{"id":"https://openalex.org/W4384036060","doi":"https://doi.org/10.3390/computation11070140","title":"Algebraic Structures Induced by the Insertion and Detection of Malware","display_name":"Algebraic Structures Induced by the Insertion and Detection of Malware","publication_year":2023,"publication_date":"2023-07-11","ids":{"openalex":"https://openalex.org/W4384036060","doi":"https://doi.org/10.3390/computation11070140"},"language":"en","primary_location":{"id":"doi:10.3390/computation11070140","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computation11070140","pdf_url":"https://www.mdpi.com/2079-3197/11/7/140/pdf?version=1689126920","source":{"id":"https://openalex.org/S2738402919","display_name":"Computation","issn_l":"2079-3197","issn":["2079-3197"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computation","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2079-3197/11/7/140/pdf?version=1689126920","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004849802","display_name":"Agust\u00edn Moreno Ca\u00f1adas","orcid":"https://orcid.org/0000-0001-6812-5131"},"institutions":[{"id":"https://openalex.org/I36243813","display_name":"Universidad Nacional de Colombia","ror":"https://ror.org/059yx9a68","country_code":"CO","type":"education","lineage":["https://openalex.org/I36243813"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Agust\u00edn Moreno Ca\u00f1adas","raw_affiliation_strings":["Departamento de Matem\u00e1ticas, Universidad Nacional de Colombia, Edificio Yu Takeuchi 404, Kra 30 No. 45-03, Bogot\u00e1 11001000, Colombia"],"raw_orcid":"https://orcid.org/0000-0001-6812-5131","affiliations":[{"raw_affiliation_string":"Departamento de Matem\u00e1ticas, Universidad Nacional de Colombia, Edificio Yu Takeuchi 404, Kra 30 No. 45-03, Bogot\u00e1 11001000, Colombia","institution_ids":["https://openalex.org/I36243813"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062555275","display_name":"Odette M. Mendez","orcid":"https://orcid.org/0000-0003-3953-2381"},"institutions":[{"id":"https://openalex.org/I36243813","display_name":"Universidad Nacional de Colombia","ror":"https://ror.org/059yx9a68","country_code":"CO","type":"education","lineage":["https://openalex.org/I36243813"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Odette M. Mendez","raw_affiliation_strings":["Departamento de Matem\u00e1ticas, Universidad Nacional de Colombia, La Nubia, Manizales 170003, Colombia"],"raw_orcid":"https://orcid.org/0000-0003-3953-2381","affiliations":[{"raw_affiliation_string":"Departamento de Matem\u00e1ticas, Universidad Nacional de Colombia, La Nubia, Manizales 170003, Colombia","institution_ids":["https://openalex.org/I36243813"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021649485","display_name":"Juan David Camacho Vega","orcid":"https://orcid.org/0000-0003-2475-6227"},"institutions":[{"id":"https://openalex.org/I36243813","display_name":"Universidad Nacional de Colombia","ror":"https://ror.org/059yx9a68","country_code":"CO","type":"education","lineage":["https://openalex.org/I36243813"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Juan David Camacho Vega","raw_affiliation_strings":["Departamento de Matem\u00e1ticas, Universidad Nacional de Colombia, Edificio Yu Takeuchi 404, Kra 30 No. 45-03, Bogot\u00e1 11001000, Colombia"],"raw_orcid":"https://orcid.org/0000-0003-2475-6227","affiliations":[{"raw_affiliation_string":"Departamento de Matem\u00e1ticas, Universidad Nacional de Colombia, Edificio Yu Takeuchi 404, Kra 30 No. 45-03, Bogot\u00e1 11001000, Colombia","institution_ids":["https://openalex.org/I36243813"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004849802"],"corresponding_institution_ids":["https://openalex.org/I36243813"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.7676,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69941195,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"11","issue":"7","first_page":"140","last_page":"140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9482302069664001},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8732820749282837},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7496143579483032},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.533049464225769},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4861442744731903},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.4753287136554718},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4713838994503021},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.451445072889328},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.44453486800193787},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4388046860694885},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43020254373550415},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.4177626967430115},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36308255791664124},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.19365185499191284},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.10706561803817749}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9482302069664001},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8732820749282837},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7496143579483032},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.533049464225769},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4861442744731903},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.4753287136554718},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4713838994503021},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.451445072889328},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.44453486800193787},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4388046860694885},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43020254373550415},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.4177626967430115},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36308255791664124},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.19365185499191284},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.10706561803817749},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/computation11070140","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computation11070140","pdf_url":"https://www.mdpi.com/2079-3197/11/7/140/pdf?version=1689126920","source":{"id":"https://openalex.org/S2738402919","display_name":"Computation","issn_l":"2079-3197","issn":["2079-3197"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computation","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:246dd9bf8ed049a5a42ea5f507337572","is_oa":true,"landing_page_url":"https://doaj.org/article/246dd9bf8ed049a5a42ea5f507337572","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computation, Vol 11, Iss 7, p 140 (2023)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2079-3197/11/7/140/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/computation11070140","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computation; Volume 11; Issue 7; Pages: 140","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/computation11070140","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computation11070140","pdf_url":"https://www.mdpi.com/2079-3197/11/7/140/pdf?version=1689126920","source":{"id":"https://openalex.org/S2738402919","display_name":"Computation","issn_l":"2079-3197","issn":["2079-3197"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computation","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4384036060.pdf"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W1437462824","https://openalex.org/W2007875838","https://openalex.org/W2032493468","https://openalex.org/W2120142396","https://openalex.org/W2143421017","https://openalex.org/W2150423842","https://openalex.org/W2151300580","https://openalex.org/W2163353162","https://openalex.org/W2617675595","https://openalex.org/W2618219509","https://openalex.org/W2762996005","https://openalex.org/W2894746673","https://openalex.org/W2909244980","https://openalex.org/W2912361785","https://openalex.org/W2945014264","https://openalex.org/W2952433728","https://openalex.org/W2962912862","https://openalex.org/W2982645003","https://openalex.org/W2998074434","https://openalex.org/W3006140559","https://openalex.org/W3012568150","https://openalex.org/W3046319829","https://openalex.org/W3153242163","https://openalex.org/W3157276314","https://openalex.org/W3182487622","https://openalex.org/W3198679606","https://openalex.org/W4223561153","https://openalex.org/W4247370828","https://openalex.org/W4285614675","https://openalex.org/W4297477879","https://openalex.org/W4313245578","https://openalex.org/W4372054758","https://openalex.org/W6603836601","https://openalex.org/W6794051943","https://openalex.org/W6801041139","https://openalex.org/W6828825148"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2024170198","https://openalex.org/W4296272594","https://openalex.org/W2900526031","https://openalex.org/W2289039654","https://openalex.org/W2728713145","https://openalex.org/W2470502009","https://openalex.org/W2131332603","https://openalex.org/W2072617132","https://openalex.org/W4360993664"],"abstract_inverted_index":{"Since":[0],"its":[1],"introduction,":[2],"researching":[3],"malware":[4,14,40,55],"has":[5],"had":[6],"two":[7],"main":[8,47],"goals.":[9],"On":[10,36],"the":[11,37,49,72,79,82,137],"one":[12,44],"hand,":[13,39],"writers":[15],"have":[16,42,86,102],"been":[17,87,104],"focused":[18],"on":[19],"developing":[20],"software":[21],"that":[22,123],"can":[23],"cause":[24],"more":[25],"damage":[26],"to":[27,65,71,89,106,113,148],"a":[28,150],"targeted":[29],"host":[30],"for":[31],"as":[32,34,43,54,78,127],"long":[33],"possible.":[35],"other":[38],"analysts":[41],"of":[45,51,81,133,139,143,153],"their":[46,91,131],"purposes":[48],"development":[50],"tools":[52],"such":[53,77],"detection":[56,62],"systems":[57,63],"(MDS)":[58],"or":[59],"network":[60],"intrusion":[61],"(NIDS)":[64],"prevent":[66],"and":[67,98,130],"detect":[68,107],"possible":[69],"threats":[70],"informatic":[73],"systems.":[74],"Obfuscation":[75],"techniques,":[76],"encryption":[80],"virus\u2019s":[83],"code":[84],"lines,":[85],"developed":[88],"avoid":[90],"detection.":[92],"In":[93],"contrast,":[94],"shallow":[95],"machine":[96],"learning":[97,100],"deep":[99],"algorithms":[101],"recently":[103],"introduced":[105],"them.":[108],"This":[109],"paper":[110],"is":[111],"devoted":[112],"some":[114,140],"theoretical":[115],"implications":[116],"derived":[117],"from":[118],"these":[119,144],"investigations.":[120],"We":[121],"prove":[122],"hidden":[124],"algebraic":[125],"structures":[126],"equipped":[128],"posets":[129],"categories":[132,145],"representations":[134],"are":[135,146],"behind":[136],"research":[138],"infections.":[141],"Properties":[142],"given":[147],"provide":[149],"better":[151],"understanding":[152],"different":[154],"infection":[155],"techniques.":[156]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2023-07-13T00:00:00"}
