{"id":"https://openalex.org/W3031171223","doi":"https://doi.org/10.1145/3386723.3387839","title":"Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide","display_name":"Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide","publication_year":2020,"publication_date":"2020-03-31","ids":{"openalex":"https://openalex.org/W3031171223","doi":"https://doi.org/10.1145/3386723.3387839","mag":"3031171223"},"language":"en","primary_location":{"id":"doi:10.1145/3386723.3387839","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3386723.3387839","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Networking, Information Systems &amp; Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058330404","display_name":"Ikram Ben Abdel Ouahab","orcid":"https://orcid.org/0000-0003-0955-6382"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Ben Abdel Ouahab Ikram","raw_affiliation_strings":["Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112493584","display_name":"El Aachak Lotfi","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"El Aachak Lotfi","raw_affiliation_strings":["Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076145757","display_name":"Boudhir Anouar Abdelhakim","orcid":"https://orcid.org/0000-0003-4036-9956"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Boudhir Anouar Abdelhakim","raw_affiliation_strings":["Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042942039","display_name":"Mohammed Bouhorma","orcid":"https://orcid.org/0000-0002-5687-5231"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Bouhorma Mohammed","raw_affiliation_strings":["Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058330404"],"corresponding_institution_ids":["https://openalex.org/I240042149"],"apc_list":null,"apc_paid":null,"fwci":0.4546,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59901251,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7882019281387329},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.762994647026062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.748151421546936},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5932551622390747},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5005307197570801},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.44626516103744507},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42027753591537476},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4083758294582367},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.40561771392822266},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37198951840400696}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7882019281387329},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.762994647026062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.748151421546936},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5932551622390747},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5005307197570801},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.44626516103744507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42027753591537476},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4083758294582367},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.40561771392822266},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37198951840400696}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3386723.3387839","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3386723.3387839","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Networking, Information Systems &amp; Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1566135517","https://openalex.org/W1581009051","https://openalex.org/W2010065958","https://openalex.org/W2037109870","https://openalex.org/W2204544304","https://openalex.org/W2425931228","https://openalex.org/W2704360550","https://openalex.org/W2783615536","https://openalex.org/W4230634499"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"Malwares":[0],"attacks":[1,30,66],"are":[2,24],"becoming":[3],"increasingly":[4],"destructive.":[5],"Hackers":[6],"target":[7],"all":[8],"types":[9],"of":[10,120,153],"devices":[11],"from":[12,140],"big":[13],"to":[14,27,44,51,99,131,142],"the":[15,40,118],"most":[16],"little":[17],"ones.":[18],"Researcher's":[19],"communities":[20],"in":[21,64,138,146],"cybersecurity":[22,61],"field":[23],"working":[25],"hard":[26],"defend":[28,45],"malwares":[29,65,76,115,123],"as":[31,33,47,49],"well":[32],"any":[34],"other":[35],"malicious":[36],"activity.":[37],"In":[38,55,78],"fact,":[39],"primary":[41],"goal":[42],"is":[43,97,111],"cyberattacks":[46],"fast":[48],"possible":[50],"avoid":[52],"catastrophic":[53],"damages.":[54],"this":[56],"paper,":[57],"we":[58,80,125,136],"proposed":[59],"new":[60],"architecture":[62],"specialized":[63],"defense.":[67],"This":[68],"proposal":[69],"puts":[70],"together":[71],"four":[72],"layers":[73],"based":[74],"on":[75],"behaviors.":[77,116],"addition,":[79],"perform":[81],"malware":[82,85,103],"classifier":[83,96],"using":[84],"visualization":[86],"technique,":[87],"GIST":[88,133],"descriptor":[89],"features":[90,145],"and":[91],"K-Nearest":[92],"Neighbor":[93],"algorithm.":[94],"The":[95],"able":[98],"put":[100],"each":[101],"input":[102],"image":[104],"into":[105],"its":[106],"corresponding":[107],"family.":[108],"Families":[109],"distribution":[110],"been":[112],"divided":[113],"by":[114],"For":[117],"purpose":[119],"attaining":[121],"speedy":[122],"classifier,":[124],"use":[126],"Univariate":[127],"Feature":[128],"Selection":[129],"technique":[130],"reduce":[132],"feature.":[134],"So":[135],"succeeded":[137],"getting":[139],"320":[141],"only":[143],"50":[144],"less":[147],"timing":[148],"with":[149],"very":[150],"close":[151],"accuracy":[152],"97,67%.":[154]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
