{"id":"https://openalex.org/W2046345239","doi":"https://doi.org/10.1145/1569901.1570233","title":"Are evolutionary rule learning algorithms appropriate for malware detection?","display_name":"Are evolutionary rule learning algorithms appropriate for malware detection?","publication_year":2009,"publication_date":"2009-07-08","ids":{"openalex":"https://openalex.org/W2046345239","doi":"https://doi.org/10.1145/1569901.1570233","mag":"2046345239"},"language":"en","primary_location":{"id":"doi:10.1145/1569901.1570233","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1569901.1570233","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100771200","display_name":"Muhammad Shafiq","orcid":"https://orcid.org/0000-0003-1909-9373"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"M. Zubair Shafiq","raw_affiliation_strings":["National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan","National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan#TAB#"],"affiliations":[{"raw_affiliation_string":"National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan#TAB#","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077609157","display_name":"S. Momina Tabish","orcid":null},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"S. Momina Tabish","raw_affiliation_strings":["National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan","National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan#TAB#"],"affiliations":[{"raw_affiliation_string":"National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan#TAB#","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103408949","display_name":"Muddassar Farooq","orcid":"https://orcid.org/0009-0009-1882-7819"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muddassar Farooq","raw_affiliation_strings":["National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan","National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan#TAB#"],"affiliations":[{"raw_affiliation_string":"National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan#TAB#","institution_ids":["https://openalex.org/I201384688"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100771200"],"corresponding_institution_ids":["https://openalex.org/I201384688"],"apc_list":null,"apc_paid":null,"fwci":1.7447,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86879813,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1915","last_page":"1916"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10100","display_name":"Metaheuristic Optimization Algorithms Research","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8130104541778564},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.8124424815177917},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7939448952674866},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6318926811218262},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.628536581993103},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.5109819173812866},{"id":"https://openalex.org/keywords/rule-based-system","display_name":"Rule-based system","score":0.5035175681114197},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.49668747186660767},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.42602843046188354},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3615589141845703},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3212900757789612},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16558727622032166},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14018502831459045}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8130104541778564},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.8124424815177917},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7939448952674866},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6318926811218262},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.628536581993103},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.5109819173812866},{"id":"https://openalex.org/C149271511","wikidata":"https://www.wikidata.org/wiki/Q1417149","display_name":"Rule-based system","level":2,"score":0.5035175681114197},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.49668747186660767},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.42602843046188354},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3615589141845703},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3212900757789612},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16558727622032166},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14018502831459045}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1569901.1570233","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1569901.1570233","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1529910098","https://openalex.org/W2146713522"],"related_works":["https://openalex.org/W2350278424","https://openalex.org/W2071432835","https://openalex.org/W4239401009","https://openalex.org/W2097492617","https://openalex.org/W4234371507","https://openalex.org/W1628824497","https://openalex.org/W4299534542","https://openalex.org/W2053441600","https://openalex.org/W1995118279","https://openalex.org/W4240624848"],"abstract_inverted_index":{"In":[0,56],"this":[1,35],"paper,":[2],"we":[3,59],"evaluate":[4,60],"the":[5,49,61,76,81,86,89,94,98],"performance":[6,62],"of":[7,26,38,41,51,63,78,88,97,104],"ten":[8],"well-known":[9],"evolutionary":[10,111],"and":[11,92],"non-evolutionary":[12],"rule":[13,64,83,99,112],"learning":[14,65,100,113],"algorithms.":[15],"The":[16,30,102],"comparative":[17],"study":[18,106],"is":[19],"performed":[20],"on":[21],"a":[22,39,122],"real-world":[23,123],"classification":[24,73],"problem":[25],"detecting":[27],"malicious":[28],"executables.":[29],"executable":[31],"dataset,":[32],"used":[33],"in":[34,80,110,121],"study,":[36,58],"consists":[37],"total":[40],"189":[42],"attributes":[43],"which":[44],"are":[45],"statically":[46],"extracted":[47],"from":[48],"executables":[50],"Microsoft":[52],"Windows":[53],"operating":[54],"system.":[55,126],"our":[57,105],"algorithms":[66],"with":[67],"respect":[68],"to":[69],"four":[70],"metrics:":[71],"(1)":[72],"accuracy,":[74],"(2)":[75],"number":[77],"rules":[79],"developed":[82],"set,":[84],"(3)":[85],"comprehensibility":[87],"generated":[90],"rules,":[91],"(4)":[93],"processing":[95],"overhead":[96],"process.":[101],"results":[103],"highlight":[107],"important":[108],"shortcomings":[109],"classifiers":[114],"that":[115],"render":[116],"them":[117],"infeasible":[118],"for":[119],"deployment":[120],"malware":[124],"detection":[125]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
