{"id":"https://openalex.org/W4396852356","doi":"https://doi.org/10.1145/3647444.3647868","title":"An investigation of Malware Detection System using Deep Learning on computing Systems","display_name":"An investigation of Malware Detection System using Deep Learning on computing Systems","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396852356","doi":"https://doi.org/10.1145/3647444.3647868"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3647868","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000079544","display_name":"Satyajee Srivastava","orcid":"https://orcid.org/0000-0001-5791-1540"},"institutions":[{"id":"https://openalex.org/I155284866","display_name":"Maharishi Markandeshwar University, Mullana","ror":"https://ror.org/013qfkw58","country_code":"IN","type":"education","lineage":["https://openalex.org/I155284866"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Satyajee Srivastava","raw_affiliation_strings":["Department of Computer Science and Engineering,, Maharishi Markandeshwar Engineering College (Deemed To Be University), India"],"raw_orcid":"https://orcid.org/0000-0001-5791-1540","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering,, Maharishi Markandeshwar Engineering College (Deemed To Be University), India","institution_ids":["https://openalex.org/I155284866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017963413","display_name":"Kommisetti Murthy Raju","orcid":"https://orcid.org/0000-0002-7576-4449"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kommisetti Murthy Raju","raw_affiliation_strings":["Electronic and communication Engineering, Shri Vishnu Engineering College for Women, India"],"raw_orcid":"https://orcid.org/0000-0002-7576-4449","affiliations":[{"raw_affiliation_string":"Electronic and communication Engineering, Shri Vishnu Engineering College for Women, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081334895","display_name":"Deepak Dudeja","orcid":"https://orcid.org/0000-0002-5067-3487"},"institutions":[{"id":"https://openalex.org/I155284866","display_name":"Maharishi Markandeshwar University, Mullana","ror":"https://ror.org/013qfkw58","country_code":"IN","type":"education","lineage":["https://openalex.org/I155284866"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepak Dudeja Dudeja","raw_affiliation_strings":["MMEC, Mulana, Maharishi Markandeshwar Engineering College, India"],"raw_orcid":"https://orcid.org/0000-0002-5067-3487","affiliations":[{"raw_affiliation_string":"MMEC, Mulana, Maharishi Markandeshwar Engineering College, India","institution_ids":["https://openalex.org/I155284866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097982368","display_name":"Gagandeep Berar","orcid":"https://orcid.org/0009-0004-8385-370X"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gagandeep Berar","raw_affiliation_strings":["Department of Computer Science and Engineering, Chitkara University Institute of Engineering and Technology,, India"],"raw_orcid":"https://orcid.org/0009-0004-8385-370X","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chitkara University Institute of Engineering and Technology,, India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064633353","display_name":"Nazeer Shaik","orcid":"https://orcid.org/0000-0001-5414-5289"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nazeer Shaik","raw_affiliation_strings":["Department of Computer Science and Engineering, Srinivasa Ramanujan Institute of Technology Autonomous, India"],"raw_orcid":"https://orcid.org/0000-0001-5414-5289","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Srinivasa Ramanujan Institute of Technology Autonomous, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040149522","display_name":"Abhishek Subhash Yadav","orcid":"https://orcid.org/0000-0002-7826-7528"},"institutions":[{"id":"https://openalex.org/I276256525","display_name":"Babu Banarasi Das University","ror":"https://ror.org/001ekgz09","country_code":"IN","type":"education","lineage":["https://openalex.org/I276256525"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Abhishek Yadav","raw_affiliation_strings":["Computer Science and Engineering, Babu Banarasi Das University, India"],"raw_orcid":"https://orcid.org/0000-0002-7826-7528","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Babu Banarasi Das University, India","institution_ids":["https://openalex.org/I276256525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5000079544"],"corresponding_institution_ids":["https://openalex.org/I155284866"],"apc_list":null,"apc_paid":null,"fwci":0.1919,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50665429,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8150228261947632},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7707648277282715},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5299884676933289},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46874314546585083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43778759241104126},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.36977946758270264},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3269227147102356}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8150228261947632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7707648277282715},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5299884676933289},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46874314546585083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43778759241104126},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36977946758270264},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3269227147102356}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3647868","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1893133781","https://openalex.org/W2212612642","https://openalex.org/W2958447056","https://openalex.org/W3007841261","https://openalex.org/W3023529621","https://openalex.org/W3037632767","https://openalex.org/W3080622597","https://openalex.org/W3089189066","https://openalex.org/W3099091571","https://openalex.org/W3122544540","https://openalex.org/W3138102940","https://openalex.org/W3142772878","https://openalex.org/W3161244013","https://openalex.org/W3162215361","https://openalex.org/W4211249255","https://openalex.org/W4224301213","https://openalex.org/W4225387476","https://openalex.org/W4236224706","https://openalex.org/W4250730617","https://openalex.org/W4283662439","https://openalex.org/W4285046042","https://openalex.org/W4296160247","https://openalex.org/W4321510581","https://openalex.org/W4321510734","https://openalex.org/W4379932974","https://openalex.org/W4380839003","https://openalex.org/W4389676113","https://openalex.org/W6802990871","https://openalex.org/W6849862932"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W3152891574","https://openalex.org/W4380075502"],"abstract_inverted_index":{"Abstract:":[0],"In":[1],"our":[2],"digital":[3],"age,":[4],"security":[5,22],"breaches":[6],"brought":[7],"on":[8,15,38],"by":[9,94,179],"malicious":[10],"software":[11],"(malware)":[12],"attacks":[13],"are":[14,136,148,226],"the":[16,26,171,181,215,241,280],"rise":[17,28],"and":[18,43,58,70,78,84,90,101,116,125,169,221,224,287],"pose":[19],"a":[20,35,49,127,158,255,268],"serious":[21],"risk.":[23],"Due":[24],"to":[25,75,104,120,140,228,237,247,261,266],"exponential":[27],"in":[29,191,208,212,244],"malware":[30,45,62,80,88,96,112,123,142,245,296],"attacks,":[31],"which":[32,204],"has":[33,102],"had":[34],"negative":[36],"impact":[37],"many":[39],"computer":[40],"users,":[41],"businesses,":[42],"governments,":[44],"detection":[46,97,246],"is":[47,99,219,254],"still":[48],"popular":[50],"research":[51],"area.":[52],"Increased":[53],"use":[54],"of":[55,87,129,151,160,217],"machine":[56],"learning":[57,133,187,290],"artificial":[59],"intelligence":[60],"for":[61,258,272,282,292,295],"detection.":[63,276,297],"These":[64],"systems":[65],"can":[66,175],"learn":[67],"from":[68],"patterns":[69,92],"anomalies,":[71],"improving":[72],"their":[73,196,206],"ability":[74],"detect":[76],"new":[77,130,146,222],"sophisticated":[79,183],"strains.":[81],"The":[82],"static":[83],"dynamic":[85],"analysis":[86],"signatures":[89],"behavior":[91,124],"used":[93,139],"current":[95],"tools":[98],"time-consuming":[100],"shown":[103],"be":[105,176],"unsuccessful":[106],"at":[107],"detecting":[108],"unknown":[109],"infections.":[110,131],"Modern":[111],"uses":[113],"polymorphic,":[114],"metamorphic,":[115],"other":[117],"evasive":[118],"strategies":[119],"swiftly":[121],"change":[122],"produce":[126],"lot":[128,159],"Machine":[132],"algorithms":[134,197],"(MLAs)":[135],"now":[137],"frequently":[138],"analyze":[141],"effectively":[143,248],"because":[144,162],"these":[145,155,260],"malwares":[147],"typically":[149],"versions":[150],"previous":[152],"malwares.":[153],"However,":[154],"methods":[156],"take":[157],"time":[161],"they":[163],"require":[164],"intensive":[165],"feature":[166,172],"engineering,":[167],"learning,":[168],"representation,":[170],"engineering":[173],"stage":[174],"entirely":[177],"skipped":[178],"employing":[180],"more":[182],"MLAs,":[184],"like":[185],"deep":[186,289],"recently":[188],"disclosed":[189],"works":[190],"this":[192],"area":[193],"demonstrate":[194],"how":[195],"perform":[198],"when":[199],"given":[200],"biased":[201],"training":[202],"data,":[203],"restricts":[205],"usefulness":[207],"urgent":[209],"circumstances.":[210],"Keep":[211],"mind":[213],"that":[214],"landscape":[216],"cybersecurity":[218],"dynamic,":[220],"innovations":[223],"challenges":[225],"likely":[227],"have":[229],"emerged":[230],"since":[231],"my":[232],"last":[233],"update.":[234],"It's":[235],"essential":[236],"stay":[238],"informed":[239],"about":[240],"latest":[242],"developments":[243],"protect":[249],"against":[250],"evolving":[251],"threats.":[252],"There":[253],"strong":[256],"case":[257],"evaluating":[259],"reduce":[262],"bias":[263],"approaches":[264],"separately":[265],"create":[267],"new,":[269],"improved":[270],"technique":[271],"efficient":[273],"zero-day":[274],"virus":[275],"This":[277],"article":[278],"prepares":[279],"way":[281],"an":[283],"impactful":[284],"visual":[285],"scalable":[286],"hybrid":[288],"frameworks":[291],"real-time":[293],"deployments":[294]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
