{"id":"https://openalex.org/W7130601206","doi":"https://doi.org/10.3103/s0146411625700257","title":"On the Study of One Way to Detect Anomalous Program Execution","display_name":"On the Study of One Way to Detect Anomalous Program Execution","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7130601206","doi":"https://doi.org/10.3103/s0146411625700257"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411625700257","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700257","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126382454","display_name":"Y. V. Kosolapov","orcid":null},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Y. V. Kosolapov","raw_affiliation_strings":["Southern Federal University, Rostov-on-Don, Russia"],"affiliations":[{"raw_affiliation_string":"Southern Federal University, Rostov-on-Don, Russia","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126437589","display_name":"T. A. Pavlova","orcid":null},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"T. A. Pavlova","raw_affiliation_strings":["Southern Federal University, Rostov-on-Don, Russia"],"affiliations":[{"raw_affiliation_string":"Southern Federal University, Rostov-on-Don, Russia","institution_ids":["https://openalex.org/I137534880"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5126382454"],"corresponding_institution_ids":["https://openalex.org/I137534880"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7242324,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"59","issue":"7","first_page":"885","last_page":"894"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.12620000541210175,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.12620000541210175,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.10220000147819519,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.07609999924898148,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6197999715805054},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6072999835014343},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.54339998960495},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.4810999929904938},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.2912999987602234},{"id":"https://openalex.org/keywords/execution-time","display_name":"Execution time","score":0.28299999237060547}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.894599974155426},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6197999715805054},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6072999835014343},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.54339998960495},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.4810999929904938},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4697999954223633},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40529999136924744},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34689998626708984},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3003999888896942},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C2989134064","wikidata":"https://www.wikidata.org/wiki/Q288510","display_name":"Execution time","level":2,"score":0.28299999237060547},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27649998664855957},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2653999924659729},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C203595873","wikidata":"https://www.wikidata.org/wiki/Q25389927","display_name":"Change detection","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411625700257","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700257","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6491431593894958,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1941427975","https://openalex.org/W2135143063","https://openalex.org/W4200059708","https://openalex.org/W4210656948","https://openalex.org/W4296640570","https://openalex.org/W4321787264"],"related_works":[],"abstract_inverted_index":{"Developing":[0],"more":[1,294],"accurate":[2],"and":[3,29,42,175,284,299,304],"adaptive":[4],"methods":[5],"for":[6,37,51,167,194],"detecting":[7,41,52],"malicious":[8,56],"code":[9,57],"is":[10,67,82,104,110],"a":[11,62,70,79,85,99,165,172,203,289],"critical":[12],"challenge":[13],"in":[14,58,89,119,206],"the":[15,35,53,59,75,90,94,113,116,120,127,132,134,137,151,159,169,178,181,191,209,216,224,231,240,243,246,250,254,259,262,270],"context":[16],"of":[17,55,61,78,87,93,140,171,180,183,186,211,226,242,261,272,297],"constantly":[18],"evolving":[19],"cybersecurity":[20],"threats.":[21,45,307],"This":[22,46,65],"requires":[23],"constant":[24],"attention":[25],"to":[26,40,129,131,157,249,278,281],"new":[27],"vulnerabilities":[28],"attack":[30],"methods,":[31],"as":[32,34,253],"well":[33],"search":[36],"innovative":[38],"approaches":[39],"preventing":[43],"cyber":[44,302,306],"paper":[47],"examines":[48],"an":[49,187],"algorithm":[50,66,218,248],"execution":[54,77],"process":[60],"protected":[63,80],"program.":[64],"based":[68],"on":[69,190,258],"previously":[71],"proposed":[72,217,251],"approach,":[73],"when":[74],"legitimate":[76],"program":[81,121,264],"described":[83],"by":[84,112,215,230],"profile":[86,133,174],"differences":[88],"return":[91,138],"addresses":[92,139],"called":[95,98,106],"functions,":[96],"also":[97,146],"distance":[100,173,189],"profile.":[101],"A":[102],"concept":[103],"introduced":[105],"positional":[107,153],"distance,":[108],"which":[109],"determined":[111],"difference":[114],"between":[115,136],"call":[117],"numbers":[118],"trace.":[122],"The":[123,198,267],"main":[124],"change":[125],"was":[126],"ability":[128],"add":[130],"distances":[135,213,228],"not":[141],"only":[142],"neighboring":[143],"functions":[144],"but":[145],"several":[147],"previous":[148],"ones":[149],"with":[150,202],"given":[152],"distance.":[154],"In":[155],"addition":[156],"modifying":[158],"detection":[160,185,276],"algorithm,":[161],"this":[162,291],"study":[163,268],"develops":[164],"tool":[166],"automating":[168],"construction":[170],"experimentally":[176],"studies":[177],"dependence":[179],"probability":[182],"false":[184],"atypical":[188,212,227],"training":[192],"duration":[193],"four":[195],"well-known":[196],"browsers.":[197],"experiments":[199],"confirm":[200],"that":[201,239],"slight":[204],"increase":[205],"verification":[207],"time,":[208],"number":[210,225],"detected":[214,229],"can":[219],"be":[220,237],"significantly":[221],"lower":[222],"than":[223],"basic":[232,247],"algorithm.":[233],"However,":[234],"it":[235],"should":[236],"noted":[238],"effect":[241],"transition":[244],"from":[245,301],"one,":[252],"results":[255],"show,":[256],"depends":[257],"characteristics":[260],"specific":[263],"being":[265],"protected.":[266],"highlights":[269],"importance":[271],"continually":[273],"improving":[274],"malware":[275],"techniques":[277],"adapt":[279],"them":[280],"changing":[282],"threats":[283],"software":[285],"operating":[286],"conditions.":[287],"As":[288],"result,":[290],"will":[292],"ensure":[293],"reliable":[295],"protection":[296],"information":[298],"systems":[300],"attacks":[303],"other":[305]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-20T00:00:00"}
