{"id":"https://openalex.org/W4396879097","doi":"https://doi.org/10.1145/3647444.3647830","title":"A Comprehensive Survey on Malware Detection Techniques","display_name":"A Comprehensive Survey on Malware Detection Techniques","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396879097","doi":"https://doi.org/10.1145/3647444.3647830"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3647830","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102846591","display_name":"Yogesh Joshi","orcid":"https://orcid.org/0009-0004-7225-308X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yogesh Kumar Joshi","raw_affiliation_strings":["Department of CSE, Ujjain Engineering College, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Ujjain Engineering College, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000478656","display_name":"Nirupma Tiwari","orcid":"https://orcid.org/0009-0008-5926-2204"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nirupma Tiwari","raw_affiliation_strings":["Advance CSE , Sage University, India"],"affiliations":[{"raw_affiliation_string":"Advance CSE , Sage University, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102846591"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5943,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68276503,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9718000292778015,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7933351397514343},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6723959445953369},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4802320599555969},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3910209536552429}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7933351397514343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6723959445953369},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4802320599555969},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3910209536552429}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3647830","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W9976069","https://openalex.org/W131049964","https://openalex.org/W163840697","https://openalex.org/W1510447169","https://openalex.org/W1544837488","https://openalex.org/W1956767865","https://openalex.org/W1964406293","https://openalex.org/W1973403081","https://openalex.org/W1979897768","https://openalex.org/W1997931601","https://openalex.org/W1999384499","https://openalex.org/W2021264330","https://openalex.org/W2043756236","https://openalex.org/W2122492127","https://openalex.org/W2132874238","https://openalex.org/W2144112223","https://openalex.org/W2520494781","https://openalex.org/W2586431523","https://openalex.org/W2606250847","https://openalex.org/W2745390745","https://openalex.org/W2754625712","https://openalex.org/W2766576889","https://openalex.org/W2790670692","https://openalex.org/W2895892359","https://openalex.org/W2929803724","https://openalex.org/W2950754826","https://openalex.org/W2969056433","https://openalex.org/W2998074434","https://openalex.org/W3015040203","https://openalex.org/W3020335785","https://openalex.org/W3028352235","https://openalex.org/W3214520572","https://openalex.org/W4236831438","https://openalex.org/W4246652336","https://openalex.org/W6743870243","https://openalex.org/W6761100106"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453"],"abstract_inverted_index":{"Malware,":[0],"malicious":[1],"software":[2],"designed":[3],"to":[4,49,58],"infiltrate":[5],"and":[6,32,40,115],"compromise":[7],"computer":[8],"systems,":[9],"poses":[10],"an":[11],"ever-growing":[12],"threat":[13],"in":[14,66,71,105],"today's":[15],"interconnected":[16],"world.":[17],"This":[18,55,108],"comprehensive":[19,61],"review":[20],"delves":[21],"into":[22],"the":[23,64,99,111,116],"diverse":[24],"landscape":[25],"of":[26,63,92,101,119],"malware":[27,67,120],"detection":[28,51,68],"techniques.":[29,35],"We":[30],"categorize":[31],"analyze":[33],"these":[34,103],"Each":[36],"approach's":[37],"strengths,":[38],"weaknesses,":[39],"real-world":[41],"applications":[42],"are":[43,53],"thoroughly":[44],"examined.":[45],"Evaluation":[46],"metrics":[47],"crucial":[48],"assessing":[50],"effectiveness":[52],"elucidated.":[54],"paper":[56,109],"aims":[57],"provide":[59],"a":[60,78],"overview":[62],"challenges":[65,100],"techniques":[69,83,94,104],"face":[70],"protecting":[72],"cyberspace":[73],"against":[74],"attacks,":[75],"by":[76],"presenting":[77],"literature":[79],"on":[80],"such":[81],"emerging":[82],"for":[84],"cyber":[85,106],"security.":[86,107],"It":[87,96],"also":[88],"provides":[89,110],"brief":[90],"descriptions":[91],"each":[93],"method.":[95],"finally":[97],"discusses":[98],"using":[102],"latest":[112],"extensive":[113],"bibliography":[114],"current":[117],"trends":[118],"detection.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
