{"id":"https://openalex.org/W2801927447","doi":"https://doi.org/10.23919/icitst.2017.8356397","title":"Evaluation of AV systems against modern malware","display_name":"Evaluation of AV systems against modern malware","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2801927447","doi":"https://doi.org/10.23919/icitst.2017.8356397","mag":"2801927447"},"language":"en","primary_location":{"id":"doi:10.23919/icitst.2017.8356397","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022192478","display_name":"Abidullah Zarghoon","orcid":null},"institutions":[{"id":"https://openalex.org/I139894009","display_name":"University of Bradford","ror":"https://ror.org/00vs8d940","country_code":"GB","type":"education","lineage":["https://openalex.org/I139894009"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Abidullah Zarghoon","raw_affiliation_strings":["Department of informatics, University of Bradford, Bradford"],"affiliations":[{"raw_affiliation_string":"Department of informatics, University of Bradford, Bradford","institution_ids":["https://openalex.org/I139894009"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062402324","display_name":"Irfan Awan","orcid":"https://orcid.org/0000-0002-3180-1025"},"institutions":[{"id":"https://openalex.org/I139894009","display_name":"University of Bradford","ror":"https://ror.org/00vs8d940","country_code":"GB","type":"education","lineage":["https://openalex.org/I139894009"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Irfan Awan","raw_affiliation_strings":["Department of informatics, University of Bradford, Bradford"],"affiliations":[{"raw_affiliation_string":"Department of informatics, University of Bradford, Bradford","institution_ids":["https://openalex.org/I139894009"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108902672","display_name":"Jules Pagna Disso","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jules Pagna Disso","raw_affiliation_strings":["Research and Innovation Nettitude Ltd"],"affiliations":[{"raw_affiliation_string":"Research and Innovation Nettitude Ltd","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062123782","display_name":"Richard Dennis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Richard Dennis","raw_affiliation_strings":["Research and Innovation Nettitude Ltd"],"affiliations":[{"raw_affiliation_string":"Research and Innovation Nettitude Ltd","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022192478"],"corresponding_institution_ids":["https://openalex.org/I139894009"],"apc_list":null,"apc_paid":null,"fwci":0.1849,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.51279928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"269","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9722132086753845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7129454612731934},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7074195146560669},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.5361577868461609},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.514930784702301},{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.48558753728866577},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.47617191076278687},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2318057417869568}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9722132086753845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7129454612731934},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7074195146560669},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.5361577868461609},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.514930784702301},{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.48558753728866577},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.47617191076278687},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2318057417869568}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icitst.2017.8356397","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1973403081","https://openalex.org/W2138471478","https://openalex.org/W2204544304","https://openalex.org/W2214093201","https://openalex.org/W2394915980"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2160963033","https://openalex.org/W3022706011","https://openalex.org/W2768892939","https://openalex.org/W4210907385","https://openalex.org/W2249256574","https://openalex.org/W2397240470","https://openalex.org/W4381279634","https://openalex.org/W4360996742"],"abstract_inverted_index":{"Countering":[0],"the":[1,12,24,75,84,197,214],"proliferation":[2],"of":[3,11,27,39,86,118,128,202,217],"malware":[4,55,106,213],"has":[5],"been":[6],"for":[7,15,141],"recent":[8],"years":[9],"one":[10,132],"top":[13],"priorities":[14],"governments,":[16],"businesses,":[17],"critical":[18],"infrastructure,":[19],"and":[20,69,89,112],"end":[21],"users.":[22,43],"Despite":[23],"apparent":[25],"evolvement":[26],"anti-virus":[28],"(AV)":[29],"systems,":[30],"malicious":[31,94,143],"authors":[32],"have":[33,189],"managed":[34],"to":[35,49,53,59,92,110,158,192,209],"create":[36],"a":[37,61,126,160],"sense":[38],"insecurity":[40],"amongst":[41],"computer":[42],"Security":[44],"controls":[45],"do":[46],"not":[47,156,179],"appear":[48],"be":[50,60],"sufficiently":[51],"strong":[52],"stop":[54],"proliferating.":[56],"There":[57],"seems":[58],"disconnect":[62],"between":[63],"public":[64],"reports":[65],"on":[66,74],"AV":[67,87,129,182,187],"tests":[68,119],"what":[70],"people":[71],"are":[72,82,196],"experiencing":[73],"daily":[76],"basis.":[77],"In":[78],"this":[79,148],"research,":[80],"we":[81],"testing":[83,142],"efficiency":[85],"products":[88],"their":[90,190,218],"ability":[91],"detect":[93,211],"files":[95],"commonly":[96],"known":[97],"as":[98,194],"malware.":[99],"We":[100,114,123,135,184],"manually":[101,124],"generated":[102],"payloads":[103,176],"from":[104],"five":[105],"frameworks":[107,169],"freely":[108],"available":[109],"download":[111],"use.":[113],"use":[115,137],"two":[116],"modes":[117],"during":[120],"our":[121],"experiments.":[122],"installed":[125],"selection":[127],"systems":[130,154,188],"in":[131,147,174],"first":[133,200,215],"instance.":[134],"also":[136],"an":[138],"online":[139],"framework":[140],"files.":[144],"The":[145],"findings":[146],"study":[149],"show":[150],"that":[151,177,186],"many":[152],"antivirus":[153],"were":[155,170,178],"able":[157],"achieve":[159],"higher":[161],"score":[162],"than":[163],"80%":[164],"detection":[165],"rate.":[166],"Certain":[167],"attack":[168],"much":[171],"more":[172,205],"successful":[173],"generating":[175],"detectable":[180],"by":[181],"systems.":[183],"conclude":[185],"roles":[191],"play":[193],"they":[195],"most":[198,212],"common":[199],"line":[201],"defense,":[203],"but":[204],"work":[206],"is":[207],"needed":[208],"successfully":[210],"day":[216],"release.":[219]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
