{"id":"https://openalex.org/W2807437252","doi":"https://doi.org/10.1109/icdis.2018.00025","title":"Windows Virtualization Architecture For Cyber Threats Detection","display_name":"Windows Virtualization Architecture For Cyber Threats Detection","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2807437252","doi":"https://doi.org/10.1109/icdis.2018.00025","mag":"2807437252"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdis.2018.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018871446","display_name":"Himanshu Upadhyay","orcid":"https://orcid.org/0000-0002-2958-0526"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Himanshu Upadhyay","raw_affiliation_strings":["Florida International University, Miami, FL, United States"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, United States","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075649249","display_name":"Hardik Gohel","orcid":"https://orcid.org/0000-0002-1671-6543"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hardik A. Gohel","raw_affiliation_strings":["Florida International University, Miami, FL, United States"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, United States","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026649133","display_name":"Alexander Pons","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alexander Pons","raw_affiliation_strings":["Florida International University, Miami, FL, United States"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, United States","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074396135","display_name":"Leonel Lagos","orcid":"https://orcid.org/0000-0002-4090-1562"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Leonel Lagos","raw_affiliation_strings":["Florida International University, Miami, FL, United States"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, United States","institution_ids":["https://openalex.org/I19700959"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.642,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.665269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"122"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.95204943},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5114302},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.43667388}],"concepts":[{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.95204943},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.85318923},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8522696},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8132429},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.74401605},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6195639},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5491798},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5475323},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5114302},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49674612},{"id":"https://openalex.org/C508378895","wikidata":"https://www.wikidata.org/wiki/Q1406","display_name":"Microsoft Windows","level":3,"score":0.43898436},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.43667388},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3505256},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1351453},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.11936551}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdis.2018.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1992496112","https://openalex.org/W2011724792","https://openalex.org/W2140678915","https://openalex.org/W2579603034","https://openalex.org/W2584679495","https://openalex.org/W2625625371","https://openalex.org/W2660067476","https://openalex.org/W2737539570","https://openalex.org/W2769648432","https://openalex.org/W4236362309","https://openalex.org/W607505555"],"related_works":["https://openalex.org/W3037286208","https://openalex.org/W2765965862","https://openalex.org/W268472369","https://openalex.org/W2550565492","https://openalex.org/W2548537835","https://openalex.org/W2393767428","https://openalex.org/W2150403335","https://openalex.org/W2065751263","https://openalex.org/W1979469929","https://openalex.org/W1546317334"],"abstract_inverted_index":{"This":[0,59,132,163],"is":[1],"very":[2,35],"true":[3],"for":[4,65,77],"the":[5,18,23,38,78,85,90,113,166,182],"Windows":[6,79,87],"operating":[7,24],"system":[8,25,64,126],"(OS)":[9],"used":[10,92],"by":[11,161,176],"government":[12],"and":[13,37,67,70,74,95,124,142],"private":[14],"organizations.":[15],"With":[16],"Windows,":[17],"closed":[19],"source":[20],"nature":[21],"of":[22,52,56,72,112,152,181,187],"has":[26,134],"unfortunately":[27],"meant":[28],"that":[29,172],"hidden":[30],"security":[31],"issues":[32],"are":[33,40,173],"discovered":[34],"late":[36],"fixes":[39],"not":[41],"found":[42],"in":[43],"real":[44],"time.":[45],"There":[46],"needs":[47],"to":[48,83,118,146],"be":[49,108],"a":[50,188],"reexamination":[51],"current":[53],"static":[54],"methods":[55],"malware":[57,75],"detection.":[58],"paper":[60],"presents":[61],"an":[62],"integrated":[63],"automated":[66],"real-time":[68],"monitoring":[69],"prediction":[71,144,189],"rootkit":[73],"threats":[76],"OS.":[80],"We":[81],"propose":[82],"host":[84],"target":[86],"machines":[88],"on":[89,155],"widely":[91],"Xen":[93],"hypervisor,":[94],"collect":[96],"process":[97,122],"behavior":[98,123],"using":[99,110,191],"virtual":[100],"memory":[101,139,157],"introspection":[102],"(VMI).":[103],"The":[104,149,178],"collected":[105],"data":[106,140,158,168],"will":[107,184],"analyzed":[109],"state":[111],"art":[114],"machine":[115,192],"learning":[116,193],"techniques":[117],"quickly":[119],"isolate":[120],"malicious":[121],"alert":[125],"administrators":[127],"about":[128],"potential":[129],"cyber":[130],"breaches.":[131],"research":[133,153,183],"two":[135],"focus":[136],"areas:":[137],"identifying":[138,156],"structures":[141,159,169],"developing":[143],"tools":[145],"detect":[147],"malware.":[148,162],"first":[150],"part":[151,180],"focuses":[154],"affected":[160],"includes":[164],"extracting":[165],"kernel":[167],"with":[170],"VMI":[171],"frequently":[174],"targeted":[175],"rootkits/malware.":[177],"second":[179],"involve":[185],"development":[186],"tool":[190],"techniques.":[194]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2807437252","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-01-17T00:25:33.791826","created_date":"2018-06-13"}