{"id":"https://openalex.org/W4308000139","doi":"https://doi.org/10.1186/s13677-022-00349-8","title":"A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization","display_name":"A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization","publication_year":2022,"publication_date":"2022-11-03","ids":{"openalex":"https://openalex.org/W4308000139","doi":"https://doi.org/10.1186/s13677-022-00349-8","pmid":"https://pubmed.ncbi.nlm.nih.gov/36345308"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-022-00349-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00349-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00349-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00349-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050849175","display_name":"Farhan Ullah","orcid":"https://orcid.org/0000-0002-1030-1275"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Farhan Ullah","raw_affiliation_strings":["School of Software, Northwestern Polytechnical University, Xian, 710072 China","School of Software, Northwestern Polytechnical University, Xian, 710072, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xian, 710072 China","institution_ids":[]},{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xian, 710072, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041541232","display_name":"Gautam Srivastava","orcid":"https://orcid.org/0000-0001-9851-4103"},"institutions":[{"id":"https://openalex.org/I184693016","display_name":"China Medical University","ror":"https://ror.org/00v408z34","country_code":"TW","type":"education","lineage":["https://openalex.org/I184693016"]},{"id":"https://openalex.org/I48890080","display_name":"Brandon University","ror":"https://ror.org/02qp25a50","country_code":"CA","type":"education","lineage":["https://openalex.org/I48890080"]},{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"education","lineage":["https://openalex.org/I56306041"]}],"countries":["CA","LB","TW"],"is_corresponding":true,"raw_author_name":"Gautam Srivastava","raw_affiliation_strings":["Department of Computer Science and Math, Lebanese American University, 1102 Beirut, Lebanon","Department of Math and Computer Science, Brandon University, R7A 6A9 Brandon, Canada","Research Centre for Interneural Computing, China Medical University, 40402 Taichung, Taiwan","Department of Math and Computer Science, Brandon University, R7A 6A9, Brandon, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Math, Lebanese American University, 1102 Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]},{"raw_affiliation_string":"Department of Math and Computer Science, Brandon University, R7A 6A9 Brandon, Canada","institution_ids":["https://openalex.org/I48890080"]},{"raw_affiliation_string":"Research Centre for Interneural Computing, China Medical University, 40402 Taichung, Taiwan","institution_ids":["https://openalex.org/I184693016"]},{"raw_affiliation_string":"Department of Math and Computer Science, Brandon University, R7A 6A9, Brandon, Canada","institution_ids":["https://openalex.org/I48890080"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013116186","display_name":"Shamsher Ullah","orcid":"https://orcid.org/0009-0003-6399-8461"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shamsher Ullah","raw_affiliation_strings":["School of Software, Northwestern Polytechnical University, Xian, 710072 China","School of Software, Northwestern Polytechnical University, Xian, 710072, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xian, 710072 China","institution_ids":[]},{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xian, 710072, China","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041541232"],"corresponding_institution_ids":["https://openalex.org/I184693016","https://openalex.org/I48890080","https://openalex.org/I56306041"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":5.6576,"has_fulltext":true,"cited_by_count":42,"citation_normalized_percentile":{"value":0.96940902,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"11","issue":"1","first_page":"75","last_page":"75"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8808140754699707},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7574334144592285},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6164996027946472},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5872246026992798},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5590340495109558},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4552539587020874},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40404924750328064},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.329917311668396},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23571380972862244}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8808140754699707},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7574334144592285},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6164996027946472},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5872246026992798},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5590340495109558},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4552539587020874},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40404924750328064},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.329917311668396},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23571380972862244}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s13677-022-00349-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00349-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00349-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmid:36345308","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/36345308","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of cloud computing (Heidelberg, Germany)","raw_type":null},{"id":"pmh:oai:doaj.org/article:10779afa39f04ad89d370f1e2da177ed","is_oa":true,"landing_page_url":"https://doaj.org/article/10779afa39f04ad89d370f1e2da177ed","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-21 (2022)","raw_type":"article"},{"id":"pmh:oai:pubmedcentral.nih.gov:9633577","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/9633577","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"J Cloud Comput (Heidelb)","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1186/s13677-022-00349-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00349-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00349-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G3507557314","display_name":null,"funder_award_id":"RGPIN-2020-05363","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4308000139.pdf","grobid_xml":"https://content.openalex.org/works/W4308000139.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1912151884","https://openalex.org/W1989484209","https://openalex.org/W1994740897","https://openalex.org/W2051755074","https://openalex.org/W2066220442","https://openalex.org/W2142145056","https://openalex.org/W2168103835","https://openalex.org/W2568897335","https://openalex.org/W2575599800","https://openalex.org/W2591102410","https://openalex.org/W2782290149","https://openalex.org/W2905912674","https://openalex.org/W2912135847","https://openalex.org/W2943383044","https://openalex.org/W2945015800","https://openalex.org/W2968263527","https://openalex.org/W2969904462","https://openalex.org/W2979860911","https://openalex.org/W2981856772","https://openalex.org/W2982413766","https://openalex.org/W2984666763","https://openalex.org/W2990518194","https://openalex.org/W3119704298","https://openalex.org/W3131231119","https://openalex.org/W3176448712","https://openalex.org/W3209736367","https://openalex.org/W4284989899","https://openalex.org/W4285040872","https://openalex.org/W4290755474"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Android":[0,68,121,128,160],"is":[1,18,71,107,169,182],"the":[2,63,67,103,111,156,163,179,189,214,236],"most":[3],"widely":[4],"used":[5,108,170],"mobile":[6],"platform,":[7],"making":[8],"it":[9,17],"a":[10,30,47,85,152,185,197,231],"prime":[11],"target":[12],"for":[13,33,90,221],"malicious":[14],"attacks.":[15,24],"Therefore,":[16,60],"imperative":[19],"to":[20,72,109,126,171,184],"effectively":[21],"circumvent":[22],"these":[23],"Recently,":[25],"machine":[26,42],"learning":[27,167],"has":[28],"been":[29],"promising":[31],"solution":[32],"malware":[34,44,91,186,223],"detection,":[35],"which":[36],"relies":[37],"on":[38],"distinguishing":[39],"features.":[40],"While":[41],"learning-based":[43],"scanners":[45],"have":[46],"large":[48],"number":[49],"of":[50,62,66,155,199],"features,":[51,132],"adversaries":[52],"can":[53,78,149],"avoid":[54],"detection":[55,92,224],"by":[56,136,159],"using":[57,196],"feature-related":[58],"expertise.":[59],"one":[61],"main":[64],"tasks":[65],"security":[69],"industry":[70],"consistently":[73],"propose":[74],"cutting-edge":[75],"features":[76,174,191,218],"that":[77,93],"detect":[79],"suspicious":[80],"activity.":[81],"This":[82],"study":[83],"presents":[84],"novel":[86],"feature":[87],"representation":[88],"approach":[89],"combines":[94],"API-Call":[95],"Graphs":[96],"(ACGs)":[97],"with":[98,130,243],"byte-level":[99],"image":[100],"representation.":[101],"First,":[102],"reverse":[104],"engineering":[105],"procedure":[106],"obtain":[110],"Java":[112],"programming":[113],"codes":[114],"and":[115,139,188,194,206,216,225,239],"Dalvik":[116],"Executable":[117],"(DEX)":[118],"file":[119,181],"from":[120,142,176,202,235],"Package":[122],"Kit":[123],"(APK).":[124],"Second,":[125],"depict":[127],"apps":[129],"high-level":[131],"we":[133],"develop":[134],"ACGs":[135,148,215],"mining":[137],"API-Calls":[138],"API":[140],"sequences":[141],"Control":[143],"Flow":[144],"Graph":[145],"(CFG).":[146],"The":[147,227],"act":[150],"as":[151],"digital":[153],"fingerprint":[154],"actions":[157],"taken":[158],"apps.":[161],"Next,":[162],"multi-head":[164],"attention-based":[165],"transfer":[166],"method":[168,229],"extract":[172],"trained":[173],"vector":[175],"ACGs.":[177],"Third,":[178],"DEX":[180],"converted":[183],"image,":[187],"texture":[190,217],"are":[192,219],"extracted":[193],"highlighted":[195],"combination":[198],"FAST":[200],"(Features":[201],"Accelerated":[203],"Segment":[204],"Test)":[205],"BRIEF":[207],"(Binary":[208],"Robust":[209],"Independent":[210],"Elementary":[211],"Features).":[212],"Finally,":[213],"combined":[220],"effective":[222],"classification.":[226],"proposed":[228],"uses":[230],"customized":[232],"dataset":[233,238],"prepared":[234],"CIC-InvesAndMal2019":[237],"outperforms":[240],"state-of-the-art":[241],"methods":[242],"99.27%":[244],"accuracy.":[245]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
