{"id":"https://openalex.org/W2153957938","doi":"https://doi.org/10.1109/saint.2007.12","title":"Development of System for the Automatic Generation of Unknown Virus Extermination Software","display_name":"Development of System for the Automatic Generation of Unknown Virus Extermination Software","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2153957938","doi":"https://doi.org/10.1109/saint.2007.12","mag":"2153957938"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/saint.2007.12","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052675316","display_name":"Ryuiti Koike","orcid":null},"institutions":[{"id":"https://openalex.org/I173009982","display_name":"Iwate University","ror":"https://ror.org/04cd75h10","country_code":"JP","type":"education","lineage":["https://openalex.org/I173009982"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryuiti Koike","raw_affiliation_strings":["Faculty of Engineering, Iwate University, Morioka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Iwate University, Morioka, Japan","institution_ids":["https://openalex.org/I173009982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008245344","display_name":"Naoshi Nakaya","orcid":null},"institutions":[{"id":"https://openalex.org/I173009982","display_name":"Iwate University","ror":"https://ror.org/04cd75h10","country_code":"JP","type":"education","lineage":["https://openalex.org/I173009982"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Naoshi Nakaya","raw_affiliation_strings":["Faculty of Engineering, Iwate University, Morioka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Iwate University, Morioka, Japan","institution_ids":["https://openalex.org/I173009982"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068263807","display_name":"Yuji Koi","orcid":null},"institutions":[{"id":"https://openalex.org/I173009982","display_name":"Iwate University","ror":"https://ror.org/04cd75h10","country_code":"JP","type":"education","lineage":["https://openalex.org/I173009982"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuji Koi","raw_affiliation_strings":["Faculty of Engineering, Iwate University, Morioka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Iwate University, Morioka, Japan","institution_ids":["https://openalex.org/I173009982"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.541,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.552068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":78},"biblio":{"volume":null,"issue":null,"first_page":"8","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.97,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11135","display_name":"Virology and Viral Diseases","score":0.9655,"subfield":{"id":"https://openalex.org/subfields/2713","display_name":"Epidemiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.7858499},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.6769695},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.5533196},{"id":"https://openalex.org/keywords/anti-virus","display_name":"Anti virus","score":0.5130402},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.42802608}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79222226},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.7858499},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.6769695},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.61626196},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.59385335},{"id":"https://openalex.org/C2522874641","wikidata":"https://www.wikidata.org/wiki/Q808","display_name":"Virus","level":2,"score":0.56973386},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.5533196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.53406626},{"id":"https://openalex.org/C2983655198","wikidata":"https://www.wikidata.org/wiki/Q93249","display_name":"Anti virus","level":2,"score":0.5130402},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4590432},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4423918},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.42802608},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.214295},{"id":"https://openalex.org/C159047783","wikidata":"https://www.wikidata.org/wiki/Q7215","display_name":"Virology","level":1,"score":0.2091201},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12598091},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/saint.2007.12","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":4,"referenced_works":["https://openalex.org/W1482228399","https://openalex.org/W1544837488","https://openalex.org/W2305503650","https://openalex.org/W3136767761"],"related_works":["https://openalex.org/W4376852260","https://openalex.org/W3200236636","https://openalex.org/W3170525725","https://openalex.org/W2497191050","https://openalex.org/W2393889683","https://openalex.org/W2308319325","https://openalex.org/W2166844173","https://openalex.org/W2153957938","https://openalex.org/W2150675148","https://openalex.org/W1994712384"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"there":[3],"has":[4,18,53],"been":[5],"a":[6,15,30,40,82,114,119,123,128,163],"frequent":[7],"occurrence":[8],"of":[9,23,56,144],"virus-related":[10],"incidents,":[11],"including":[12],"cases":[13],"where":[14],"virus":[16,41,49,87,135,158,171],"infection":[17],"caused":[19],"the":[20,35,48,51,65,134,142,170,173],"unauthorized":[21],"release":[22],"confidential":[24],"information.":[25],"Viruses":[26],"should":[27],"be":[28,160],"considered":[29],"society-level":[31],"security":[32],"risk.":[33],"However,":[34],"mainstream":[36],"approach":[37],"to":[38,44,61,84,100,125,140,151],"addressing":[39],"is":[42,98],"basically":[43],"implement":[45],"countermeasures":[46,58],"for":[47,169],"after":[50],"damage":[52],"occurred.":[54],"Some":[55],"these":[57],"are":[59,71],"unable":[60],"keep":[62],"up":[63],"with":[64,172],"current":[66],"pace":[67],"at":[68],"which":[69],"viruses":[70],"occurring.":[72],"To":[73],"address":[74],"this":[75,78,145],"problem,":[76],"in":[77,133],"research,":[79],"we":[80,148],"developed":[81,96,174],"system":[83,97,146,175],"generate":[85,102,127],"unknown":[86,109],"extermination":[88],"software":[89,103],"automatically,":[90],"without":[91],"any":[92],"manual":[93],"operations.":[94],"The":[95],"designed":[99],"automatically":[101,126,167],"that":[104,117,165],"detects":[105],"and":[106,122],"exterminates":[107],"an":[108,156],"virus,":[110],"by":[111,162],"using":[112],"both":[113],"dynamic":[115],"heuristic":[116],"uses":[118],"virtual":[120],"PC":[121],"technique":[124],"signature":[129],"from":[130],"header":[131],"data":[132],"executable.":[136],"We":[137],"were":[138],"able":[139],"verify":[141],"effectiveness":[143],"when":[147],"conducted":[149],"experiments":[150],"check":[152],"whether":[153],"or":[154],"not":[155],"actual":[157],"could":[159],"exterminated":[161],"vaccine":[164],"was":[166],"created":[168]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2153957938","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2024-12-12T03:12:33.824542","created_date":"2016-06-24"}