{"id":"https://openalex.org/W3039528609","doi":"https://doi.org/10.1145/3403746.3403924","title":"Space Filling Curve Mapping for Malware Detection and Classification","display_name":"Space Filling Curve Mapping for Malware Detection and Classification","publication_year":2020,"publication_date":"2020-05-22","ids":{"openalex":"https://openalex.org/W3039528609","doi":"https://doi.org/10.1145/3403746.3403924","mag":"3039528609"},"language":"en","primary_location":{"id":"doi:10.1145/3403746.3403924","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3403746.3403924","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 3rd International Conference on Computer Science and Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079081178","display_name":"Zhuojun Ren","orcid":"https://orcid.org/0000-0001-9108-7743"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhuojun Ren","raw_affiliation_strings":["College of Information Science and Technology, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102992722","display_name":"Guang Chen","orcid":"https://orcid.org/0000-0003-1487-8044"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Chen","raw_affiliation_strings":["College of Information Science and Technology, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008173961","display_name":"Wenke Lu","orcid":"https://orcid.org/0000-0002-6753-4061"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenke Lu","raw_affiliation_strings":["College of Information Science and Technology, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079081178"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":0.3031,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.52949309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"176","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8800115585327148},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7443827986717224},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6924318075180054},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6251373291015625},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6092056632041931},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5807865262031555},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4837522506713867},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.45638611912727356},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4350746273994446},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42858558893203735},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4209422171115875},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4031558036804199},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3268125355243683},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09858036041259766}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8800115585327148},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7443827986717224},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6924318075180054},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6251373291015625},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6092056632041931},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5807865262031555},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4837522506713867},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.45638611912727356},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4350746273994446},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42858558893203735},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4209422171115875},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4031558036804199},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3268125355243683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09858036041259766},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3403746.3403924","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3403746.3403924","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 3rd International Conference on Computer Science and Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5286294231","display_name":null,"funder_award_id":"61671006","funder_id":"https://openalex.org/F4320327720","funder_display_name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China"},{"id":"https://openalex.org/G7476448093","display_name":null,"funder_award_id":"14D310407","funder_id":"https://openalex.org/F4320334997","funder_display_name":"Chinese Universities Scientific Fund"}],"funders":[{"id":"https://openalex.org/F4320327720","display_name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China","ror":null},{"id":"https://openalex.org/F4320334997","display_name":"Chinese Universities Scientific Fund","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W172558989","https://openalex.org/W1686810756","https://openalex.org/W1978967226","https://openalex.org/W1993906297","https://openalex.org/W1995875735","https://openalex.org/W1999980641","https://openalex.org/W2043263066","https://openalex.org/W2047167450","https://openalex.org/W2053959006","https://openalex.org/W2060454056","https://openalex.org/W2064073288","https://openalex.org/W2108104525","https://openalex.org/W2150423842","https://openalex.org/W4241649931"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4316881845"],"abstract_inverted_index":{"Shannon":[0],"entropy":[1],"can":[2,17,36],"reflect":[3],"whether":[4],"malware":[5,25,92],"is":[6,12],"encrypted":[7],"or":[8],"compressed,":[9],"so":[10],"it":[11],"important":[13],"that":[14,35,50],"security":[15],"analysts":[16],"locate":[18],"obfuscated":[19],"regions":[20],"by":[21,63,75],"higher-entropy":[22],"values.":[23],"Moreover,":[24],"files":[26],"belonging":[27],"to":[28,57],"the":[29,40,65,72,83],"same":[30],"families":[31],"share":[32],"similar":[33],"modules":[34],"be":[37],"shown":[38],"in":[39],"form":[41],"of":[42,89],"entropy.":[43],"So":[44],"we":[45],"present":[46],"a":[47],"new":[48],"method":[49,85],"uses":[51],"space":[52],"filling":[53],"curve":[54],"mapping":[55],"(SFCM)":[56],"visualize":[58],"malware,":[59],"extracts":[60],"image":[61],"features":[62],"using":[64],"deep":[66],"convolution":[67],"neural":[68],"networks":[69],"and":[70,94,99],"classifies":[71],"generated":[73],"images":[74],"SVM":[76],"(support":[77],"vector":[78],"machine)":[79],"classifier.":[80],"We":[81],"verified":[82],"proposed":[84],"with":[86],"7162":[87],"samples":[88],"24":[90],"Kaspersky":[91],"families,":[93],"obtained":[95],"99.44%":[96],"detection":[97],"accuracy":[98],"98.56%":[100],"classification":[101],"accuracy.":[102]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
