{"id":"https://openalex.org/W2293267147","doi":"https://doi.org/10.5220/0005535202280235","title":"MEDA: A Machine Emulation Detection Algorithm","display_name":"MEDA: A Machine Emulation Detection Algorithm","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2293267147","doi":"https://doi.org/10.5220/0005535202280235","mag":"2293267147"},"language":"en","primary_location":{"id":"doi:10.5220/0005535202280235","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005535202280235","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005535202280235","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051801356","display_name":"Valerio Selis","orcid":"https://orcid.org/0000-0002-1856-4707"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Valerio Selis","raw_affiliation_strings":["University of Liverpool, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Liverpool, United Kingdom","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081759293","display_name":"Alan Marshall","orcid":"https://orcid.org/0000-0002-8058-5242"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alan Marshall","raw_affiliation_strings":["University of Liverpool, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Liverpool, United Kingdom","institution_ids":["https://openalex.org/I146655781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051801356"],"corresponding_institution_ids":["https://openalex.org/I146655781"],"apc_list":null,"apc_paid":null,"fwci":0.8616,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75746269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"228","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.8872373104095459},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8248852491378784},{"id":"https://openalex.org/keywords/machine-to-machine","display_name":"Machine to machine","score":0.7295718789100647},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6090771555900574},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5628638863563538},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4988217353820801},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4946725070476532},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45885565876960754},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42545416951179504},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4101269841194153},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3789251446723938},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.211317777633667}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.8872373104095459},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8248852491378784},{"id":"https://openalex.org/C76763059","wikidata":"https://www.wikidata.org/wiki/Q251072","display_name":"Machine to machine","level":3,"score":0.7295718789100647},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6090771555900574},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5628638863563538},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4988217353820801},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4946725070476532},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45885565876960754},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42545416951179504},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4101269841194153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3789251446723938},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.211317777633667},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005535202280235","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005535202280235","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005535202280235","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005535202280235","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W78162143","https://openalex.org/W1522250664","https://openalex.org/W1714781699","https://openalex.org/W1905177991","https://openalex.org/W1992181084","https://openalex.org/W2003167758","https://openalex.org/W2015790908","https://openalex.org/W2036951277","https://openalex.org/W2073618626","https://openalex.org/W2089629852","https://openalex.org/W2090534521","https://openalex.org/W2104599106","https://openalex.org/W2105103777","https://openalex.org/W2117806953","https://openalex.org/W2121153597","https://openalex.org/W2123649966","https://openalex.org/W2193838104"],"related_works":["https://openalex.org/W2154523322","https://openalex.org/W2083200807","https://openalex.org/W1603137082","https://openalex.org/W2364195017","https://openalex.org/W2355430452","https://openalex.org/W2049983405","https://openalex.org/W2392315374","https://openalex.org/W1951195060","https://openalex.org/W2351776620","https://openalex.org/W3212933010"],"abstract_inverted_index":{"Security":[0],"in":[1,14,35,52,93],"the":[2,62,78,115,118,121],"Internet":[3],"of":[4,77,80,87,103,120],"Things":[5],"(IoT)":[6],"is":[7,18,69,72],"now":[8],"considered":[9],"a":[10,22,28,57,75],"priority,":[11],"and":[12,84,90,98,109,114,129],"trust":[13,67],"machine-to-machine":[15],"(M2M)":[16],"communications":[17],"expected":[19],"to":[20,30,54,95,106],"play":[21],"key":[23],"role.":[24],"This":[25],"paper":[26],"presents":[27],"mechanism":[29],"detect":[31,96],"an":[32,39],"emerging":[33],"threat":[34],"M2M":[36,63],"systems":[37,127],"whereby":[38],"attacker":[40],"may":[41],"create":[42],"multiple":[43],"fake":[44],"embedded":[45,82,108],"machines":[46],"using":[47],"virtualized":[48],"or":[49,61],"emulated":[50,99],"systems,":[51,92],"order":[53,94],"compromise":[55],"either":[56],"targeted":[58],"IoT":[59],"device,":[60],"network.":[64],"A":[65,101],"new":[66],"method":[68],"presented":[70],"that":[71],"based":[73],"on":[74],"characterisation":[76],"behaviours":[79],"real":[81],"machines,":[83],"operates":[85],"independently":[86],"their":[88],"architectures":[89],"operating":[91],"virtual":[97,110],"systems.":[100],"range":[102],"tests":[104],"designed":[105],"characterise":[107],"devices":[111],"are":[112],"presented,":[113],"results":[116],"underline":[117],"efficiency":[119],"proposed":[122],"solution":[123],"for":[124],"detecting":[125],"these":[126],"easily":[128],"quickly.":[130]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
