{"id":"https://openalex.org/W2889682758","doi":"https://doi.org/10.1186/s42400-018-0010-y","title":"Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks","display_name":"Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks","publication_year":2018,"publication_date":"2018-09-10","ids":{"openalex":"https://openalex.org/W2889682758","doi":"https://doi.org/10.1186/s42400-018-0010-y","mag":"2889682758"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-018-0010-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-018-0010-y","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0010-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0010-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081463234","display_name":"Jixin Zhang","orcid":"https://orcid.org/0000-0001-6890-8953"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]},{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jixin Zhang","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Hunan, China","Department of Information Engineering, Chinese University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Hunan, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"Department of Information Engineering, Chinese University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008237643","display_name":"Kehuan Zhang","orcid":"https://orcid.org/0000-0003-1519-0057"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kehuan Zhang","raw_affiliation_strings":["Department of Information Engineering, Chinese University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Chinese University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035491991","display_name":"Zheng Qin","orcid":"https://orcid.org/0000-0003-0877-3887"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Qin","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049649023","display_name":"Hui Yin","orcid":"https://orcid.org/0000-0001-8960-887X"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Yin","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091310402","display_name":"Qixin Wu","orcid":"https://orcid.org/0000-0002-4231-509X"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qixin Wu","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5081463234"],"corresponding_institution_ids":["https://openalex.org/I16609230","https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":3.1504,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.92937963,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"1","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unpacking","display_name":"Unpacking","score":0.9855970144271851},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9118920564651489},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7677174210548401},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6396312117576599},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.6083930134773254},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.5366325974464417},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5192654132843018},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5088017582893372},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5019068717956543},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49739792943000793},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4737420976161957},{"id":"https://openalex.org/keywords/complement","display_name":"Complement (music)","score":0.46192213892936707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3452734351158142},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22509023547172546}],"concepts":[{"id":"https://openalex.org/C2777256151","wikidata":"https://www.wikidata.org/wiki/Q7897273","display_name":"Unpacking","level":2,"score":0.9855970144271851},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9118920564651489},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7677174210548401},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6396312117576599},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.6083930134773254},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.5366325974464417},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5192654132843018},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5088017582893372},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5019068717956543},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49739792943000793},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4737420976161957},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.46192213892936707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3452734351158142},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22509023547172546},{"id":"https://openalex.org/C127716648","wikidata":"https://www.wikidata.org/wiki/Q104053","display_name":"Phenotype","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C188082640","wikidata":"https://www.wikidata.org/wiki/Q1780899","display_name":"Complementation","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-018-0010-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-018-0010-y","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0010-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e1b6961547a047da8475cb0217ad6e51","is_oa":true,"landing_page_url":"https://doaj.org/article/e1b6961547a047da8475cb0217ad6e51","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 1, Iss 1, Pp 1-13 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-018-0010-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-018-0010-y","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-018-0010-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G251628540","display_name":null,"funder_award_id":"61772191","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5092362604","display_name":null,"funder_award_id":"61472131","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G598221018","display_name":null,"funder_award_id":"2017JJ2292","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G6058138561","display_name":null,"funder_award_id":", No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G620116306","display_name":null,"funder_award_id":"6177219","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2889682758.pdf","grobid_xml":"https://content.openalex.org/works/W2889682758.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1513123914","https://openalex.org/W1639956611","https://openalex.org/W1677464440","https://openalex.org/W1834664710","https://openalex.org/W1851403712","https://openalex.org/W1967185446","https://openalex.org/W1982773740","https://openalex.org/W1994531415","https://openalex.org/W2028027666","https://openalex.org/W2032724464","https://openalex.org/W2034994178","https://openalex.org/W2045140281","https://openalex.org/W2049208027","https://openalex.org/W2063381250","https://openalex.org/W2079215333","https://openalex.org/W2105334567","https://openalex.org/W2107296295","https://openalex.org/W2126734536","https://openalex.org/W2145969515","https://openalex.org/W2154053567","https://openalex.org/W2155320991","https://openalex.org/W2247776437","https://openalex.org/W2295915781","https://openalex.org/W2517869697","https://openalex.org/W2520583395","https://openalex.org/W2557513839","https://openalex.org/W2560992163","https://openalex.org/W2576498804","https://openalex.org/W2781491433","https://openalex.org/W3101228802","https://openalex.org/W4242210993"],"related_works":["https://openalex.org/W2900986841","https://openalex.org/W2902937489","https://openalex.org/W2908233611","https://openalex.org/W1984999133","https://openalex.org/W3090684468","https://openalex.org/W2098492867","https://openalex.org/W2793030797","https://openalex.org/W116627068","https://openalex.org/W2155320991","https://openalex.org/W3119992093"],"abstract_inverted_index":{"Malware":[0],"detection":[1,35,172,193],"has":[2,99],"become":[3],"mission":[4],"sensitive":[5,127,141],"as":[6,65],"its":[7],"threats":[8],"spread":[9],"from":[10],"computer":[11],"systems":[12],"to":[13,71,92,128,136,150],"Internet":[14],"of":[15,82,87,96,122,139,154,183,192,198],"things":[16],"systems.":[17,36],"Modern":[18],"malware":[19,40,46,75,155,170],"variants":[20,156,171],"are":[21,48,69],"generally":[22],"equipped":[23],"with":[24,176],"sophisticated":[25],"packers,":[26],"which":[27,68,98,117,125],"allow":[28],"them":[29],"bypass":[30],"modern":[31],"machine":[32],"learning":[33],"based":[34],"To":[37,105],"detect":[38],"packed":[39,169],"variants,":[41],"unpacking":[42,53,85],"techniques":[43,54],"and":[44,144,157,162,195],"dynamic":[45,74],"analysis":[47,76,135,161],"the":[49,79,84,93,152,177,178],"two":[50],"choices.":[51],"However,":[52],"cannot":[55],"always":[56],"be":[57],"useful":[58],"since":[59],"there":[60],"exist":[61],"some":[62],"packers":[63,67,88],"such":[64],"private":[66],"hard":[70],"unpack.":[72],"Although":[73],"can":[77,187],"obtain":[78],"running":[80],"behaviours":[81,86,95],"executables,":[83,97],"add":[89],"noisy":[90],"information":[91],"real":[94],"a":[100,114,120],"bad":[101],"affect":[102],"on":[103],"accuracy.":[104,184],"overcome":[106],"these":[107,140],"challenges,":[108],"in":[109,181],"this":[110],"paper,":[111],"we":[112],"propose":[113],"new":[115],"method":[116],"first":[118],"extracts":[119],"series":[121],"system":[123,142],"calls":[124],"is":[126,174],"malicious":[129],"behaviours,":[130],"then":[131],"use":[132],"principal":[133],"component":[134],"extract":[137],"features":[138,153],"calls,":[143],"finally":[145],"adopt":[146],"multi-layers":[147],"neural":[148],"networks":[149],"classify":[151],"legitimate":[158],"ones.":[159],"Theoretical":[160],"real-life":[163],"experimental":[164],"results":[165],"show":[166],"that":[167],"our":[168],"technique":[173],"comparable":[175],"state-of-art":[179],"methods":[180],"terms":[182],"Our":[185],"approach":[186],"achieve":[188],"more":[189],"than":[190],"95.6\\%":[191],"accuracy":[194],"0.048":[196],"s":[197],"classification":[199],"time":[200],"cost.":[201]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":7}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
