{"id":"https://openalex.org/W2619912211","doi":"https://doi.org/10.1587/transinf.2016edl8230","title":"Inferring Phylogenetic Network of Malware Families Based on Splits Graph","display_name":"Inferring Phylogenetic Network of Malware Families Based on Splits Graph","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2619912211","doi":"https://doi.org/10.1587/transinf.2016edl8230","mag":"2619912211"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2016edl8230","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2016edl8230","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E100.D/6/E100.D_2016EDL8230/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E100.D/6/E100.D_2016EDL8230/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089784582","display_name":"Jing Liu","orcid":"https://orcid.org/0000-0002-6265-8348"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing LIU","raw_affiliation_strings":["College of Computer, National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100344804","display_name":"Yuan Wang","orcid":"https://orcid.org/0000-0001-5724-555X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan WANG","raw_affiliation_strings":["College of Computer, National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021514687","display_name":"Pei Dai XIE","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pei Dai XIE","raw_affiliation_strings":["College of Computer, National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022825274","display_name":"Yong Jun Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Jun WANG","raw_affiliation_strings":["College of Computer, National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089784582"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.3731,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5575836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"E100.D","issue":"6","first_page":"1368","last_page":"1371"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8526409864425659},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7746819257736206},{"id":"https://openalex.org/keywords/phylogenetic-tree","display_name":"Phylogenetic tree","score":0.7342472076416016},{"id":"https://openalex.org/keywords/reticulate","display_name":"Reticulate","score":0.7179024815559387},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4973311722278595},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.49440693855285645},{"id":"https://openalex.org/keywords/phylogenetic-network","display_name":"Phylogenetic network","score":0.4637186527252197},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.436578631401062},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35408884286880493},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35345152020454407},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.14691001176834106},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13509395718574524},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11239239573478699},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.10313144326210022}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8526409864425659},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7746819257736206},{"id":"https://openalex.org/C193252679","wikidata":"https://www.wikidata.org/wiki/Q242125","display_name":"Phylogenetic tree","level":3,"score":0.7342472076416016},{"id":"https://openalex.org/C2780432395","wikidata":"https://www.wikidata.org/wiki/Q21149008","display_name":"Reticulate","level":2,"score":0.7179024815559387},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4973311722278595},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.49440693855285645},{"id":"https://openalex.org/C26619641","wikidata":"https://www.wikidata.org/wiki/Q3142246","display_name":"Phylogenetic network","level":4,"score":0.4637186527252197},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.436578631401062},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35408884286880493},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35345152020454407},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.14691001176834106},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13509395718574524},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11239239573478699},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.10313144326210022},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2016edl8230","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2016edl8230","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E100.D/6/E100.D_2016EDL8230/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2016edl8230","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2016edl8230","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E100.D/6/E100.D_2016EDL8230/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G129938404","display_name":null,"funder_award_id":"No.61472439","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1718823573","display_name":null,"funder_award_id":"61472439","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4141363445","display_name":null,"funder_award_id":"61271252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5674434244","display_name":null,"funder_award_id":"61379052","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6058138561","display_name":null,"funder_award_id":", No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2619912211.pdf","grobid_xml":"https://content.openalex.org/works/W2619912211.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W14484578","https://openalex.org/W224410497","https://openalex.org/W623543878","https://openalex.org/W1014770336","https://openalex.org/W1981678030","https://openalex.org/W2008324060","https://openalex.org/W2029991569","https://openalex.org/W2145056020","https://openalex.org/W2222512263","https://openalex.org/W2533631783","https://openalex.org/W2577598991","https://openalex.org/W4292692470"],"related_works":["https://openalex.org/W2007492229","https://openalex.org/W2365588293","https://openalex.org/W4387455607","https://openalex.org/W2055298722","https://openalex.org/W2135713257","https://openalex.org/W2104287568","https://openalex.org/W4362657803","https://openalex.org/W4305020964","https://openalex.org/W2951456975","https://openalex.org/W3144097773"],"abstract_inverted_index":{"Malware":[0],"phylogeny":[1],"refers":[2],"to":[3],"inferring":[4],"the":[5,81],"evolutionary":[6],"relationships":[7],"among":[8],"instances":[9],"of":[10,80,125],"a":[11,52,67,121],"family.":[12],"It":[13],"plays":[14],"an":[15],"important":[16],"role":[17],"in":[18,45,90],"malware":[19,69,99],"forensics.":[20],"Previous":[21],"works":[22],"mainly":[23],"focused":[24],"on":[25,75,97],"tree-based":[26],"model.":[27],"However,":[28],"trees":[29],"cannot":[30],"represent":[31],"reticulate":[32,85],"events,":[33],"such":[34],"as":[35,51],"inheriting":[36],"code":[37],"fragments":[38],"from":[39],"different":[40],"parents,":[41],"which":[42],"are":[43,108],"common":[44],"variants":[46],"generation.":[47],"Therefore,":[48],"phylogenetic":[49,70],"networks":[50],"more":[53],"accurate":[54],"and":[55,87,101,110],"general":[56],"model":[57],"have":[58],"been":[59],"put":[60],"forward.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65],"propose":[66],"novel":[68],"network":[71],"construction":[72],"method":[73,119],"based":[74],"splits":[76,91],"graph,":[77],"taking":[78],"advantage":[79],"one-to-one":[82],"correspondence":[83],"between":[84],"events":[86],"netted":[88],"components":[89],"graph.":[92],"We":[93],"evaluate":[94],"our":[95,118],"algorithm":[96],"three":[98],"families":[100,104],"two":[102],"benign":[103],"whose":[105],"ground":[106],"truth":[107],"known":[109],"compare":[111],"with":[112],"competing":[113],"algorithms.":[114],"Experiments":[115],"demonstrate":[116],"that":[117],"achieves":[120],"higher":[122],"mean":[123],"accuracy":[124],"64.8%.":[126]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
