{"id":"https://openalex.org/W1966145327","doi":"https://doi.org/10.4018/ijwnbt.2012070105","title":"Evolutionary Malware","display_name":"Evolutionary Malware","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W1966145327","doi":"https://doi.org/10.4018/ijwnbt.2012070105","mag":"1966145327"},"language":"en","primary_location":{"id":"doi:10.4018/ijwnbt.2012070105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijwnbt.2012070105","pdf_url":null,"source":{"id":"https://openalex.org/S4210205280","display_name":"International Journal of Wireless Networks and Broadband Technologies","issn_l":"2155-6261","issn":["2155-6261","2155-627X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless Networks and Broadband Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079554140","display_name":"Michael Brian Pope","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael Brian Pope","raw_affiliation_strings":["Department of Management and Information Systems, College of Business, Mississippi State University, Mississippi State, MS, USA","Department of Management and Information Systems, College of Business, Mississippi State University, Mississippi State, MS, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Management and Information Systems, College of Business, Mississippi State University, Mississippi State, MS, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Department of Management and Information Systems, College of Business, Mississippi State University, Mississippi State, MS, USA#TAB#","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081801667","display_name":"Merrill Warkentin","orcid":"https://orcid.org/0000-0001-7435-7676"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Merrill Warkentin","raw_affiliation_strings":["Department of Management and Information Systems, College of Business, Mississippi State University, USA","Department of Management and Information Systems, College of Business, Mississippi State University, Mississippi State, MS, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Management and Information Systems, College of Business, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Department of Management and Information Systems, College of Business, Mississippi State University, Mississippi State, MS, USA#TAB#","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046378799","display_name":"Xin Luo","orcid":"https://orcid.org/0000-0003-0122-7293"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xin (Robert) Luo","raw_affiliation_strings":["Anderson School of Management, University of New Mexico, Albuquerque, NM, USA","Anderson School of Management, University of New Mexico, Albuquerque, NM- USA"],"affiliations":[{"raw_affiliation_string":"Anderson School of Management, University of New Mexico, Albuquerque, NM, USA","institution_ids":["https://openalex.org/I169521973"]},{"raw_affiliation_string":"Anderson School of Management, University of New Mexico, Albuquerque, NM- USA","institution_ids":["https://openalex.org/I169521973"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079554140"],"corresponding_institution_ids":["https://openalex.org/I99041443"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.04924145,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":"3","first_page":"52","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9419999718666077,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9674594402313232},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9507172107696533},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.7367018461227417},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6868438720703125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6730521321296692},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.4398413300514221},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43651366233825684},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43142908811569214},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38651829957962036},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08649078011512756},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.06116577982902527}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9674594402313232},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9507172107696533},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.7367018461227417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6868438720703125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6730521321296692},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.4398413300514221},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43651366233825684},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43142908811569214},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38651829957962036},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08649078011512756},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.06116577982902527},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijwnbt.2012070105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijwnbt.2012070105","pdf_url":null,"source":{"id":"https://openalex.org/S4210205280","display_name":"International Journal of Wireless Networks and Broadband Technologies","issn_l":"2155-6261","issn":["2155-6261","2155-627X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless Networks and Broadband Technologies","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jwnbt0:v:2:y:2012:i:3:p:52-60","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2012070105","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1598400617","https://openalex.org/W1996716108","https://openalex.org/W1999989039","https://openalex.org/W2033797329","https://openalex.org/W2034102017","https://openalex.org/W2099194862","https://openalex.org/W2110957764","https://openalex.org/W2111038628","https://openalex.org/W2150020069","https://openalex.org/W2229783338"],"related_works":["https://openalex.org/W1966145327","https://openalex.org/W4200054778","https://openalex.org/W2233081671","https://openalex.org/W2395100307","https://openalex.org/W4249118297","https://openalex.org/W2609233367","https://openalex.org/W3195586271","https://openalex.org/W2968504645","https://openalex.org/W2717179875","https://openalex.org/W2810666735"],"abstract_inverted_index":{"Much":[0],"as":[1,87,89],"information":[2],"systems":[3,27],"themselves":[4],"evolve":[5],"and":[6,23],"incorporate":[7],"innovation,":[8],"so":[9],"too":[10],"has":[11],"malicious":[12,90],"software,":[13],"or":[14,77],"\u201cmalware.\u201d":[15],"The":[16],"increasing":[17],"threat":[18],"to":[19,30,95],"those":[20],"who":[21],"use":[22,72],"trust":[24],"in":[25,37,101],"these":[26],"is":[28],"dangerous":[29,43],"overlook.":[31],"This":[32],"article":[33],"examines":[34],"recent":[35,53,66],"trends":[36],"malware":[38,47,67,74],"development.":[39],"Reviewing":[40],"statistics":[41],"of":[42,45,55,65,73,84],"infections":[44],"various":[46],"families,":[48],"it":[49],"also":[50,99],"expands":[51,61],"on":[52,62],"developments":[54],"actual":[56],"exploit":[57],"code.":[58],"It":[59],"further":[60],"the":[63,71],"evolution":[64],"development":[68,75],"techniques,":[69],"particularly":[70],"kits,":[76],"\u201cexploit":[78],"kits.\u201d":[79],"Mobile":[80],"exploits":[81],"taking":[82],"advantage":[83],"smart":[85],"phones,":[86],"well":[88],"\u201cpolymorphic\u201d":[91],"code":[92],"that":[93],"self-mutates":[94],"evade":[96],"detection":[97],"are":[98],"discussed":[100],"detail.":[102]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
