{"id":"https://openalex.org/W4362470899","doi":"https://doi.org/10.1142/s1469026823500025","title":"Malicious Software Detection based on URL-API Intensity Feature Selection Using Deep Spectral Neural Classification for Improving Host Security","display_name":"Malicious Software Detection based on URL-API Intensity Feature Selection Using Deep Spectral Neural Classification for Improving Host Security","publication_year":2023,"publication_date":"2023-03-31","ids":{"openalex":"https://openalex.org/W4362470899","doi":"https://doi.org/10.1142/s1469026823500025"},"language":"en","primary_location":{"id":"doi:10.1142/s1469026823500025","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1469026823500025","pdf_url":null,"source":{"id":"https://openalex.org/S206936884","display_name":"International Journal of Computational Intelligence and Applications","issn_l":"1469-0268","issn":["1469-0268","1757-5885"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311754","host_organization_name":"Imperial College Press","host_organization_lineage":["https://openalex.org/P4310311754"],"host_organization_lineage_names":["Imperial College Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Intelligence and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082409338","display_name":"B Lavanya","orcid":null},"institutions":[{"id":"https://openalex.org/I138876546","display_name":"Vels University","ror":"https://ror.org/00tscx035","country_code":"IN","type":"education","lineage":["https://openalex.org/I138876546"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"B. Lavanya","raw_affiliation_strings":["Vels Institute of Science, Technology and Advanced Studies, Chennai 600117, India"],"affiliations":[{"raw_affiliation_string":"Vels Institute of Science, Technology and Advanced Studies, Chennai 600117, India","institution_ids":["https://openalex.org/I138876546"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011004433","display_name":"C. Shanthi","orcid":null},"institutions":[{"id":"https://openalex.org/I138876546","display_name":"Vels University","ror":"https://ror.org/00tscx035","country_code":"IN","type":"education","lineage":["https://openalex.org/I138876546"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Shanthi","raw_affiliation_strings":["Vels Institute of Science, Technology and Advanced Studies, Chennai 600117, India"],"affiliations":[{"raw_affiliation_string":"Vels Institute of Science, Technology and Advanced Studies, Chennai 600117, India","institution_ids":["https://openalex.org/I138876546"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082409338"],"corresponding_institution_ids":["https://openalex.org/I138876546"],"apc_list":null,"apc_paid":null,"fwci":2.2944,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8977952,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"22","issue":"02","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8956029415130615},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8016611933708191},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6338833570480347},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5770990252494812},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49596962332725525},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46404072642326355},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4418959617614746},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4183049201965332},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41420263051986694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23373505473136902},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21771329641342163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8956029415130615},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8016611933708191},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6338833570480347},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5770990252494812},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49596962332725525},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46404072642326355},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4418959617614746},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4183049201965332},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41420263051986694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23373505473136902},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21771329641342163},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s1469026823500025","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1469026823500025","pdf_url":null,"source":{"id":"https://openalex.org/S206936884","display_name":"International Journal of Computational Intelligence and Applications","issn_l":"1469-0268","issn":["1469-0268","1757-5885"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311754","host_organization_name":"Imperial College Press","host_organization_lineage":["https://openalex.org/P4310311754"],"host_organization_lineage_names":["Imperial College Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Intelligence and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2539869562","https://openalex.org/W2911626912","https://openalex.org/W2997558134","https://openalex.org/W2998979401","https://openalex.org/W3026148475","https://openalex.org/W3207470445"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,14,34,41,49,53,61,64,72,79,83,86,105,112,143,151,166,180,185,215,238,248,252,270,286,297,302],"internet":[4],"of":[5,16,43,107,150,254,267],"services":[6,47],"has":[7],"been":[8],"more":[9],"responsive":[10],"to":[11,36,78,198,202,257],"access":[12,81,203],"through":[13,40],"development":[15],"various":[17,46],"application":[18],"program":[19],"interfaces":[20],"(API).":[21],"Accessing":[22],"an":[23],"HTTP":[24],"uniform":[25],"resource":[26],"locator":[27],"(URL)":[28],"contains":[29],"malicious":[30,123,255],"software":[31,124,295],"intended":[32],"by":[33,82,183,260],"attacker":[35],"create":[37,199],"security":[38,74,303],"breaches":[39],"use":[42],"APIs":[44],"from":[45,111],"on":[48,104,126,158,179,220,251],"internet.":[50,113],"By":[51],"default,":[52],"non-attentive":[54],"URL":[55,101,109,144,182],"downloads":[56],"and":[57,96,132,188,214,244],"installs":[58],"malware":[59,94,168,294],"in":[60,237,292],"background":[62],"without":[63],"user\u2019s":[65],"knowledge.":[66],"The":[67,170,191,262,281],"host":[68,305],"does":[69],"not":[70],"analyze":[71],"API-URL":[73],"certificate":[75,147],"contract":[76],"due":[77],"feature":[80,129],"user.":[84],"Therefore,":[85],"current":[87],"Machine":[88],"Learning":[89],"(ML)":[90],"techniques":[91],"only":[92],"check":[93],"signatures":[95],"certificates":[97],"rather":[98],"than":[99,269,296],"analyzing":[100],"behaviour":[102],"based":[103,125,157,178,219,250],"impact":[106],"a":[108,120,200,225],"accessed":[110],"To":[114],"address":[115],"this":[116],"problem,":[117],"we":[118],"propose":[119],"novel":[121],"intelligent":[122],"URL-API":[127,206],"intensity":[128],"selection":[130],"(IFS)":[131],"deep":[133,232],"spectral":[134,239],"neural":[135,227],"classification":[136],"(DSNC)":[137],"for":[138,231,241],"improving":[139,242,301],"Host":[140],"Security.":[141],"Initially,":[142],"\u2014":[145],"successive":[146,204],"signing":[148],"(SCS)":[149],"user":[152],"link":[153,187],"accessibility":[154],"is":[155,176,235],"verified":[156],"API":[159],"download":[160],"rate":[161],"logs.":[162],"This":[163],"system":[164],"identifies":[165],"best":[167],"software.":[169],"Link":[171],"Redirection":[172,181],"Stability":[173],"Rate":[174],"(LRSR)":[175],"estimated":[177,212],"accessing":[184],"direct":[186],"redirect":[189],"link.":[190],"domain":[192,240],"transformation":[193],"matrix":[194],"(DTM)":[195],"was":[196],"created":[197],"pattern":[201],"features.":[205],"Intensity":[207],"Feature":[208],"Selection":[209],"selects":[210],"each":[211],"feature,":[213],"selected":[216],"features":[217],"are":[218],"soft-max":[221],"logical":[222],"activation":[223],"with":[224],"recurrent":[226],"network":[228],"(RNN)":[229],"optimized":[230],"learning.":[233],"RNN":[234],"trained":[236],"computation":[243],"efficiency.":[245],"It":[246],"predicts":[247],"class":[249,259],"risk":[253],"weight":[256],"categorize":[258],"reference.":[261],"proposed":[263,287],"IFS-DSNC":[264],"achieves":[265],"accuracy":[266],"95.6%":[268],"other":[271],"algorithms":[272],"such":[273],"as":[274],"KNN,":[275],"NB,":[276],"CNN,":[277],"LCS,":[278],"GCRNC":[279],"AGSCR.":[280],"experimental":[282],"result":[283],"shows":[284],"that":[285],"method":[288],"provides":[289],"better":[290],"performance":[291],"finding":[293],"existing":[298],"approaches,":[299],"thereby":[300],"against":[304],"breaching.":[306]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
