{"id":"https://openalex.org/W4312417093","doi":"https://doi.org/10.1145/3549206.3549284","title":"Explainable Machine Learning For Malware Detection Using Ensemble Bagging Algorithms","display_name":"Explainable Machine Learning For Malware Detection Using Ensemble Bagging Algorithms","publication_year":2022,"publication_date":"2022-08-04","ids":{"openalex":"https://openalex.org/W4312417093","doi":"https://doi.org/10.1145/3549206.3549284"},"language":"en","primary_location":{"id":"doi:10.1145/3549206.3549284","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3549206.3549284","pdf_url":null,"source":{"id":"https://openalex.org/S4363609025","display_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052799722","display_name":"Rajesh Kumar","orcid":"https://orcid.org/0000-0002-1306-464X"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajesh Kumar","raw_affiliation_strings":["School of Computer Science Engineering, Vellore Institute of Technology, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Engineering, Vellore Institute of Technology, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":null,"display_name":"Geetha Subbiah","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Geetha Subbiah","raw_affiliation_strings":["School of Computer Science Engineering, Vellore Institute of Technology, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Engineering, Vellore Institute of Technology, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052799722"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":0.4861,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61189802,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"453","last_page":"460"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8613343238830566},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8212392330169678},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7048165202140808},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6172702312469482},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6135594844818115},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.4926043152809143},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47090697288513184},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.41360366344451904},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1545071303844452}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8613343238830566},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8212392330169678},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7048165202140808},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6172702312469482},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6135594844818115},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.4926043152809143},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47090697288513184},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.41360366344451904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1545071303844452}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3549206.3549284","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3549206.3549284","pdf_url":null,"source":{"id":"https://openalex.org/S4363609025","display_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1558357780","https://openalex.org/W2518866423","https://openalex.org/W2745604838","https://openalex.org/W2752241832","https://openalex.org/W2789766369","https://openalex.org/W2898457271","https://openalex.org/W2902662365","https://openalex.org/W2931858311","https://openalex.org/W2999615587","https://openalex.org/W3083703328","https://openalex.org/W3090046868","https://openalex.org/W3096373768","https://openalex.org/W3118316519","https://openalex.org/W3129442285","https://openalex.org/W3133336665","https://openalex.org/W3135539425","https://openalex.org/W3138102940","https://openalex.org/W4210701745"],"related_works":["https://openalex.org/W1827256152","https://openalex.org/W4385746556","https://openalex.org/W4285741730","https://openalex.org/W4285046548","https://openalex.org/W1470425429","https://openalex.org/W3123408856","https://openalex.org/W4318350883","https://openalex.org/W3134203460","https://openalex.org/W4362680613","https://openalex.org/W4379117450"],"abstract_inverted_index":{"Vulnerabilities":[0],"in":[1,13,39,70,109,115,211],"various":[2],"software":[3],"products":[4],"can":[5,50,146],"be":[6,51,147],"used":[7,31,123],"to":[8,74,86,105,124,133,149],"attack":[9,161],"the":[10,24,27,33,37,76,107,116,138,160,168,181,188,191,203,208,212,216],"security":[11,163],"systems":[12,40,60],"any":[14],"organization":[15],"anywhere.":[16],"Malware":[17],"is":[18,73,173,193],"downloaded":[19],"after":[20],"a":[21,44],"click":[22],"on":[23,102,162,197],"hyperlink":[25],"by":[26,53,92,187],"unsuspecting":[28],"user":[29],"and":[30,66,78,90,136,214],"as":[32,63,156],"exploitation":[34],"tool":[35],"for":[36,41,111,120,167,175,206],"vulnerabilities":[38],"attacks.":[42],"Detecting":[43],"large":[45],"number":[46],"of":[47,80,140,200],"malware":[48,88,154,158],"effectively":[49,89,150],"possible":[52],"machine":[54,94],"learning.":[55,95],"However,":[56],"Machine":[57],"learning":[58],"based":[59,101,196],"have":[61],"misclassification":[62,121,135],"false":[64,67],"positives":[65],"negatives.":[68],"Novelty":[69],"this":[71],"paper":[72,97],"improve":[75],"efficiency":[77],"robustness":[79],"ensemble":[81],"bagging":[82,141,171],"algorithm":[83,172],"Extra":[84,169],"tree":[85,170],"detect":[87,106,151],"robustly":[91],"explainable":[93],"The":[96,113,128,143,165],"uses":[98],"waterfall":[99],"plots":[100],"Shapley":[103,198],"value":[104,199],"trends":[108,114],"features":[110,119,201,205],"misclassification.":[112],"five":[117],"topmost":[118,204],"are":[122,131,184],"make":[125],"inductive":[126,129,144,189,217],"rules.":[127],"rules":[130,145,190],"applied":[132,148],"overcome":[134],"enhance":[137],"performance":[139],"algorithms.":[142],"unknown":[152,177],"future":[153,176],"known":[155],"zero-day":[157],"preventing":[159],"systems.":[164],"accuracy":[166,192],"98.1%":[174],"malware.":[178],"Considering,":[179],"that":[180],"misclassified":[182,209],"samples":[183,210],"also":[185],"detected":[186],"100%.":[194],"Heatmap":[195],"confirms":[202],"all":[207],"dataset":[213],"strengthens":[215],"rule.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
