{"id":"https://openalex.org/W4213208778","doi":"https://doi.org/10.1109/tencon54134.2021.9707353","title":"Portable Executable Malware Classifier Using Long Short Term Memory and Sophos-ReversingLabs 20 Million Dataset","display_name":"Portable Executable Malware Classifier Using Long Short Term Memory and Sophos-ReversingLabs 20 Million Dataset","publication_year":2021,"publication_date":"2021-12-07","ids":{"openalex":"https://openalex.org/W4213208778","doi":"https://doi.org/10.1109/tencon54134.2021.9707353"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon54134.2021.9707353","pdf_url":null,"source":{"id":"https://openalex.org/S4363608113","display_name":"TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091176609","display_name":"Julianne Alyson I. Diaz","orcid":null},"institutions":[{"id":"https://openalex.org/I5996616","display_name":"De La Salle University","ror":"https://ror.org/04xftk194","country_code":"PH","type":"education","lineage":["https://openalex.org/I5996616"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Julianne Alyson Diaz","raw_affiliation_strings":["Electronics and Communications Engineering Department, De La Salle University, Manila, Philippines"],"affiliations":[{"raw_affiliation_string":"Electronics and Communications Engineering Department, De La Salle University, Manila, Philippines","institution_ids":["https://openalex.org/I5996616"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084335648","display_name":"Argel A. Bandala","orcid":"https://orcid.org/0000-0002-3568-4858"},"institutions":[{"id":"https://openalex.org/I5996616","display_name":"De La Salle University","ror":"https://ror.org/04xftk194","country_code":"PH","type":"education","lineage":["https://openalex.org/I5996616"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Argel Bandala","raw_affiliation_strings":["Electronics and Communications Engineering Department, De La Salle University, Manila, Philippines"],"affiliations":[{"raw_affiliation_string":"Electronics and Communications Engineering Department, De La Salle University, Manila, Philippines","institution_ids":["https://openalex.org/I5996616"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.42,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.528875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":72,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"881","last_page":"884"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9868,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.815001},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.50521284}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9193815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216446},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.815001},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.6848999},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5483648},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.50521284},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.44155872},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.41127527},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36796334},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3654518},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.0},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon54134.2021.9707353","pdf_url":null,"source":{"id":"https://openalex.org/S4363608113","display_name":"TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W2583918649","https://openalex.org/W2989565817","https://openalex.org/W3011989326","https://openalex.org/W3036803174","https://openalex.org/W3097711322","https://openalex.org/W3105750503","https://openalex.org/W3111237076","https://openalex.org/W3134428496"],"related_works":["https://openalex.org/W4299534542","https://openalex.org/W4240624848","https://openalex.org/W4239401009","https://openalex.org/W2350278424","https://openalex.org/W2184867197","https://openalex.org/W2160606508","https://openalex.org/W2097492617","https://openalex.org/W2071432835","https://openalex.org/W1995118279","https://openalex.org/W1628824497"],"abstract_inverted_index":{"This":[0],"research":[1],"paper":[2],"proposes":[3],"the":[4,27,107,114,122,126,144],"Utilization":[5],"of":[6,109,117,119,129],"Long":[7],"Short":[8],"Term":[9],"Memory(LSTM)":[10],"paired":[11],"with":[12,26],"LightGBM":[13,135],"in":[14,48,52,76,103],"Portable":[15],"Executable":[16],"(PE)":[17],"Malware":[18],"Classification,":[19],"which":[20],"will":[21,136],"be":[22,133,137],"trained":[23],"and":[24,40,54,72],"tested":[25],"Sophos-ReversingLabs":[28],"20":[29],"Million":[30],"Dataset":[31],"(SoReL-20M).":[32],"PE":[33,59,77],"files":[34,45],"are":[35],"regular":[36],"executable,":[37],"object":[38],"codes,":[39],"Dynamic":[41],"Link":[42],"Libraries":[43],"(DLLs)":[44],"used":[46,138],"commonly":[47],"Windows":[49],"operating":[50],"systems":[51],"32-bit":[53],"64-bit":[55],"versions.":[56],"Problems,":[57],"when":[58],"malware":[60,78,104],"is":[61,64,90],"not":[62,91],"detected,":[63],"its":[65,141],"ability":[66],"to":[67,94,125,132,139],"install":[68],"rootkits,":[69],"worms,":[70],"trojans":[71],"etc.":[73],"Current":[74],"development":[75],"detection":[79,105],"suggests":[80],"signature-based":[81],"detection.":[82],"Although":[83],"most":[84],"studies":[85,102],"produce":[86],"high":[87],"accuracy,":[88],"it":[89],"always":[92],"applicable":[93],"all":[95],"scenarios,":[96],"especially":[97],"on":[98,143],"zero-day":[99],"attacks.":[100],"Other":[101],"suggest":[106],"use":[108],"a":[110],"non-signature-based":[111],"approach,":[112],"hence":[113],"proposed":[115],"method":[116],"utilization":[118],"LSTM":[120],"for":[121],"research.":[123],"Due":[124],"large":[127],"number":[128],"SoReL-20M":[130],"dataset":[131],"processed,":[134],"reduce":[140],"impact":[142],"resources.":[145]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4213208778","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-01-05T02:20:27.846652","created_date":"2022-02-24"}