{"id":"https://openalex.org/W2898374736","doi":"https://doi.org/10.23919/tma.2018.8506545","title":"An Artificial Arms Race: Could it Improve Mobile Malware Detectors?","display_name":"An Artificial Arms Race: Could it Improve Mobile Malware Detectors?","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2898374736","doi":"https://doi.org/10.23919/tma.2018.8506545","mag":"2898374736"},"language":"en","primary_location":{"id":"doi:10.23919/tma.2018.8506545","is_oa":false,"landing_page_url":"https://doi.org/10.23919/tma.2018.8506545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044269747","display_name":"Rapahel Bronfman-Nadas","orcid":null},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Rapahel Bronfman-Nadas","raw_affiliation_strings":["Computer Science, Dalhousie University, Halifax, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Science, Dalhousie University, Halifax, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008462534","display_name":"A. Nur Zincir\u2010Heywood","orcid":"https://orcid.org/0000-0003-2796-7265"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Nur Zincir-Heywood","raw_affiliation_strings":["Computer Science, Dalhousie University, Halifax, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Science, Dalhousie University, Halifax, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060005151","display_name":"J. T. Jacobs","orcid":null},"institutions":[{"id":"https://openalex.org/I1306686416","display_name":"RTX (United States)","ror":"https://ror.org/0354t7b78","country_code":"US","type":"company","lineage":["https://openalex.org/I1306686416"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John T. Jacobs","raw_affiliation_strings":["Raytheon Space and Airborne Systems, California, USA"],"affiliations":[{"raw_affiliation_string":"Raytheon Space and Airborne Systems, California, USA","institution_ids":["https://openalex.org/I1306686416"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044269747"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":1.8166,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86547769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arms-race","display_name":"Arms race","score":0.8957103490829468},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8939085006713867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.770409107208252},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.6688834428787231},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6105024814605713},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5528601408004761},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.5161013007164001},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5074030756950378},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4846213757991791},{"id":"https://openalex.org/keywords/race","display_name":"Race (biology)","score":0.4801337420940399},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.47345536947250366},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4189490079879761},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3373388946056366},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12249311804771423},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11575675010681152},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11322921514511108},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08936142921447754},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07410091161727905}],"concepts":[{"id":"https://openalex.org/C2989419327","wikidata":"https://www.wikidata.org/wiki/Q322348","display_name":"Arms race","level":2,"score":0.8957103490829468},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8939085006713867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.770409107208252},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.6688834428787231},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6105024814605713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5528601408004761},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.5161013007164001},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5074030756950378},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4846213757991791},{"id":"https://openalex.org/C76509639","wikidata":"https://www.wikidata.org/wiki/Q918036","display_name":"Race (biology)","level":2,"score":0.4801337420940399},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.47345536947250366},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4189490079879761},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3373388946056366},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12249311804771423},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11575675010681152},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11322921514511108},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08936142921447754},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07410091161727905},{"id":"https://openalex.org/C6303427","wikidata":"https://www.wikidata.org/wiki/Q47398","display_name":"Economic history","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/tma.2018.8506545","is_oa":false,"landing_page_url":"https://doi.org/10.23919/tma.2018.8506545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W129383413","https://openalex.org/W145674438","https://openalex.org/W1674877186","https://openalex.org/W1984008582","https://openalex.org/W1995566852","https://openalex.org/W2032247543","https://openalex.org/W2048857175","https://openalex.org/W2077278164","https://openalex.org/W2087970742","https://openalex.org/W2122672392","https://openalex.org/W2141929795","https://openalex.org/W2293458749","https://openalex.org/W2403995870","https://openalex.org/W2621187857","https://openalex.org/W2734415351","https://openalex.org/W2734506521","https://openalex.org/W2963208797","https://openalex.org/W2964187630","https://openalex.org/W3099263166","https://openalex.org/W6637096788","https://openalex.org/W6745836416","https://openalex.org/W7056123933"],"related_works":["https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W4245250093","https://openalex.org/W3114159050","https://openalex.org/W2484248966","https://openalex.org/W4244354662","https://openalex.org/W2609233367","https://openalex.org/W4200054778","https://openalex.org/W2777464647","https://openalex.org/W2965539362"],"abstract_inverted_index":{"On":[0],"the":[1,9,31,38,72,75,80,96,118,127,131],"Internet":[2],"today,":[3],"mobile":[4,21,34,39,45,66,111],"malware":[5,35,46,67],"is":[6,30],"one":[7,27],"of":[8,33,74,92,95,130],"most":[10],"common":[11],"attack":[12],"methods.":[13],"These":[14],"attacks":[15],"are":[16],"usually":[17],"established":[18],"via":[19],"malicious":[20,108],"apps.":[22],"To":[23,83],"combat":[24],"this":[25,53,86,124],"threat,":[26],"technique":[28],"used":[29],"deployment":[32],"detectors.":[36],"As":[37],"threats":[40],"evolve,":[41],"designing":[42],"and":[43,68,109,113],"developing":[44],"detectors":[47,69,128],"remains":[48],"a":[49,90],"challenging":[50],"task.":[51],"In":[52],"paper,":[54],"we":[55,88],"aim":[56],"to":[57,77,79],"explore":[58],"whether":[59],"creating":[60],"an":[61],"artificial":[62,119],"arms":[63,97,120],"race":[64,98,121],"between":[65],"could":[70],"improve":[71],"ability":[73],"detector":[76],"adapt":[78],"evolving":[81],"threats.":[82],"better":[84],"model":[85],"interaction,":[87],"present":[89],"co-evolution":[91],"both":[93],"sides":[94],"using":[99],"genetic":[100],"algorithms.":[101],"The":[102],"experimental":[103],"evaluations":[104],"on":[105],"publicly":[106],"available":[107],"non-malicious":[110],"apps":[112],"their":[114],"variants":[115],"generated":[116],"by":[117],"show":[122],"that":[123],"approach":[125],"improves":[126],"understanding":[129],"problem.":[132]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
