{"id":"https://openalex.org/W2897940102","doi":"https://doi.org/10.1145/3264437.3264478","title":"Development of method for malware classification based on statistical methods and an extended set of system calls data","display_name":"Development of method for malware classification based on statistical methods and an extended set of system calls data","publication_year":2018,"publication_date":"2018-09-10","ids":{"openalex":"https://openalex.org/W2897940102","doi":"https://doi.org/10.1145/3264437.3264478","mag":"2897940102"},"language":"en","primary_location":{"id":"doi:10.1145/3264437.3264478","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037382667","display_name":"Liudmila Babenko","orcid":"https://orcid.org/0000-0003-2353-7911"},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Ludmila Babenko","raw_affiliation_strings":["Southern Federal University, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Southern Federal University, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072117285","display_name":"Alexey Kirillov","orcid":null},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Alexey Kirillov","raw_affiliation_strings":["Southern Federal University, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Southern Federal University, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037382667"],"corresponding_institution_ids":["https://openalex.org/I137534880"],"apc_list":null,"apc_paid":null,"fwci":0.1658,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.46898166,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8103455305099487},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7955467104911804},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6208000779151917},{"id":"https://openalex.org/keywords/one-class-classification","display_name":"One-class classification","score":0.5928424596786499},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5789968967437744},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.560084879398346},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5432925820350647},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5364217758178711},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.49647432565689087},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.4662171006202698},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.4396813213825226},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.43404659628868103},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.37765857577323914},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.14588025212287903}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8103455305099487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7955467104911804},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6208000779151917},{"id":"https://openalex.org/C34872919","wikidata":"https://www.wikidata.org/wiki/Q7092302","display_name":"One-class classification","level":3,"score":0.5928424596786499},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5789968967437744},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.560084879398346},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5432925820350647},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5364217758178711},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.49647432565689087},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.4662171006202698},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.4396813213825226},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.43404659628868103},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.37765857577323914},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.14588025212287903},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3264437.3264478","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1673310716","https://openalex.org/W1977556410","https://openalex.org/W2021436318","https://openalex.org/W2067191022","https://openalex.org/W2100550848","https://openalex.org/W2141278204","https://openalex.org/W2168154523","https://openalex.org/W2217442075","https://openalex.org/W2342877402","https://openalex.org/W2508015754","https://openalex.org/W2553476679","https://openalex.org/W2557513839","https://openalex.org/W2706078957","https://openalex.org/W2785118416","https://openalex.org/W4292023222"],"related_works":["https://openalex.org/W1586252162","https://openalex.org/W4292814203","https://openalex.org/W2770245173","https://openalex.org/W2171206798","https://openalex.org/W2116045975","https://openalex.org/W4390778193","https://openalex.org/W2565151897","https://openalex.org/W2000537656","https://openalex.org/W4281776617","https://openalex.org/W4365421262"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5,12,48],"method":[6,37,66],"for":[7],"malware":[8,33],"classification,":[9],"by":[10],"applying":[11],"statistical":[13],"methods":[14,55],"to":[15,27,46,68,78],"an":[16],"extended":[17],"data":[18],"set":[19],"of":[20,32,38,50,71,82],"system":[21],"function":[22],"calls,":[23],"it":[24,43],"becomes":[25],"possible":[26,45],"improve":[28],"the":[29,36,64],"classification":[30,39,51,54],"quality":[31,49],"samples.":[34],"Applying":[35],"with":[40,53],"unsupervised":[41],"learning,":[42,59],"is":[44],"achieve":[47],"comparable":[52],"based":[56],"on":[57],"supervised":[58],"including":[60],"neural":[61],"networks.":[62],"Thus,":[63],"proposed":[65],"allows":[67],"perform":[69],"detection":[70],"previously":[72],"unknown":[73,80],"families":[74],"and":[75],"more":[76],"efficiently":[77],"detect":[79],"samples":[81],"small":[83],"families.":[84]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
