{"id":"https://openalex.org/W2885003046","doi":"https://doi.org/10.3233/jifs-169849","title":"An efficient neural network model for time series forecasting of malware","display_name":"An efficient neural network model for time series forecasting of malware","publication_year":2018,"publication_date":"2018-07-20","ids":{"openalex":"https://openalex.org/W2885003046","doi":"https://doi.org/10.3233/jifs-169849","mag":"2885003046"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-169849","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169849","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109501691","display_name":"Trong\u2010Kha Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I94588446","display_name":"Hongik University","ror":"https://ror.org/00egdv862","country_code":"KR","type":"education","lineage":["https://openalex.org/I94588446"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Trong-Kha Nguyen","raw_affiliation_strings":["Department of Electronics and Computer Engineering, Hongik University, Sejong, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Computer Engineering, Hongik University, Sejong, Korea","institution_ids":["https://openalex.org/I94588446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080304452","display_name":"Duc\u2010Ly Vu","orcid":"https://orcid.org/0000-0002-5445-2729"},"institutions":[{"id":"https://openalex.org/I94588446","display_name":"Hongik University","ror":"https://ror.org/00egdv862","country_code":"KR","type":"education","lineage":["https://openalex.org/I94588446"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Vu Duc Ly","raw_affiliation_strings":["Department of Electronics and Computer Engineering, Hongik University, Sejong, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Computer Engineering, Hongik University, Sejong, Korea","institution_ids":["https://openalex.org/I94588446"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086844518","display_name":"Seong Oun Hwang","orcid":"https://orcid.org/0000-0003-4240-6255"},"institutions":[{"id":"https://openalex.org/I94588446","display_name":"Hongik University","ror":"https://ror.org/00egdv862","country_code":"KR","type":"education","lineage":["https://openalex.org/I94588446"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seong Oun Hwang","raw_affiliation_strings":["Department of Software and Communications Engineering, Hongik University, Sejong, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Software and Communications Engineering, Hongik University, Sejong, Korea","institution_ids":["https://openalex.org/I94588446"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086844518"],"corresponding_institution_ids":["https://openalex.org/I94588446"],"apc_list":null,"apc_paid":null,"fwci":0.9227,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77740422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"35","issue":"6","first_page":"6089","last_page":"6100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9318720102310181},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8069897890090942},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5489873290061951},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5353190302848816},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5154879689216614},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.47195330262184143},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4647563695907593},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.457379549741745},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45560967922210693},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.452169269323349},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3727147579193115}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9318720102310181},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069897890090942},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5489873290061951},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5353190302848816},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5154879689216614},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.47195330262184143},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4647563695907593},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.457379549741745},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45560967922210693},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.452169269323349},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3727147579193115},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-169849","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169849","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W6908809","https://openalex.org/W224410497","https://openalex.org/W1586335931","https://openalex.org/W1605321300","https://openalex.org/W1634176025","https://openalex.org/W1831271947","https://openalex.org/W1996646428","https://openalex.org/W2028070629","https://openalex.org/W2029803196","https://openalex.org/W2034203008","https://openalex.org/W2048665112","https://openalex.org/W2065339563","https://openalex.org/W2081503608","https://openalex.org/W2088897322","https://openalex.org/W2093973026","https://openalex.org/W2104556041","https://openalex.org/W2146521571","https://openalex.org/W2159238567","https://openalex.org/W2166884436","https://openalex.org/W2226733402","https://openalex.org/W2258956667","https://openalex.org/W2338694366","https://openalex.org/W2766736793","https://openalex.org/W3123598380","https://openalex.org/W4205502210","https://openalex.org/W4205686602","https://openalex.org/W4388297464"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2160963033","https://openalex.org/W3022706011","https://openalex.org/W2909615516","https://openalex.org/W2768892939","https://openalex.org/W2249256574","https://openalex.org/W2397240470","https://openalex.org/W4210907385","https://openalex.org/W2065339563"],"abstract_inverted_index":{"Recent":[0],"research":[1],"in":[2,67,101],"the":[3,20,60,78,136,150,165,184],"computer":[4],"security":[5,24,68],"sector":[6],"has":[7,17],"primarily":[8],"been":[9,95],"qualitative,":[10],"focusing":[11],"on":[12],"detection":[13,32],"aspects":[14],"where":[15],"malware":[16,34,52,66,81,87,91,110,139,166,188],"already":[18],"infected":[19],"target.":[21],"Challenges":[22],"for":[23,30,126,196],"vendors":[25],"include":[26],"developing":[27],"better":[28],"techniques":[29],"early":[31],"of":[33,62,65,138,152],"attacks":[35],"before":[36],"they":[37],"can":[38,48,193],"do":[39,107],"malicious":[40],"damage.":[41],"Malware":[42],"prediction":[43],"models":[44,98,125,134],"are":[45],"needed":[46],"that":[47,159,186],"describe":[49],"and":[50,106,131,145,199],"predict":[51,149],"generation":[53,82],"processes.":[54],"In":[55,176],"this":[56],"study,":[57],"we":[58,70,120],"address":[59],"feasibility":[61],"quantitative":[63],"characterization":[64],"assessment,":[69],"propose":[71],"a":[72,113,170],"model":[73,164],"with":[74,142],"aim":[75],"to":[76,85,103,148,163,201],"explain":[77],"mechanism":[79],"behind":[80],"which":[83],"contributes":[84],"estimating":[86],"discovery.":[88],"Although":[89],"several":[90],"modeling":[92],"systems":[93],"have":[94,99],"proposed,":[96],"such":[97],"shortcomings":[100],"related":[102],"historical":[104],"data":[105,111,140,189],"not":[108],"consider":[109],"as":[112],"time":[114,117],"series.":[115,190],"Using":[116],"series":[118],"analysis,":[119],"provide":[121],"predictive":[122],"neural":[123,171],"network":[124,172],"five":[127],"datasets":[128],"from":[129],"Symantec":[130],"Malwr.":[132],"The":[133],"explore":[135],"structures":[137],"along":[141],"leveraging":[143],"non-linear":[144,174],"linear":[146],"properties":[147],"number":[151],"future":[153],"malware.":[154],"Our":[155],"examination":[156],"also":[157],"reveals":[158],"it":[160],"is":[161],"possible":[162],"discovery":[167],"process":[168],"using":[169],"based":[173],"model.":[175],"addition,":[177],"our":[178],"analysis":[179],"provides":[180],"insights":[181],"into":[182],"understanding":[183],"mechanisms":[185],"generate":[187],"This":[191],"information":[192],"be":[194],"useful":[195],"intelligence":[197],"services":[198],"vital":[200],"threat":[202],"assessment.":[203]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
