{"id":"https://openalex.org/W2110143557","doi":"https://doi.org/10.1145/1281192.1281308","title":"IMDS","display_name":"IMDS","publication_year":2007,"publication_date":"2007-08-12","ids":{"openalex":"https://openalex.org/W2110143557","doi":"https://doi.org/10.1145/1281192.1281308","mag":"2110143557"},"language":"en","primary_location":{"id":"doi:10.1145/1281192.1281308","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1281192.1281308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101586436","display_name":"Yanfang Ye","orcid":"https://orcid.org/0000-0001-8376-7239"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanfang Ye","raw_affiliation_strings":["Xiamen University, Xiamen, China","Xiamen University, Xiamen, CHINA"],"affiliations":[{"raw_affiliation_string":"Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"Xiamen University, Xiamen, CHINA","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101983506","display_name":"Dingding Wang","orcid":"https://orcid.org/0000-0003-2339-8050"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dingding Wang","raw_affiliation_strings":["Florida International University, Miami, FL"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455259","display_name":"Tao Li","orcid":"https://orcid.org/0000-0001-9277-1539"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["Florida International University, Miami, FL"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087929314","display_name":"YE Dong-yi","orcid":null},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongyi Ye","raw_affiliation_strings":["Fuzhou University, Fu Zhou, China","Fuzhou University, Fu Zhou, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Fuzhou University, Fu Zhou, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"Fuzhou University, Fu Zhou, China#TAB#","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101586436"],"corresponding_institution_ids":["https://openalex.org/I191208505"],"apc_list":null,"apc_paid":null,"fwci":9.7171,"has_fulltext":false,"cited_by_count":195,"citation_normalized_percentile":{"value":0.98508127,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1043","last_page":"1047"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8363525867462158},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7747743129730225},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6118543148040771},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5963872075080872},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5753869414329529},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.5580325126647949},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5539921522140503},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4675062596797943},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4422680735588074},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43447232246398926},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3442167341709137},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2575441598892212}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8363525867462158},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7747743129730225},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6118543148040771},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5963872075080872},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5753869414329529},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.5580325126647949},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5539921522140503},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4675062596797943},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4422680735588074},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43447232246398926},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3442167341709137},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2575441598892212}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1281192.1281308","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1281192.1281308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1482228399","https://openalex.org/W1506285740","https://openalex.org/W1515026043","https://openalex.org/W1544837488","https://openalex.org/W1565377632","https://openalex.org/W1578351389","https://openalex.org/W1938740620","https://openalex.org/W1971505071","https://openalex.org/W2064853889","https://openalex.org/W2099053789","https://openalex.org/W2117169652","https://openalex.org/W2128057906","https://openalex.org/W2140190241","https://openalex.org/W2144112223","https://openalex.org/W2154053567","https://openalex.org/W2154642793","https://openalex.org/W2172000360","https://openalex.org/W2186428165","https://openalex.org/W2390391074","https://openalex.org/W2914982603","https://openalex.org/W2966207845","https://openalex.org/W4244519650","https://openalex.org/W4252403066","https://openalex.org/W4300874750"],"related_works":["https://openalex.org/W3080622597","https://openalex.org/W2345184372","https://openalex.org/W2660067476","https://openalex.org/W3013515612","https://openalex.org/W2136184105","https://openalex.org/W2187500075","https://openalex.org/W2041399278","https://openalex.org/W4283267686","https://openalex.org/W2160451891","https://openalex.org/W2789232685"],"abstract_inverted_index":{"The":[0],"proliferation":[1],"of":[2,12,36,66,99,107,127],"malware":[3,115],"has":[4],"presented":[5],"a":[6,96],"serious":[7],"threat":[8],"to":[9,20,84,112],"the":[10,34,47,104,123],"security":[11],"computer":[13],"systems.":[14],"Traditional":[15],"signature-based":[16],"anti-virus":[17,105,134],"systems":[18,151],"fail":[19],"detect":[21],"polymorphic":[22],"and":[23,75,125,140,160],"new,":[24],"previously":[25],"unseen":[26],"malicious":[27],"executables.":[28],"In":[29],"this":[30],"paper,":[31],"resting":[32],"on":[33,95],"analysis":[35],"Windows":[37],"API":[38],"execution":[39],"sequences":[40],"called":[41],"by":[42],"PE":[43,70,100],"files,":[44],"we":[45],"develop":[46],"Intelligent":[48],"Malware":[49],"Detection":[50],"System":[51],"(IMDS)":[52],"using":[53],"Objective-Oriented":[54],"Association":[55],"(OOA)":[56],"mining":[57,148],"based":[58,77,149],"classification.":[59,90],"IMDS":[60,129],"is":[61,82,110],"an":[62],"integrated":[63],"system":[64,130],"consisting":[65],"three":[67],"major":[68],"modules:":[69],"parser,":[71],"OOA":[72,87],"rule":[73,76],"generator,":[74],"classifier.":[78],"An":[79],"OOA_Fast_FP-Growth":[80],"algorithm":[81],"adapted":[83],"efficiently":[85],"generate":[86],"rules":[88],"for":[89],"A":[91],"comprehensive":[92],"experimental":[93,119],"study":[94],"large":[97],"collection":[98],"files":[101],"obtained":[102],"from":[103],"laboratory":[106],"King-Soft":[108],"Corporation":[109],"performed":[111],"compare":[113],"various":[114],"detection":[116,150],"approaches.":[117],"Promising":[118],"results":[120],"demonstrate":[121],"that":[122],"accuracy":[124],"efficiency":[126],"our":[128],"out":[131],"perform":[132],"popular":[133],"software":[135],"such":[136],"as":[137,143,145],"Norton":[138],"AntiVirus":[139],"McAfee":[141],"VirusScan,":[142],"well":[144],"previous":[146],"data":[147],"which":[152],"employed":[153],"Naive":[154],"Bayes,":[155],"Support":[156],"Vector":[157],"Machine":[158],"(SVM)":[159],"Decision":[161],"Tree":[162],"techniques.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":15},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":17},{"year":2014,"cited_by_count":14},{"year":2013,"cited_by_count":15},{"year":2012,"cited_by_count":14}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
