{"id":"https://openalex.org/W6944956879","doi":"https://doi.org/10.21227/d820-q842","title":"WinMal25 Dataset","display_name":"WinMal25 Dataset","publication_year":2025,"publication_date":"2025-04-22","ids":{"openalex":"https://openalex.org/W6944956879","doi":"https://doi.org/10.21227/d820-q842"},"language":"en","primary_location":{"id":"doi:10.21227/d820-q842","is_oa":true,"landing_page_url":"https://doi.org/10.21227/d820-q842","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/d820-q842","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Almaraz-Rivera, Josue Genaro","orcid":null},"institutions":[{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"Almaraz-Rivera, Josue Genaro","raw_affiliation_strings":["Tecnologico de Monterrey"],"affiliations":[{"raw_affiliation_string":"Tecnologico de Monterrey","institution_ids":["https://openalex.org/I98461037"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Cantoral-Ceballos, Jose Antonio","orcid":null},"institutions":[{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Cantoral-Ceballos, Jose Antonio","raw_affiliation_strings":["Tecnologico de Monterrey"],"affiliations":[{"raw_affiliation_string":"Tecnologico de Monterrey","institution_ids":["https://openalex.org/I98461037"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Botero, Juan Felipe","orcid":null},"institutions":[{"id":"https://openalex.org/I35961687","display_name":"Universidad de Antioquia","ror":"https://ror.org/03bp5hc83","country_code":"CO","type":"education","lineage":["https://openalex.org/I35961687"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Botero, Juan Felipe","raw_affiliation_strings":["Universidad de Antioquia"],"affiliations":[{"raw_affiliation_string":"Universidad de Antioquia","institution_ids":["https://openalex.org/I35961687"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Perez-Diaz, Jesus Arturo","orcid":null},"institutions":[{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Perez-Diaz, Jesus Arturo","raw_affiliation_strings":["Tecnologico de Monterrey"],"affiliations":[{"raw_affiliation_string":"Tecnologico de Monterrey","institution_ids":["https://openalex.org/I98461037"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Branco, Paula","orcid":null},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Branco, Paula","raw_affiliation_strings":["University of Ottawa"],"affiliations":[{"raw_affiliation_string":"University of Ottawa","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jourdan, Guy-Vincent","orcid":null},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jourdan, Guy-Vincent","raw_affiliation_strings":["University of Ottawa"],"affiliations":[{"raw_affiliation_string":"University of Ottawa","institution_ids":["https://openalex.org/I153718931"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I98461037"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.6452000141143799},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6169000267982483},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5526000261306763},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5307000279426575},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5264000296592712},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4510999917984009},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.40880000591278076},{"id":"https://openalex.org/keywords/external-data-representation","display_name":"External Data Representation","score":0.36660000681877136},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.36640000343322754}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7990000247955322},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.6452000141143799},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6323999762535095},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6262999773025513},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6169000267982483},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5526000261306763},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5307000279426575},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5264000296592712},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4510999917984009},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.40880000591278076},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38960000872612},{"id":"https://openalex.org/C116409475","wikidata":"https://www.wikidata.org/wiki/Q1385056","display_name":"External Data Representation","level":2,"score":0.36660000681877136},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.36640000343322754},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.3499999940395355},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.34459999203681946},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.3386000096797943},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.275299996137619},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.2721000015735626},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.2624000012874603},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.258899986743927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/d820-q842","is_oa":true,"landing_page_url":"https://doi.org/10.21227/d820-q842","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/d820-q842","is_oa":true,"landing_page_url":"https://doi.org/10.21227/d820-q842","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Obfuscated":[0],"malware":[1,118,178],"detection":[2,119,136],"is":[3,10,64,108],"a":[4,54,94,173,184],"complex":[5],"task":[6],"where":[7],"classification":[8],"performance":[9],"seriously":[11],"affected":[12],"due":[13],"to":[14,32,92,98],"the":[15,20,27,49,72,78,83,102,109,117,180],"evasion":[16],"techniques":[17],"presented":[18],"in":[19,77,133,152,156],"input":[21],"software":[22],"samples.":[23],"This":[24],"research":[25],"follows":[26],"novel":[28],"memory":[29],"analysis":[30],"technique":[31],"examine":[33],"features":[34],"extracted":[35],"from":[36],"different":[37],"RAM":[38],"snapshots":[39],"over":[40],"compromised":[41],"Windows":[42],"Virtual":[43],"Machines.":[44],"For":[45],"this,":[46],"we":[47,60,70],"use":[48],"CIC-MalMem-2022":[50],"dataset":[51],"and":[52,138,147,154,179],"create":[53],"new":[55],"collection":[56],"of":[57,86,89,104,135,176],"data":[58,80],"that":[59,126],"call":[61],"WinMal25,":[62],"which":[63],"based":[65],"on":[66],"fileless":[67],"malware.":[68],"Moreover,":[69],"apply":[71],"Self-Supervised":[73,113,127],"Learning":[74,115,128],"paradigm":[75],"directly":[76],"tabular":[79],"domain,":[81],"leveraging":[82],"representation":[84],"learning":[85],"massive":[87],"amounts":[88],"unlabeled":[90],"information":[91],"provide":[93],"strong":[95],"generalization":[96],"capacity":[97],"our":[99,105],"models.":[100],"To":[101],"best":[103],"knowledge,":[106],"this":[107],"first":[110],"work":[111],"implementing":[112],"Tabular":[114,130],"for":[116],"problem.":[120],"The":[121,160],"results":[122],"exhibit":[123],"proven":[124],"evidence":[125],"using":[129],"Networks":[131],"outperforms,":[132],"terms":[134],"rate":[137],"inference":[139],"time":[140],"performance,":[141],"popular":[142],"baselines":[143],"like":[144],"Multi-layer":[145],"Perceptron":[146],"Random":[148],"Forest,":[149],"by":[150],"0.36%":[151],"accuracy":[153],"1.85%":[155],"macro":[157],"F1":[158],"score.":[159],"original":[161],"experimentation":[162],"detailed":[163],"herein,":[164],"encompassing":[165],"Explainable":[166],"Artificial":[167],"Intelligence,":[168],"yields":[169],"relevant":[170],"insights":[171],"toward":[172],"simpler":[174],"characterization":[175],"obfuscated":[177],"considerations":[181],"behind":[182],"deploying":[183],"memory-based":[185],"antivirus.":[186]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
