{"id":"https://openalex.org/W4410057622","doi":"https://doi.org/10.32604/cmc.2025.063448","title":"Advanced Techniques for Dynamic Malware Detection and Classification in Digital Security Using Deep Learning","display_name":"Advanced Techniques for Dynamic Malware Detection and Classification in Digital Security Using Deep Learning","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410057622","doi":"https://doi.org/10.32604/cmc.2025.063448"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.063448","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063448","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.063448","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042252313","display_name":"Taher Alzahrani","orcid":"https://orcid.org/0009-0003-0485-8135"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Taher Alzahrani","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5042252313"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.561,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81023989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"83","issue":"3","first_page":"4575","last_page":"4606"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7497559189796448},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6500440835952759},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45396149158477783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4432436227798462},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42846575379371643}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7497559189796448},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6500440835952759},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45396149158477783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4432436227798462},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42846575379371643}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.063448","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063448","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.063448","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063448","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2105442001","https://openalex.org/W3203731077","https://openalex.org/W3207948582","https://openalex.org/W4224263490","https://openalex.org/W4229443308","https://openalex.org/W4293414950","https://openalex.org/W4293790419","https://openalex.org/W4294266394","https://openalex.org/W4388571407","https://openalex.org/W4390562648","https://openalex.org/W4391123048","https://openalex.org/W4391224266","https://openalex.org/W4394565291","https://openalex.org/W4400091584","https://openalex.org/W4401070022","https://openalex.org/W4402825096","https://openalex.org/W4405631660"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W3086377361"],"abstract_inverted_index":{"The":[0,115],"rapid":[1],"evolution":[2],"of":[3,197,203],"malware":[4,33,45,109,141,172],"presents":[5],"a":[6,119,175],"critical":[7],"cybersecurity":[8],"challenge,":[9],"rendering":[10],"traditional":[11],"signature-based":[12],"detection":[13,34,69,110,124],"methods":[14],"ineffective":[15],"against":[16],"novel":[17,120],"variants.":[18],"This":[19,98],"growing":[20],"threat":[21],"affects":[22],"individuals,":[23],"organizations,":[24],"and":[25,43,47,103,122,137,161,187,206],"governments,":[26],"highlighting":[27],"the":[28,194,198],"urgent":[29],"need":[30],"for":[31,133,139],"robust":[32],"mechanisms.":[35],"Conventional":[36],"machine":[37,63],"learning-based":[38],"approaches":[39],"rely":[40],"on":[41,59,73,156,164],"static":[42],"dynamic":[44],"analysis":[46,136,177],"often":[48],"struggle":[49],"to":[50,56,107],"detect":[51],"previously":[52],"unseen":[53],"threats":[54],"due":[55],"their":[57,71],"dependency":[58],"predefined":[60],"signatures.":[61],"Although":[62],"learning":[64,81,105],"algorithms":[65],"(MLAs)":[66],"offer":[67],"promising":[68],"capabilities,":[70],"reliance":[72],"extensive":[74],"feature":[75,88],"engineering":[76],"limits":[77],"real-time":[78],"applicability.":[79],"Deep":[80],"techniques":[82],"mitigate":[83],"this":[84],"issue":[85],"by":[86],"automating":[87],"extraction":[89],"but":[90],"may":[91],"introduce":[92],"computational":[93],"overhead,":[94],"affecting":[95],"deployment":[96],"efficiency.":[97],"research":[99],"evaluates":[100],"classical":[101],"MLAs":[102],"deep":[104],"models":[106],"enhance":[108],"performance":[111,196],"across":[112,146],"diverse":[113],"datasets.":[114],"proposed":[116,199],"approach":[117],"integrates":[118],"text":[121],"image-based":[123,140,165],"framework,":[125],"employing":[126],"an":[127],"optimized":[128],"Support":[129],"Vector":[130],"Machine":[131],"(SVM)":[132],"textual":[134,157],"data":[135],"EfficientNet-B0":[138],"classification.":[142],"Experimental":[143],"analysis,":[144],"conducted":[145],"multiple":[147],"train-test":[148],"splits":[149],"over":[150],"varying":[151],"timescales,":[152],"demonstrates":[153],"99.97%":[154],"accuracy":[155,163],"datasets":[158,166],"using":[159],"SVM":[160],"96.7%":[162],"with":[167,178],"EfficientNet-B0,":[168],"significantly":[169],"improving":[170],"zero-day":[171],"detection.":[173],"Furthermore,":[174],"comparative":[176],"existing":[179],"competitive":[180],"techniques,":[181],"such":[182],"as":[183],"Random":[184],"Forest,":[185],"XGBoost,":[186],"CNN-based":[188],"(Convolutional":[189],"Neural":[190],"Network)":[191],"classifiers,":[192],"highlights":[193],"superior":[195],"model":[200],"in":[201],"terms":[202],"accuracy,":[204],"efficiency,":[205],"robustness.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
