{"id":"https://openalex.org/W4220862422","doi":"https://doi.org/10.23919/icact53585.2022.9728944","title":"Malware Developing Guide: Encryption and Decryption","display_name":"Malware Developing Guide: Encryption and Decryption","publication_year":2022,"publication_date":"2022-02-13","ids":{"openalex":"https://openalex.org/W4220862422","doi":"https://doi.org/10.23919/icact53585.2022.9728944"},"language":"en","primary_location":{"id":"doi:10.23919/icact53585.2022.9728944","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728944","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015753719","display_name":"Jutiphat Chatsomsanga","orcid":null},"institutions":[{"id":"https://openalex.org/I91538806","display_name":"King Mongkut's Institute of Technology Ladkrabang","ror":"https://ror.org/055mf0v62","country_code":"TH","type":"education","lineage":["https://openalex.org/I91538806"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Jutiphat Chatsomsanga","raw_affiliation_strings":["King Mongkut&#x2019;s Institute of Technology Ladkrabang,School of Engineering,Department of Computer Engineering,Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s Institute of Technology Ladkrabang,School of Engineering,Department of Computer Engineering,Bangkok,Thailand","institution_ids":["https://openalex.org/I91538806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031163175","display_name":"C. Benjangkaprasert","orcid":"https://orcid.org/0009-0006-5832-2450"},"institutions":[{"id":"https://openalex.org/I91538806","display_name":"King Mongkut's Institute of Technology Ladkrabang","ror":"https://ror.org/055mf0v62","country_code":"TH","type":"education","lineage":["https://openalex.org/I91538806"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Chawalit Benjangkaprasert","raw_affiliation_strings":["King Mongkut&#x2019;s Institute of Technology Ladkrabang,School of Engineering,Department of Computer Engineering,Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s Institute of Technology Ladkrabang,School of Engineering,Department of Computer Engineering,Bangkok,Thailand","institution_ids":["https://openalex.org/I91538806"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015753719"],"corresponding_institution_ids":["https://openalex.org/I91538806"],"apc_list":null,"apc_paid":null,"fwci":0.1229,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.19778831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"275","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7291381359100342},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7133921980857849},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5783063173294067},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5601250529289246},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.46869325637817383}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7291381359100342},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7133921980857849},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5783063173294067},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5601250529289246},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.46869325637817383}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact53585.2022.9728944","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728944","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2725183405","https://openalex.org/W2783466036","https://openalex.org/W2892591849","https://openalex.org/W2907266246","https://openalex.org/W2968401457","https://openalex.org/W2973070188","https://openalex.org/W3005124797","https://openalex.org/W4244352568","https://openalex.org/W6767447022","https://openalex.org/W6922405978"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W4253977752","https://openalex.org/W2942879794","https://openalex.org/W2964829536","https://openalex.org/W4224941017"],"abstract_inverted_index":{"This":[0],"research":[1,37],"aims":[2],"to":[3,15,31,71],"understand":[4],"malware":[5,7],"from":[6,11],"author\u2019s":[8],"view.":[9],"Starting":[10],"Ransomware,":[12],"we":[13,38],"attempt":[14],"develop":[16],"ransomware":[17],"written":[18],"in":[19,25,94],"python":[20],"and":[21,56,62,73,87,90],"encrypt":[22,72],"all":[23],"files":[24],"Windows":[26,44],"platform":[27],"without":[28],"doing":[29],"harm":[30],"crucial":[32],"system":[33],"files.":[34,75],"In":[35],"this":[36],"use":[39],"Asus":[40],"K550J":[41],"laptop":[42],"with":[43,59],"10":[45],"education":[46],"(Build":[47],"19042)":[48],"as":[49,66,68],"a":[50],"victim":[51],"machine.":[52],"We":[53],"ran":[54],"encryption":[55,79,89],"decryption":[57,85,91],"program":[58],"different":[60],"privilege":[61],"observe":[63],"the":[64,95],"results":[65],"well":[67],"time":[69],"takes":[70],"decrypt":[74],"Results":[76],"show":[77],"that":[78],"process":[80,86],"is":[81],"much":[82],"slower":[83,93],"than":[84],"both":[88],"work":[92],"bigger":[96],"file":[97],"size.":[98]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
