{"id":"https://openalex.org/W3136308918","doi":"https://doi.org/10.3390/info12030118","title":"Malware Detection Based on Code Visualization and Two-Level Classification","display_name":"Malware Detection Based on Code Visualization and Two-Level Classification","publication_year":2021,"publication_date":"2021-03-11","ids":{"openalex":"https://openalex.org/W3136308918","doi":"https://doi.org/10.3390/info12030118","mag":"3136308918"},"language":"en","primary_location":{"id":"doi:10.3390/info12030118","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info12030118","pdf_url":"https://www.mdpi.com/2078-2489/12/3/118/pdf?version=1615447054","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/12/3/118/pdf?version=1615447054","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062286403","display_name":"Vassilios C. Moussas","orcid":"https://orcid.org/0000-0003-3614-0294"},"institutions":[{"id":"https://openalex.org/I4210094138","display_name":"University of West Attica","ror":"https://ror.org/00r2r5k05","country_code":"GR","type":"education","lineage":["https://openalex.org/I4210094138"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vassilios Moussas","raw_affiliation_strings":["School of Engineering, University of West Attica, Aigaleo, Attica 12210, Greece"],"raw_orcid":"https://orcid.org/0000-0003-3614-0294","affiliations":[{"raw_affiliation_string":"School of Engineering, University of West Attica, Aigaleo, Attica 12210, Greece","institution_ids":["https://openalex.org/I4210094138"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050758763","display_name":"Antonios Andreatos","orcid":"https://orcid.org/0000-0002-2271-8764"},"institutions":[{"id":"https://openalex.org/I2802113776","display_name":"Hellenic Air Force","ror":"https://ror.org/044xk2674","country_code":"GR","type":"government","lineage":["https://openalex.org/I2802113776"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Antonios Andreatos","raw_affiliation_strings":["Division of Computer Engineering and Information Science, Hellenic Air Force Academy, Dekeleia, Attica 13671, Greece"],"raw_orcid":"https://orcid.org/0000-0002-2271-8764","affiliations":[{"raw_affiliation_string":"Division of Computer Engineering and Information Science, Hellenic Air Force Academy, Dekeleia, Attica 13671, Greece","institution_ids":["https://openalex.org/I2802113776"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050758763"],"corresponding_institution_ids":["https://openalex.org/I2802113776"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":3.2385,"has_fulltext":true,"cited_by_count":28,"citation_normalized_percentile":{"value":0.92687985,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"12","issue":"3","first_page":"118","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9338284730911255},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8178174495697021},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.6632243394851685},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.623991072177887},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6090264916419983},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5558832883834839},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5499191284179688},{"id":"https://openalex.org/keywords/creative-visualization","display_name":"Creative visualization","score":0.4813964366912842},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4734736979007721},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.45044106245040894},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4180411100387573},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41147157549858093},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40070676803588867},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.36372482776641846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24032771587371826},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1642509400844574},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13122275471687317}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9338284730911255},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8178174495697021},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.6632243394851685},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.623991072177887},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6090264916419983},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5558832883834839},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5499191284179688},{"id":"https://openalex.org/C14669888","wikidata":"https://www.wikidata.org/wiki/Q4014850","display_name":"Creative visualization","level":3,"score":0.4813964366912842},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4734736979007721},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.45044106245040894},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4180411100387573},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41147157549858093},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40070676803588867},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.36372482776641846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24032771587371826},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1642509400844574},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13122275471687317}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/info12030118","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info12030118","pdf_url":"https://www.mdpi.com/2078-2489/12/3/118/pdf?version=1615447054","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:20d74f172581410587d18ccf3df33a42","is_oa":true,"landing_page_url":"https://doaj.org/article/20d74f172581410587d18ccf3df33a42","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 12, Iss 3, p 118 (2021)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2078-2489/12/3/118/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/info12030118","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information; Volume 12; Issue 3; Pages: 118","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/info12030118","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info12030118","pdf_url":"https://www.mdpi.com/2078-2489/12/3/118/pdf?version=1615447054","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320331440","display_name":"University of West Attica","ror":"https://ror.org/00r2r5k05"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3136308918.pdf","grobid_xml":"https://content.openalex.org/works/W3136308918.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1566135517","https://openalex.org/W1999065800","https://openalex.org/W2010065958","https://openalex.org/W2012132268","https://openalex.org/W2425931228","https://openalex.org/W2538108907","https://openalex.org/W2587930273","https://openalex.org/W2751469117","https://openalex.org/W2766576889","https://openalex.org/W2793223501","https://openalex.org/W2796394805","https://openalex.org/W2801888526","https://openalex.org/W2923563913","https://openalex.org/W3006334803","https://openalex.org/W3018447310","https://openalex.org/W6632770336"],"related_works":["https://openalex.org/W2053632570","https://openalex.org/W2148542813","https://openalex.org/W2126734536","https://openalex.org/W1985328160","https://openalex.org/W2236938640","https://openalex.org/W198162143","https://openalex.org/W3139383759","https://openalex.org/W2167003418","https://openalex.org/W2020184885","https://openalex.org/W2541748149"],"abstract_inverted_index":{"Malware":[0,175],"creators":[1],"generate":[2],"new":[3,72,103],"malicious":[4,19],"software":[5],"samples":[6,171],"by":[7,182],"making":[8],"minor":[9],"changes":[10],"in":[11,15,81,194],"previously":[12],"generated":[13],"code,":[14,20],"order":[16],"to":[17,24,83,166,202,206,213],"reuse":[18],"as":[21,23,100],"well":[22],"go":[25],"unnoticed":[26],"from":[27],"signature-based":[28,85],"antivirus":[29,86,214],"software.":[30,87],"As":[31],"a":[32,109,178,183],"result,":[33],"various":[34],"families":[35,77,176],"of":[36,38,46,74,93,96,136,140,172,186],"variations":[37,73,95],"the":[39,91,132,137,157,173],"same":[40],"initial":[41],"code":[42,69],"exist":[43],"today.":[44],"Visualization":[45,58],"compiled":[47],"executables":[48],"for":[49],"malware":[50,62,76,98,104,142],"analysis":[51],"has":[52],"been":[53],"proposed":[54,127,189],"several":[55],"years":[56],"ago.":[57],"can":[59,210],"greatly":[60],"assist":[61],"classification":[63,118],"and":[64,123,168,197,204],"requires":[65],"neither":[66],"disassembly":[67],"nor":[68],"execution.":[70],"Moreover,":[71],"known":[75],"are":[78,151,180],"instantly":[79],"detected,":[80],"contrast":[82],"traditional":[84],"This":[88],"paper":[89],"addresses":[90],"problem":[92],"identifying":[94],"existing":[97],"visualized":[99],"images.":[101],"A":[102],"detection":[105],"system":[106,128],"based":[107,120],"on":[108,121,131,154],"two-level":[110,190],"Artificial":[111],"Neural":[112],"Network":[113],"(ANN)":[114],"is":[115,119,129,159,164,200],"proposed.":[116],"The":[117,126,188],"file":[122],"image":[124,149],"features.":[125],"tested":[130],"\u2018Malimg\u2019":[133],"dataset":[134],"consisting":[135],"visual":[138],"representation":[139],"well-known":[141],"families.":[143],"From":[144],"this":[145,162],"set":[146],"some":[147],"important":[148],"features":[150],"extracted.":[152],"Based":[153],"these":[155],"features,":[156],"ANN":[158,163,191],"trained.":[160],"Then,":[161],"used":[165],"detect":[167],"classify":[169],"other":[170],"dataset.":[174],"creating":[177],"confusion":[179],"classified":[181],"second":[184],"level":[185],"ANNs.":[187],"method":[192],"excels":[193],"simplicity,":[195],"accuracy,":[196],"speed;":[198],"it":[199,209],"easy":[201],"implement":[203],"fast":[205],"run,":[207],"thus":[208],"be":[211],"applied":[212],"software,":[215],"smart":[216],"firewalls,":[217],"web":[218],"applications,":[219],"etc.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-03-29T00:00:00"}
