{"id":"https://openalex.org/W3199106856","doi":"https://doi.org/10.1155/2021/8381550","title":"Malware Detection Using CNN via Word Embedding in Cloud Computing Infrastructure","display_name":"Malware Detection Using CNN via Word Embedding in Cloud Computing Infrastructure","publication_year":2021,"publication_date":"2021-09-11","ids":{"openalex":"https://openalex.org/W3199106856","doi":"https://doi.org/10.1155/2021/8381550","mag":"3199106856"},"language":"en","primary_location":{"id":"doi:10.1155/2021/8381550","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8381550","pdf_url":"https://downloads.hindawi.com/journals/sp/2021/8381550.pdf","source":{"id":"https://openalex.org/S166774750","display_name":"Scientific Programming","issn_l":"1058-9244","issn":["1058-9244","1875-919X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Scientific Programming","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/sp/2021/8381550.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101412171","display_name":"Rong Wang","orcid":"https://orcid.org/0000-0002-5368-1829"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rong Wang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003990194","display_name":"Cong Tian","orcid":"https://orcid.org/0000-0002-5429-4580"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Tian","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066503522","display_name":"Yan Lin","orcid":"https://orcid.org/0000-0001-5507-8989"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Yan","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710000, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101412171"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":{"value":1800,"currency":"USD","value_usd":1800},"apc_paid":{"value":1800,"currency":"USD","value_usd":1800},"fwci":0.6113,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.70144096,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8494791984558105},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8188340067863464},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7467036247253418},{"id":"https://openalex.org/keywords/softmax-function","display_name":"Softmax function","score":0.559766948223114},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.5436657071113586},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.5337105393409729},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5000312328338623},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.484939843416214},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4825960397720337},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.48183882236480713},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4493551254272461},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4289352297782898},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40807080268859863},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3662806749343872},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34329915046691895},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12827908992767334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8494791984558105},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8188340067863464},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7467036247253418},{"id":"https://openalex.org/C188441871","wikidata":"https://www.wikidata.org/wiki/Q7554146","display_name":"Softmax function","level":3,"score":0.559766948223114},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5436657071113586},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.5337105393409729},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5000312328338623},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.484939843416214},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4825960397720337},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.48183882236480713},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4493551254272461},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4289352297782898},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40807080268859863},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3662806749343872},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34329915046691895},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12827908992767334},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/8381550","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8381550","pdf_url":"https://downloads.hindawi.com/journals/sp/2021/8381550.pdf","source":{"id":"https://openalex.org/S166774750","display_name":"Scientific Programming","issn_l":"1058-9244","issn":["1058-9244","1875-919X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Scientific Programming","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:db0cf2cc75004857906f97d02a304458","is_oa":true,"landing_page_url":"https://doaj.org/article/db0cf2cc75004857906f97d02a304458","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scientific Programming, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/8381550","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8381550","pdf_url":"https://downloads.hindawi.com/journals/sp/2021/8381550.pdf","source":{"id":"https://openalex.org/S166774750","display_name":"Scientific Programming","issn_l":"1058-9244","issn":["1058-9244","1875-919X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Scientific Programming","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3199106856.pdf","grobid_xml":"https://content.openalex.org/works/W3199106856.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1499536440","https://openalex.org/W1635909507","https://openalex.org/W2065311994","https://openalex.org/W2079456589","https://openalex.org/W2144211451","https://openalex.org/W2250539671","https://openalex.org/W2560342169","https://openalex.org/W2611152099","https://openalex.org/W2761652379","https://openalex.org/W2807072443"],"related_works":["https://openalex.org/W3107204728","https://openalex.org/W4287591324","https://openalex.org/W4226420367","https://openalex.org/W2980176872","https://openalex.org/W2962876041","https://openalex.org/W3090555870","https://openalex.org/W3108503355","https://openalex.org/W2249953602","https://openalex.org/W2801655600","https://openalex.org/W2912971006"],"abstract_inverted_index":{"The":[0,65,118],"Internet":[1],"of":[2,19,39,81,178,212],"Things":[3],"(IoT),":[4],"cloud,":[5],"and":[6,21,35,50,57,62,67,130,171],"fog":[7],"computing":[8,14,26],"paradigms":[9],"provide":[10],"a":[11,17,131,141,179,185,200,210],"powerful":[12],"large-scale":[13],"infrastructure":[15],"for":[16,59],"variety":[18],"data":[20],"computation-intensive":[22],"applications.":[23],"These":[24],"cutting-edge":[25],"infrastructures,":[27],"however,":[28],"are":[29,92],"nevertheless":[30],"vulnerable":[31],"to":[32,74,110,162,174,187],"serious":[33],"security":[34],"privacy":[36],"risks.":[37],"One":[38],"the":[40,79,86,88,143,164,176,191],"most":[41],"important":[42],"countermeasures":[43],"against":[44],"cybersecurity":[45],"threats":[46],"is":[47,124,193,199],"intrusion":[48],"detection":[49,66],"prevention":[51,68],"systems,":[52],"which":[53],"monitor":[54,78],"devices,":[55],"networks,":[56],"systems":[58,69,76],"malicious":[60,180,189],"activity":[61],"policy":[63],"violations.":[64],"range":[70],"from":[71,121],"antivirus":[72],"software":[73],"hierarchical":[75],"that":[77,206],"traffic":[80],"whole":[82],"backbone":[83],"networks.":[84],"At":[85],"moment,":[87],"primary":[89],"defensive":[90],"solutions":[91],"based":[93],"on":[94],"malware":[95],"feature":[96,100,133,165],"extraction.":[97],"Most":[98],"known":[99],"extraction":[101,134],"algorithms":[102],"use":[103],"byte":[104],"N-gram":[105],"patterns":[106],"or":[107,114],"binary":[108],"strings":[109],"represent":[111],"log":[112],"files":[113,123],"other":[115],"static":[116],"information.":[117],"information":[119,152],"taken":[120],"program":[122,186],"expressed":[125],"using":[126],"word":[127,169],"embedding":[128,170],"(GloVe)":[129],"new":[132],"method":[135],"proposed":[136],"in":[137],"this":[138],"article.":[139],"As":[140],"result,":[142],"relevant":[144],"vector":[145],"space":[146],"model":[147],"(VSM)":[148],"will":[149],"incorporate":[150],"more":[151],"about":[153],"unknown":[154],"programs.":[155],"We":[156],"utilize":[157],"convolutional":[158],"neural":[159],"network":[160],"(CNN)":[161],"analyze":[163],"maps":[166],"represented":[167],"by":[168],"apply":[172],"Softmax":[173],"fit":[175],"probability":[177,192],"program.":[181,202],"Eventually,":[182],"we":[183],"consider":[184],"be":[188],"if":[190],"greater":[194],"than":[195,215],"0.5;":[196],"otherwise,":[197],"it":[198],"benign":[201],"Experimental":[203],"result":[204],"shows":[205],"our":[207],"approach":[208],"achieves":[209],"level":[211],"accuracy":[213],"higher":[214],"98%.":[216]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
