{"id":"https://openalex.org/W4411383103","doi":"https://doi.org/10.32604/cmc.2025.064053","title":"AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model","display_name":"AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411383103","doi":"https://doi.org/10.32604/cmc.2025.064053"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064053","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064053","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064053","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071261948","display_name":"Brij B. Gupta","orcid":"https://orcid.org/0000-0003-4929-4698"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Brij B. Gupta","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042846465","display_name":"Akshat Gaurav","orcid":"https://orcid.org/0000-0002-5796-9424"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akshat Gaurav","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058545850","display_name":"Wadee Alhalabi","orcid":"https://orcid.org/0000-0002-4505-7268"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wadee Alhalabi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086803967","display_name":"Varsha Arya","orcid":"https://orcid.org/0000-0001-7549-4429"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Varsha Arya","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101290033","display_name":"Shavi Bansal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shavi Bansal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5091598011","display_name":"Ching\u2010Hsien Hsu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ching-Hsien Hsu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5071261948"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5743,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83343298,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"84","issue":"3","first_page":"4755","last_page":"4772"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9230999946594238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.8918117880821228},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6874226331710815},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6005757451057434},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5868546962738037},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5238461494445801},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4801085293292999},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4399900734424591},{"id":"https://openalex.org/keywords/extraction","display_name":"Extraction (chemistry)","score":0.4101424515247345},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36064672470092773},{"id":"https://openalex.org/keywords/chromatography","display_name":"Chromatography","score":0.10696947574615479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07211941480636597},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.07006213068962097}],"concepts":[{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.8918117880821228},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6874226331710815},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6005757451057434},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5868546962738037},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5238461494445801},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4801085293292999},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4399900734424591},{"id":"https://openalex.org/C4725764","wikidata":"https://www.wikidata.org/wiki/Q844704","display_name":"Extraction (chemistry)","level":2,"score":0.4101424515247345},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36064672470092773},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.10696947574615479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07211941480636597},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.07006213068962097},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064053","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064053","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064053","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064053","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2047167450","https://openalex.org/W2801888526","https://openalex.org/W2895892359","https://openalex.org/W2998961572","https://openalex.org/W3005728573","https://openalex.org/W3020985685","https://openalex.org/W3164037460","https://openalex.org/W4210517283","https://openalex.org/W4236831438","https://openalex.org/W4240330722","https://openalex.org/W4285029663","https://openalex.org/W4292826151","https://openalex.org/W4386601492","https://openalex.org/W4389804959","https://openalex.org/W4390503182","https://openalex.org/W4401054291","https://openalex.org/W4404858069","https://openalex.org/W4406072021"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"Detecting":[0],"cyber":[1],"attacks":[2],"in":[3,21,98,169],"networks":[4],"connected":[5],"to":[6,63,91,144],"the":[7,18,22,105,108,118,129,134,138,146,149,154,162,166],"Internet":[8,99],"of":[9,13,17,100,110,120,148,153,160,171],"Things":[10,101],"(IoT)":[11,102],"is":[12,125,142,195,202],"utmost":[14],"importance":[15],"because":[16],"growing":[19],"vulnerabilities":[20],"smart":[23],"environment.":[24],"Conventional":[25],"models,":[26],"such":[27,41],"as":[28,36,38,42],"Naive":[29],"Bayes":[30],"and":[31,45,87,95,175],"support":[32],"vector":[33],"machine":[34],"(SVM),":[35],"well":[37],"ensemble":[39],"methods,":[40],"Gradient":[43],"Boosting":[44],"eXtreme":[46],"gradient":[47],"boosting":[48],"(XGBoost),":[49],"are":[50],"often":[51],"plagued":[52],"by":[53,128],"high":[54],"computational":[55,191],"costs,":[56],"which":[57,184],"makes":[58],"it":[59,201],"challenging":[60],"for":[61,197],"them":[62],"perform":[64],"real-time":[65,198],"detection.":[66],"In":[67,104],"this":[68],"regard,":[69],"we":[70],"suggested":[71,106,163],"an":[72,158],"attack":[73],"detection":[74,93],"approach":[75],"that":[76],"integrates":[77],"Visual":[78],"Geometry":[79],"Group":[80],"16":[81],"(VGG16),":[82],"Artificial":[83],"Rabbits":[84],"Optimizer":[85],"(ARO),":[86],"Random":[88],"Forest":[89],"Model":[90],"increase":[92],"accuracy":[94,159],"operational":[96],"efficiency":[97],"networks.":[103],"model,":[107],"extraction":[109],"features":[111,136],"from":[112,137],"malware":[113],"pictures":[114],"was":[115],"accomplished":[116],"with":[117],"help":[119],"VGG16.":[121,139],"The":[122,177],"prediction":[123],"process":[124],"carried":[126],"out":[127],"random":[130,150,155],"forest":[131,151],"model":[132,152,164],"using":[133],"extracted":[135],"Additionally,":[140],"ARO":[141],"used":[143],"improve":[145],"hyper-parameters":[147],"forest.":[156],"With":[157],"96.36%,":[161],"outperforms":[165],"standard":[167],"models":[168],"terms":[170],"accuracy,":[172],"F1-score,":[173],"precision,":[174],"recall.":[176],"comparative":[178],"research":[179],"highlights":[180],"our":[181],"strategy\u2019s":[182],"success,":[183],"improves":[185],"performance":[186],"while":[187],"maintaining":[188],"a":[189],"lower":[190],"cost.":[192],"This":[193],"method":[194],"ideal":[196],"applications,":[199],"but":[200],"effective.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
