{"id":"https://openalex.org/W4417045898","doi":"https://doi.org/10.3390/fi17120554","title":"MalScore: A Quality Assessment Framework for Visual Malware Datasets Using No-Reference Image Quality Metrics","display_name":"MalScore: A Quality Assessment Framework for Visual Malware Datasets Using No-Reference Image Quality Metrics","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W4417045898","doi":"https://doi.org/10.3390/fi17120554"},"language":"en","primary_location":{"id":"doi:10.3390/fi17120554","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120554","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/fi17120554","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075926341","display_name":"Jerzy Czaplicki","orcid":null},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jakub Czaplicki","raw_affiliation_strings":["Department of Computer and Information Science, Fordham University, 113 W 60th Street, New York, NY 10023, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, Fordham University, 113 W 60th Street, New York, NY 10023, USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017529726","display_name":"Mohamed Rahouti","orcid":"https://orcid.org/0000-0001-9701-5505"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Rahouti","raw_affiliation_strings":["Department of Computer and Information Science, Fordham University, 113 W 60th Street, New York, NY 10023, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, Fordham University, 113 W 60th Street, New York, NY 10023, USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007232302","display_name":"Abdellah Chehri","orcid":"https://orcid.org/0000-0002-4193-6062"},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Abdellah Chehri","raw_affiliation_strings":["Department of Mathematics and Computer Science, Royal Military College of Canada, Kingston, ON K7K 7B4, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Royal Military College of Canada, Kingston, ON K7K 7B4, Canada","institution_ids":["https://openalex.org/I51768193"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059809226","display_name":"Thaier Hayajneh","orcid":"https://orcid.org/0000-0002-8952-1499"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thaier Hayajneh","raw_affiliation_strings":["Department of Computer and Information Science, Fordham University, 113 W 60th Street, New York, NY 10023, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, Fordham University, 113 W 60th Street, New York, NY 10023, USA","institution_ids":["https://openalex.org/I164389053"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075926341"],"corresponding_institution_ids":["https://openalex.org/I164389053"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.49420039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"12","first_page":"554","last_page":"554"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8022000193595886,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8022000193595886,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.05480000004172325,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.03920000046491623,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8361999988555908},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5015000104904175},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.5001000165939331},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4334000051021576},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3953999876976013},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.3393000066280365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9077000021934509},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8361999988555908},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5715000033378601},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5367000102996826},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5015000104904175},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4334000051021576},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43160000443458557},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3953999876976013},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.3393000066280365},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.33489999175071716},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.3330000042915344},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.321399986743927},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.2809000015258789}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi17120554","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120554","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:de455578894a4d9a8d8fa451bf06bd80","is_oa":true,"landing_page_url":"https://doaj.org/article/de455578894a4d9a8d8fa451bf06bd80","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 12, p 554 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi17120554","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120554","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1982471090","https://openalex.org/W2010065958","https://openalex.org/W2045140281","https://openalex.org/W2051596736","https://openalex.org/W2140952319","https://openalex.org/W2194775991","https://openalex.org/W2905544033","https://openalex.org/W2969659874","https://openalex.org/W2982645003","https://openalex.org/W3022710784","https://openalex.org/W3035712445","https://openalex.org/W3125621245","https://openalex.org/W3167041328","https://openalex.org/W4214575608","https://openalex.org/W4281795618","https://openalex.org/W4297477879","https://openalex.org/W4306316917","https://openalex.org/W4310113565","https://openalex.org/W4320024308","https://openalex.org/W4320490818","https://openalex.org/W4394966955","https://openalex.org/W4399418931","https://openalex.org/W4403674712"],"related_works":[],"abstract_inverted_index":{"The":[0,35],"Internet":[1],"has":[2,42,61,78],"been":[3],"progressively":[4],"more":[5,48,71],"integrated":[6],"into":[7,84],"daily":[8],"life":[9],"through":[10,50],"its":[11],"evolutionary":[12],"stages,":[13],"ranging":[14],"from":[15],"web1.0":[16],"to":[17,33,89,94,126,176,182],"the":[18,27,63,92,101,145,157,163,172,190,204],"current":[19,128],"development":[20],"of":[21,37,66,103,160,193],"web3.0.":[22],"These":[23,187],"continued":[24],"integrations":[25],"broaden":[26],"attack":[28],"surface":[29],"that":[30,80,120,144],"cybercriminals":[31],"aim":[32],"exploit.":[34],"prevalence":[36],"cybercrimes,":[38],"particularly":[39],"malware":[40,67,82,112,200,211],"attacks,":[41],"become":[43],"increasingly":[44],"sophisticated":[45],"and":[46,73,91,130,197,202,209],"made":[47],"accessible":[49],"dark":[51],"web":[52],"marketplaces.":[53],"Including":[54],"artificial":[55],"intelligence":[56],"(AI)":[57],"within":[58],"anti-virus":[59],"solutions":[60],"challenged":[62],"traditional":[64],"dichotomy":[65],"detection":[68,75,212],"schemes,":[69],"offering":[70],"accurate":[72],"holistic":[74],"capabilities.":[76],"Research":[77],"shown":[79],"transforming":[81],"files":[83],"textured":[85],"images":[86],"offers":[87],"resistance":[88],"obfuscation":[90],"potential":[93],"detect":[95],"zero":[96],"days.":[97],"This":[98],"paper":[99],"explores":[100],"application":[102],"image":[104],"quality":[105],"assessment":[106],"(IQA)":[107],"techniques":[108],"in":[109,133,195,213],"enhancing":[110],"visual":[111,199,210],"dataset":[113,135,151],"curation.":[114,136],"We":[115],"propose":[116],"a":[117,122,178],"novel":[118],"framework":[119,148],"applies":[121],"no-reference":[123],"IQA":[124,174,208],"algorithm":[125,175],"evaluate":[127],"datasets":[129,201],"offer":[131],"guidance":[132],"future":[134,214],"Using":[137],"multiple":[138],"popular":[139],"datasets,":[140],"our":[141],"evaluation":[142],"demonstrates":[143],"proposed":[146],"MalScore":[147,194],"effectively":[149],"differentiates":[150],"quality\u2014for":[152],"example,":[153],"MalNet":[154],"Tiny":[155],"achieves":[156],"highest":[158],"score":[159],"95%,":[161],"while":[162],"NARAD":[164],"malicious-image":[165],"subset":[166],"scores":[167],"50%.":[168],"Additionally,":[169],"BRISQUE":[170],"was":[171],"only":[173],"exhibit":[177],"strong":[179],"linear":[180],"sensitivity":[181],"blur":[183],"levels":[184],"across":[185],"datasets.":[186],"results":[188],"highlight":[189],"practical":[191],"utility":[192],"assessing":[196],"ranking":[198],"lay":[203],"groundwork":[205],"for":[206],"uniting":[207],"research.":[215]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-05T00:00:00"}
