{"id":"https://openalex.org/W2996148525","doi":"https://doi.org/10.1145/3368756.3369098","title":"Machine learning application for malwares classification using visualization technique","display_name":"Machine learning application for malwares classification using visualization technique","publication_year":2019,"publication_date":"2019-10-02","ids":{"openalex":"https://openalex.org/W2996148525","doi":"https://doi.org/10.1145/3368756.3369098","mag":"2996148525"},"language":"en","primary_location":{"id":"doi:10.1145/3368756.3369098","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369098","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ben Abdel Ouahab Ikram","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Ben Abdel Ouahab Ikram","raw_affiliation_strings":["University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bouhorma Mohammed","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Bouhorma Mohammed","raw_affiliation_strings":["University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076145757","display_name":"Boudhir Anouar Abdelhakim","orcid":"https://orcid.org/0000-0003-4036-9956"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Boudhir Anouar Abdelhakim","raw_affiliation_strings":["University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112493584","display_name":"El Aachak Lotfi","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"El Aachak Lotfi","raw_affiliation_strings":["University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090347318","display_name":"Bassam Zafar","orcid":"https://orcid.org/0000-0001-5083-1548"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Bassam Zafar","raw_affiliation_strings":["King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I240042149"],"apc_list":null,"apc_paid":null,"fwci":1.7124,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85615491,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9603000283241272,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8946073055267334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8283624649047852},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6618647575378418},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.6574284434318542},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6560935974121094},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6162896752357483},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5587650537490845},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4893485903739929},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41712772846221924},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3659347593784332},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22061732411384583},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2027912437915802}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8946073055267334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8283624649047852},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6618647575378418},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.6574284434318542},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6560935974121094},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6162896752357483},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5587650537490845},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4893485903739929},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41712772846221924},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3659347593784332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22061732411384583},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2027912437915802}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3368756.3369098","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369098","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1581009051","https://openalex.org/W1996975221","https://openalex.org/W2010065958","https://openalex.org/W2122111042","https://openalex.org/W2425931228","https://openalex.org/W2704360550","https://openalex.org/W2738091946","https://openalex.org/W2778775032","https://openalex.org/W2782173654","https://openalex.org/W2783615536","https://openalex.org/W4243220130"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W1966145327"],"abstract_inverted_index":{"Nowadays":[0],"attackers":[1],"work":[2],"hard":[3],"to":[4,15,19,119,129],"develop":[5],"efficient":[6],"cyberthreats":[7],"and":[8,24,31,84,115],"exploit":[9],"new":[10],"techniques.":[11],"So":[12],"defenders":[13],"need":[14],"use":[16],"advanced":[17],"methodologies":[18],"combat":[20],"the":[21,35,102],"latest":[22],"threats":[23],"safely":[25],"remove":[26],"them":[27],"from":[28,47,61,97],"computers,":[29],"mobiles":[30],"connected":[32],"devices.":[33],"Without":[34],"intelligent":[36],"techniques,":[37],"these":[38],"devices":[39],"would":[40],"be":[41],"at":[42],"increased":[43],"risk":[44],"of":[45,54,92,95,123],"damage":[46],"malicious":[48],"programs.":[49],"Recently":[50],"a":[51,90,110,121],"novel":[52],"approach":[53],"processing":[55],"malwares":[56,71,80,96],"was":[57,113],"appeared;":[58],"it":[59],"passes":[60],"malware":[62,65,85,107],"binaries":[63],"into":[64],"images.":[66,108],"Researchers":[67],"found":[68,131],"similarities":[69],"in":[70],"images":[72],"by":[73],"extracting":[74],"specific":[75],"features.":[76],"This":[77],"paper":[78],"presents":[79],"classifier":[81],"using":[82],"KNN":[83,111],"visualization":[86],"technique.":[87],"We":[88,100],"used":[89],"database":[91],"9339":[93],"samples":[94],"25":[98],"families.":[99],"calculated":[101],"GIST":[103],"descriptor":[104],"for":[105],"grayscale":[106],"Then":[109],"model":[112],"trained":[114],"evaluated":[116],"many":[117],"times":[118],"reach":[120],"score":[122],"97%,":[124],"which":[125],"is":[126],"very":[127],"close":[128],"results":[130],"on":[132],"literature.":[133]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
