openalex.org/I162030827"],"apc_list":null,"apc_paid":null,"fwci":1.723,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.85283657,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9524104595184326},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.8153719305992126},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7857909202575684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7573935985565186},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.7215146422386169},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.6342272162437439},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5519030094146729},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.46427127718925476},{"id":"https://openalex.org/keywords/triage","display_name":"Triage","score":0.4390407204627991},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1829427182674408},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.08315473794937134}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9524104595184326},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.8153719305992126},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7857909202575684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7573935985565186},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.7215146422386169},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.6342272162437439},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5519030094146729},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.46427127718925476},{"id":"https://openalex.org/C2777120189","wikidata":"https://www.wikidata.org/wiki/Q780067","display_name":"Triage","level":2,"score":0.4390407204627991},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1829427182674408},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.08315473794937134},{"id":"https://openalex.org/C194828623","wikidata":"https://www.wikidata.org/wiki/Q2861470","display_name":"Emergency medicine","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2015.7346730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2015.7346730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Eighth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1557109513","https://openalex.org/W1581009051","https://openalex.org/W1670263352","https://openalex.org/W1851403712","https://openalex.org/W2024170198","https://openalex.org/W2063898900","https://openalex.org/W2099053789","https://openalex.org/W2133990480","https://openalex.org/W2137314966","https://openalex.org/W2144112223","https://openalex.org/W2150795982","https://openalex.org/W2167671111","https://openalex.org/W6633383323","https://openalex.org/W6635142148","https://openalex.org/W6638913510"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W4285507391","https://openalex.org/W2768892939","https://openalex.org/W2160963033","https://openalex.org/W2507496997","https://openalex.org/W2610659201","https://openalex.org/W3107556205","https://openalex.org/W4234891089","https://openalex.org/W2805262980"],"abstract_inverted_index":{"In":[0,55],"today's":[1],"scenario,":[2],"cyber":[3,21,29,80,138,159],"security":[4,13],"is":[5,31,69],"one":[6],"of":[7,37,43,46,53,88,131,155,165],"the":[8,28,38,50,62,75,98,153,163],"major":[9],"concerns":[10],"in":[11,79,170],"network":[12],"and":[14,48,65,71,105,117,129,161],"malware":[15,99,144,156],"pose":[16],"a":[17,85],"serious":[18],"threat":[19],"to":[20,26,32,61,73,126,136,151],"security.":[22,81],"The":[23,82,94],"foremost":[24],"step":[25],"guard":[27],"system":[30],"have":[33,122,172],"an":[34],"in-depth":[35],"knowledge":[36],"existing":[39],"malware,":[40,44],"various":[41,91],"types":[42],"methods":[45],"detecting":[47],"bypassing":[49],"adverse":[51],"effects":[52],"malware.":[54,132],"this":[56],"work,":[57],"machine":[58],"learning":[59],"approach":[60,134],"fore-going":[63],"static":[64,149],"dynamic":[66],"analysis":[67],"techniques":[68],"investigated":[70],"reported":[72],"discuss":[74],"most":[76],"recent":[77],"trends":[78,169],"study":[83],"captures":[84],"wide":[86],"variety":[87],"samples":[89],"from":[90,119],"online":[92],"sources.":[93],"peculiar":[95],"details":[96],"about":[97],"such":[100],"as":[101],"file":[102],"details,":[103,114],"signatures,":[104],"hosts":[106],"involved,":[107],"affected":[108],"files,":[109],"registry":[110],"keys,":[111],"mutexes,":[112],"section":[113],"imports,":[115],"strings":[116],"results":[118],"different":[120,143],"antivirus":[121],"been":[123,173],"deeply":[124],"analyzed":[125],"conclude":[127],"origin":[128],"functionality":[130],"This":[133],"contributes":[135],"vital":[137],"situation":[139],"awareness":[140],"by":[141],"combining":[142],"discovery":[145],"techniques,":[146],"for":[147,158],"example,":[148],"examination,":[150],"alter":[152],"session":[154],"triage":[157],"defense":[160],"decreases":[162],"count":[164],"false":[166],"alarms.":[167],"Current":[168],"warfare":[171],"determined.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
