{"id":"https://openalex.org/W2793989996","doi":"https://doi.org/10.15439/2017km04","title":"Detection of Malicious Executables Using Rule Based Classification Algorithms","display_name":"Detection of Malicious Executables Using Rule Based Classification Algorithms","publication_year":2018,"publication_date":"2018-01-29","ids":{"openalex":"https://openalex.org/W2793989996","doi":"https://doi.org/10.15439/2017km04","mag":"2793989996"},"language":"en","primary_location":{"id":"doi:10.15439/2017km04","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017km04","pdf_url":"https://annals-csis.org/proceedings/icitkm2017/drp/pdf/04.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/icitkm2017/drp/pdf/04.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033693695","display_name":"Neeraj Bhargava","orcid":"https://orcid.org/0000-0002-1824-499X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Neeraj Bhargava","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101415666","display_name":"Aakanksha Jain","orcid":"https://orcid.org/0000-0002-8491-1797"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aakanksha Jain","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100602997","display_name":"Abhishek Kumar","orcid":"https://orcid.org/0000-0002-8783-5128"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abhishek Kumar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5023041667","display_name":"Dac\u2010Nhuong Le","orcid":"https://orcid.org/0000-0003-2601-2803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dac-Nhuong Le","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033693695"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9404,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70637363,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"14","issue":null,"first_page":"35","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8108925223350525},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6498470902442932},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.618276834487915},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6142060160636902},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6059290766716003},{"id":"https://openalex.org/keywords/sort","display_name":"sort","score":0.563750684261322},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5548685789108276},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5506040453910828},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5101392865180969},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.4571329355239868},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45608705282211304},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4390675127506256},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.41896456480026245},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.21278420090675354}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8108925223350525},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6498470902442932},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.618276834487915},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6142060160636902},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6059290766716003},{"id":"https://openalex.org/C88548561","wikidata":"https://www.wikidata.org/wiki/Q347599","display_name":"sort","level":2,"score":0.563750684261322},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5548685789108276},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5506040453910828},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5101392865180969},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.4571329355239868},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45608705282211304},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4390675127506256},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.41896456480026245},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.21278420090675354},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2017km04","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017km04","pdf_url":"https://annals-csis.org/proceedings/icitkm2017/drp/pdf/04.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:4011307ed0df40ae8c54bcffc1fe77ff","is_oa":true,"landing_page_url":"https://doaj.org/article/4011307ed0df40ae8c54bcffc1fe77ff","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 14, Pp 35-38 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2017km04","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017km04","pdf_url":"https://annals-csis.org/proceedings/icitkm2017/drp/pdf/04.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2793989996.pdf","grobid_xml":"https://content.openalex.org/works/W2793989996.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W246623122","https://openalex.org/W1992572515","https://openalex.org/W2010351326","https://openalex.org/W2075731044","https://openalex.org/W2125055259","https://openalex.org/W2140703652","https://openalex.org/W2473526392","https://openalex.org/W2490971030","https://openalex.org/W2537923357","https://openalex.org/W4242070626","https://openalex.org/W6648334012","https://openalex.org/W6669484700"],"related_works":["https://openalex.org/W2350278424","https://openalex.org/W2071432835","https://openalex.org/W4239401009","https://openalex.org/W4234371507","https://openalex.org/W1628824497","https://openalex.org/W4299534542","https://openalex.org/W2053441600","https://openalex.org/W1990401748","https://openalex.org/W2047586841","https://openalex.org/W2141018266"],"abstract_inverted_index":{"Machine":[0],"Learning":[1],"class":[2],"rule":[3],"has":[4],"varied":[5,52,88],"packages":[6],"together":[7],"with":[8,39,58,141,186],"classification,":[9],"clustering,":[10],"will":[11],"understand":[12],"association":[13],"rules":[14,45],"furthermore":[15],"and":[16,149,171],"is":[17,100],"capable":[18],"of":[19,25,44,60,104,123,145,164,189],"the":[20,26,73,97,102,113,120,124,130,143,146,151,157,165,192],"method":[21],"an":[22],"enormous":[23],"set":[24,28,43],"information":[27],"as":[29,84],"measure":[30],"supervised":[31],"or":[32],"unsupervised":[33],"learning":[34],"data.":[35],"The":[36,55,137,160],"paper":[37],"deals":[38,57,140],"statistics":[40],"mining":[41],"sort":[42],"on":[46,66,72,90,180],"virus":[47],"dataset":[48],"created":[49],"records":[50,105],"from":[51,87],"anti-virus":[53],"logs.":[54],"work":[56,161],"classifications":[59],"malicious":[61,85],"code":[62],"per":[63],"their":[64,76],"impact":[65],"user's":[67],"system":[68],"&amp;":[69],"distinguishes":[70],"threats":[71],"muse":[74],"in":[75,173],"connected":[77],"severity;":[78],"these":[79],"threads":[80],"are":[81,116],"therefore":[82],"named":[83],"possible":[86],"sources,":[89],"various":[91],"running":[92],"structures.":[93],"During":[94],"this":[95],"paper,":[96],"generated":[98],"output":[99],"that":[101],"listing":[103],"summarizing":[106],"however":[107],"because":[108,177],"it":[109,178],"ought":[110],"to":[111,118,168,183,191],"be":[112],"classifier":[114],"algorithms":[115,166],"ready":[117],"predict":[119],"authentic":[121],"magnificence":[122],"days":[125],"at":[126,135],"a":[127,133],"lower":[128],"place":[129],"chosen":[131,158],"take":[132],"look":[134],"module.":[136],"operating":[138],"model":[139],"predicting":[142],"outliers":[144],"threat":[147],"datasets":[148,182],"predicts":[150],"optimum":[152],"results":[153],"supported":[154],"analysis":[155],"victimization":[156],"rule.":[159],"illustrates":[162],"implementation":[163],"corresponding":[167],"half,":[169],"JRIP":[170],"RIDOR":[172],"additional":[174],"economical":[175],"manner":[176],"relies":[179],"virus-log":[181],"come":[184],"up":[185],"A":[187],"level":[188],"accuracy":[190],"classification":[193],"results.":[194]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
