{"id":"https://openalex.org/W2390760470","doi":"https://doi.org/10.3233/jifs-169015","title":"Malware classification using dynamic features and Hidden Markov Model","display_name":"Malware classification using dynamic features and Hidden Markov Model","publication_year":2016,"publication_date":"2016-07-22","ids":{"openalex":"https://openalex.org/W2390760470","doi":"https://doi.org/10.3233/jifs-169015","mag":"2390760470"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-169015","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169015","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101868447","display_name":"Mohammad Imran","orcid":"https://orcid.org/0000-0003-3321-741X"},"institutions":[{"id":"https://openalex.org/I4210088086","display_name":"Capital University of Science and Technology","ror":"https://ror.org/004776246","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210088086"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Mohammad Imran","raw_affiliation_strings":["Department of Computer Science, Capital University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Capital University of Science and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I4210088086"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108009280","display_name":"Muhammad Tanvir Afzal","orcid":"https://orcid.org/0000-0002-9765-8815"},"institutions":[{"id":"https://openalex.org/I4210088086","display_name":"Capital University of Science and Technology","ror":"https://ror.org/004776246","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210088086"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Tanvir Afzal","raw_affiliation_strings":["Department of Computer Science, Capital University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Capital University of Science and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I4210088086"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070355599","display_name":"Muhammad Abdul Qadir","orcid":"https://orcid.org/0000-0003-4634-9016"},"institutions":[{"id":"https://openalex.org/I4210088086","display_name":"Capital University of Science and Technology","ror":"https://ror.org/004776246","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210088086"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Abdul Qadir","raw_affiliation_strings":["Department of Computer Science, Capital University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Capital University of Science and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I4210088086"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101868447"],"corresponding_institution_ids":["https://openalex.org/I4210088086"],"apc_list":null,"apc_paid":null,"fwci":0.71433316,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.71876933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"31","issue":"2","first_page":"837","last_page":"847"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9185570478439331},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.7397223711013794},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7343078255653381},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.7037320137023926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5862728357315063},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5707187652587891},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5515130758285522},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.46800342202186584},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.44138893485069275},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4085754156112671},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07667261362075806}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9185570478439331},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.7397223711013794},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7343078255653381},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.7037320137023926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5862728357315063},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5707187652587891},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5515130758285522},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.46800342202186584},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.44138893485069275},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4085754156112671},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07667261362075806},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-169015","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169015","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1521088389","https://openalex.org/W1559450590","https://openalex.org/W1576226931","https://openalex.org/W1581009051","https://openalex.org/W1851403712","https://openalex.org/W1910686388","https://openalex.org/W1964406293","https://openalex.org/W1996975221","https://openalex.org/W2022317397","https://openalex.org/W2044660163","https://openalex.org/W2044751544","https://openalex.org/W2066220442","https://openalex.org/W2072698166","https://openalex.org/W2082238959","https://openalex.org/W2091384774","https://openalex.org/W2102122585","https://openalex.org/W2104425135","https://openalex.org/W2105594594","https://openalex.org/W2110978214","https://openalex.org/W2111038628","https://openalex.org/W2125838338","https://openalex.org/W2129860818","https://openalex.org/W2132874238","https://openalex.org/W2144112223","https://openalex.org/W2154554798","https://openalex.org/W2156606946","https://openalex.org/W2240935584","https://openalex.org/W2427114450","https://openalex.org/W2545965848","https://openalex.org/W4231339208","https://openalex.org/W4249258996","https://openalex.org/W6631015713","https://openalex.org/W6633403869","https://openalex.org/W6641406445"],"related_works":["https://openalex.org/W2427114450","https://openalex.org/W2134999511","https://openalex.org/W2729514902","https://openalex.org/W2024160000","https://openalex.org/W2773500201","https://openalex.org/W2061273563","https://openalex.org/W2134071121","https://openalex.org/W2285052147","https://openalex.org/W4287995534","https://openalex.org/W2968586400"],"abstract_inverted_index":{"In":[0],"recent":[1],"years":[2],"the":[3,26,66,82,113,122,133,142,151,157,171,184,194],"number":[4],"of":[5,15,17,53,58,73,90,150,163,190],"new":[6],"malware":[7,24,36,46,59,91,103,147,208],"threats":[8],"has":[9,48],"increased":[10],"significantly,":[11],"causing":[12],"a":[13,56,93,176],"damage":[14],"billions":[16],"dollars":[18],"globally.":[19],"To":[20],"counter":[21],"this":[22],"aggressive":[23],"attack,":[25],"anti-malware":[27],"industry":[28],"needs":[29],"to":[30,33,39,111,125,140,183],"be":[31],"able":[32],"correctly":[34],"classify":[35],"in":[37,65,132,170,175,193],"order":[38],"provide":[40],"defense":[41],"against":[42,121],"them.":[43],"Consequently":[44],",":[45],"classification":[47,60,75,89,138,179],"been":[49,63],"an":[50,145],"active":[51],"area":[52],"research,":[54],"and":[55,85,95,136,167],"multitude":[57],"approaches":[61],"have":[62],"proposed":[64],"literature.":[67],"This":[68],"paper":[69],"evaluates":[70],"two":[71,152],"methods":[72],"sequence":[74],"based":[76],"on":[77,207],"Hidden":[78,114,164],"Markov":[79,115,165],"Model,":[80],"namely":[81],"maximum":[83,134,185],"likelihood":[84,135,186],"similarity-based":[86,137,172,195],"methods,":[87],"for":[88,144],"using":[92],"large":[94],"comprehensive":[96],"dataset.":[97],"System":[98],"calls":[99],"generated":[100],"by":[101],"known":[102],"during":[104],"execution":[105],"are":[106,119,130],"used":[107,131],"as":[108,181],"observation":[109],"sequences":[110],"train":[112],"Models.":[116],"Malware":[117],"samples":[118],"evaluated":[120],"trained":[123],"models":[124],"produce":[126],"similarity":[127,209],"vectors,":[128],"which":[129],"schemes":[139,153],"predict":[141],"family":[143],"unknown":[146],"sample.":[148],"Comparison":[149],"shows":[154],"that":[155,198],"combining":[156],"powerful":[158],"statistical":[159],"pattern":[160],"analysis":[161],"capability":[162],"Models":[166],"discriminative":[168],"classifiers":[169,192,206],"method":[173,196],"results":[174],"significantly":[177],"better":[178,203],"performance":[180],"compared":[182],"approach.":[187],"Furthermore,":[188],"evaluation":[189],"different":[191],"demonstrates":[197],"Random":[199],"Forest":[200],"classifier":[201],"performs":[202],"than":[204],"other":[205],"vectors.":[210]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
