{"id":"https://openalex.org/W7132830497","doi":"https://doi.org/10.1186/s42400-025-00454-6","title":"Signal-based malware classification using 1D CNNs","display_name":"Signal-based malware classification using 1D CNNs","publication_year":2026,"publication_date":"2026-03-01","ids":{"openalex":"https://openalex.org/W7132830497","doi":"https://doi.org/10.1186/s42400-025-00454-6"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00454-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00454-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00454-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00454-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jack Wilkie","orcid":"https://orcid.org/0009-0009-8046-7770"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jack Wilkie","raw_affiliation_strings":["University of Strathclyde, Glasgow, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Glasgow, Scotland","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hanan Hindy","orcid":"https://orcid.org/0000-0002-5195-8193"},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hanan Hindy","raw_affiliation_strings":["Ain Shams University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Ain Shams University, Cairo, Egypt","institution_ids":["https://openalex.org/I107720978"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ivan Andonovic","orcid":"https://orcid.org/0000-0001-9093-5245"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ivan Andonovic","raw_affiliation_strings":["University of Strathclyde, Glasgow, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Glasgow, Scotland","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Christos Tachtatzis","orcid":"https://orcid.org/0000-0001-9150-6805"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Christos Tachtatzis","raw_affiliation_strings":["University of Strathclyde, Glasgow, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Glasgow, Scotland","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"last","author":{"id":null,"display_name":"Robert Atkinson","orcid":"https://orcid.org/0000-0002-6206-2229"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Robert Atkinson","raw_affiliation_strings":["University of Strathclyde, Glasgow, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Glasgow, Scotland","institution_ids":["https://openalex.org/I181647926"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I181647926"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.68923418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9225999712944031,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9225999712944031,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.016200000420212746,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.008299999870359898,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.618399977684021},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5480999946594238},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4878000020980835},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4851999878883362},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.42250001430511475},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.41519999504089355},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.40389999747276306},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.37369999289512634},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.35929998755455017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8119999766349792},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.618399977684021},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5480999946594238},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5156999826431274},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4878000020980835},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4851999878883362},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4262000024318695},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.42250001430511475},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.41519999504089355},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.40389999747276306},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.37369999289512634},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.35929998755455017},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.3562999963760376},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.35339999198913574},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.3244999945163727},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31380000710487366},{"id":"https://openalex.org/C89600930","wikidata":"https://www.wikidata.org/wiki/Q1423946","display_name":"Segmentation","level":2,"score":0.29019999504089355},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C44210515","wikidata":"https://www.wikidata.org/wiki/Q16968978","display_name":"Bespoke","level":2,"score":0.2703999876976013},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.2547000050544739}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00454-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00454-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00454-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6fd84c88042547d6b16c738eaac61ef0","is_oa":true,"landing_page_url":"https://doaj.org/article/6fd84c88042547d6b16c738eaac61ef0","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00454-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00454-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00454-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7132830497.pdf","grobid_xml":"https://content.openalex.org/works/W7132830497.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W1550383259","https://openalex.org/W1916732574","https://openalex.org/W1974189812","https://openalex.org/W2010065958","https://openalex.org/W2045140281","https://openalex.org/W2056127986","https://openalex.org/W2117991511","https://openalex.org/W2194775991","https://openalex.org/W2302255633","https://openalex.org/W2407313496","https://openalex.org/W2599823825","https://openalex.org/W2752782242","https://openalex.org/W2765921396","https://openalex.org/W2795033129","https://openalex.org/W2796681025","https://openalex.org/W2806534592","https://openalex.org/W2963401022","https://openalex.org/W2963650941","https://openalex.org/W2963855133","https://openalex.org/W2964053523","https://openalex.org/W3025067198","https://openalex.org/W3127265720","https://openalex.org/W3129906305","https://openalex.org/W3153998092","https://openalex.org/W3157814027","https://openalex.org/W3172909833","https://openalex.org/W4205607115","https://openalex.org/W4205766663","https://openalex.org/W4206669125","https://openalex.org/W4224285064","https://openalex.org/W4226019100","https://openalex.org/W4293083491","https://openalex.org/W4294690579","https://openalex.org/W4295700754","https://openalex.org/W4297539106","https://openalex.org/W4313014896","https://openalex.org/W4320009754","https://openalex.org/W4323338649","https://openalex.org/W4324137371","https://openalex.org/W4381490133","https://openalex.org/W4385568479"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Malware":[1],"classification":[2,134,237],"is":[3,24,178],"a":[4,32,54,174,198],"contemporary":[5],"and":[6,114,209,218,234,244],"ongoing":[7],"challenge":[8],"in":[9,98,124,173],"cyber-security:":[10],"modern":[11],"obfuscation":[12],"techniques":[13],"are":[14],"able":[15],"to":[16,28,103,110,170,189,214,227,253],"evade":[17],"traditional":[18],"static":[19,87],"analysis,":[20],"while":[21],"dynamic":[22],"analysis":[23],"too":[25],"resource":[26],"intensive":[27],"be":[29,66,186],"deployed":[30],"at":[31],"large-scale.":[33],"One":[34],"prominent":[35],"line":[36],"of":[37,91,117,130,136,241],"research":[38],"addresses":[39,142],"these":[40,143,161,191,216],"limitations":[41],"by":[42,49,108,145],"converting":[43,92],"malware":[44,83],"binaries":[45],"into":[46,53,94,150],"2D":[47,55,95,118,182],"images":[48,63,96],"heuristically":[50],"reshaping":[51],"them":[52],"grid":[56],"before":[57],"resizing":[58,147],"using":[59,73],"Lanczos":[60],"resampling.":[61],"These":[62],"can":[64,80,185],"then":[65],"classified":[67],"based":[68,204],"on":[69,205,220,231,255],"their":[70],"textural":[71],"information":[72,100],"computer":[74],"vision":[75],"approaches.":[76],"While":[77],"this":[78],"approach":[79],"detect":[81],"obfuscated":[82],"more":[84],"effectively":[85],"than":[86],"analysis;":[88],"the":[89,115,125,133,137,148,155,206,221,248,256],"process":[90],"files":[93,149],"results":[97],"significant":[99],"loss":[101,129],"due":[102,169],"both":[104],"quantisation":[105,167],"noise,":[106],"caused":[107],"rounding":[109],"integer":[111],"pixel":[112],"values,":[113],"introduction":[116],"dependencies":[119],"which":[120,153],"do":[121,163],"not":[122,164],"exist":[123],"original":[126],"data.":[127],"This":[128,140],"signal":[131,258],"limits":[132],"performance":[135,230],"downstream":[138],"model.":[139],"work":[141],"weaknesses":[144],"instead":[146],"1D":[151,192,200],"signals":[152,162,193,217],"avoids":[154],"need":[156],"for":[157,194,250],"heuristic":[158],"reshaping,":[159],"additionally":[160],"suffer":[165],"from":[166],"noise":[168],"being":[171],"stored":[172],"floating-point":[175],"format.":[176],"It":[177,224],"shown":[179],"that":[180],"existing":[181],"CNN":[183],"architectures":[184],"readily":[187],"adapted":[188],"classify":[190,215],"improved":[195],"performance.":[196],"Furthermore,":[197],"bespoke":[199],"convolutional":[201],"neural":[202],"network,":[203],"ResNet":[207],"architecture":[208],"squeeze-and-excitation":[210],"layers,":[211],"was":[212,225],"developed":[213],"evaluated":[219],"MalNet":[222],"dataset.":[223],"found":[226],"achieve":[228],"state-of-the-art":[229],"binary,":[232],"type,":[233],"family":[235],"level":[236],"with":[238],"F1":[239],"scores":[240],"0.874,":[242],"0.503,":[243],"0.507,":[245],"respectively,":[246],"paving":[247],"way":[249],"future":[251],"models":[252],"operate":[254],"proposed":[257],"modality.":[259]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-12-10T00:00:00"}
