{"id":"https://openalex.org/W4405266078","doi":"https://doi.org/10.32604/cmc.2024.059116","title":"Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model","display_name":"Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4405266078","doi":"https://doi.org/10.32604/cmc.2024.059116"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2024.059116","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.059116","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-3/TSP_CMC_59116/TSP_CMC_59116.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-3/TSP_CMC_59116/TSP_CMC_59116.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115093081","display_name":"Ki-Pyoung Ma","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ki-Pyoung Ma","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115093082","display_name":"Dong-Ju Ryu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dong-Ju Ryu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5115093083","display_name":"Sang-Joon Lee","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sang-Joon Lee","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115093081"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.5341,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90886517,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"81","issue":"3","first_page":"4485","last_page":"4502"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8181999921798706,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8181999921798706,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7259304523468018},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6718422174453735},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6577872633934021},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4901367127895355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36328768730163574},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20327255129814148},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08775848150253296}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7259304523468018},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6718422174453735},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6577872633934021},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4901367127895355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36328768730163574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20327255129814148},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08775848150253296}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2024.059116","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.059116","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-3/TSP_CMC_59116/TSP_CMC_59116.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2024.059116","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.059116","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-3/TSP_CMC_59116/TSP_CMC_59116.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405266078.pdf","grobid_xml":"https://content.openalex.org/works/W4405266078.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1977366836","https://openalex.org/W2223594212","https://openalex.org/W2493960021","https://openalex.org/W2558619741","https://openalex.org/W2807312247","https://openalex.org/W2885747980","https://openalex.org/W2970607737","https://openalex.org/W2981731882","https://openalex.org/W2998074434","https://openalex.org/W3034402928","https://openalex.org/W3035775076","https://openalex.org/W3088961167","https://openalex.org/W3097711322","https://openalex.org/W3101124703","https://openalex.org/W3174752098","https://openalex.org/W3183198896","https://openalex.org/W3197944870","https://openalex.org/W4283170759","https://openalex.org/W4293742266","https://openalex.org/W4316690373","https://openalex.org/W6735455086","https://openalex.org/W6745399295","https://openalex.org/W6747471387","https://openalex.org/W6748569134","https://openalex.org/W6749587485","https://openalex.org/W6753970532","https://openalex.org/W6754313517","https://openalex.org/W6804507634","https://openalex.org/W6866422952","https://openalex.org/W6870453877"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819"],"abstract_inverted_index":{"With":[0],"the":[1,36],"advancements":[2],"in":[3],"artificial":[4],"intelligence":[5],"(AI)":[6],"technology,":[7],"attackers":[8],"are":[9],"increasingly":[10],"using":[11],"sophisticated":[12],"techniques,":[13],"including":[14],"ChatGPT.":[15],"Endpoint":[16],"Detection":[17],"&":[18],"Response":[19],"(EDR)":[20],"is":[21],"a":[22],"system":[23],"that":[24],"detects":[25],"and":[26,33],"responds":[27],"to":[28],"stra...":[29],"|":[30],"Find,":[31],"read":[32],"cite":[34],"all":[35],"research":[37],"you":[38],"need":[39],"on":[40],"Tech":[41],"Science":[42],"Press":[43]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
