{"id":"https://openalex.org/W3100013573","doi":"https://doi.org/10.1109/wimob50308.2020.9253386","title":"An Intelligent Malware Detection and Classification System Using Apps-to-Images Transformations and Convolutional Neural Networks","display_name":"An Intelligent Malware Detection and Classification System Using Apps-to-Images Transformations and Convolutional Neural Networks","publication_year":2020,"publication_date":"2020-10-12","ids":{"openalex":"https://openalex.org/W3100013573","doi":"https://doi.org/10.1109/wimob50308.2020.9253386","mag":"3100013573"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob50308.2020.9253386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086784630","display_name":"Farid Na\u00eft\u2010Abdesselam","orcid":"https://orcid.org/0000-0002-5042-5387"},"institutions":[{"id":"https://openalex.org/I204730241","display_name":"Universit\u00e9 Paris Cit\u00e9","ror":"https://ror.org/05f82e368","country_code":"FR","type":"education","lineage":["https://openalex.org/I204730241"]},{"id":"https://openalex.org/I75421653","display_name":"University of Missouri\u2013Kansas City","ror":"https://ror.org/01w0d5g70","country_code":"US","type":"education","lineage":["https://openalex.org/I75421653"]}],"countries":["FR","US"],"is_corresponding":false,"raw_author_name":"Farid Nait-Abdesselam","raw_affiliation_strings":["University of Missouri Kansas City, USA","University of Paris, France"],"affiliations":[{"raw_affiliation_string":"University of Paris, France","institution_ids":["https://openalex.org/I204730241"]},{"raw_affiliation_string":"University of Missouri Kansas City, USA","institution_ids":["https://openalex.org/I75421653"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035813597","display_name":"Asim Darwaish","orcid":null},"institutions":[{"id":"https://openalex.org/I204730241","display_name":"Universit\u00e9 Paris Cit\u00e9","ror":"https://ror.org/05f82e368","country_code":"FR","type":"education","lineage":["https://openalex.org/I204730241"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Asim Darwaish","raw_affiliation_strings":["University of Paris, France"],"affiliations":[{"raw_affiliation_string":"University of Paris, France","institution_ids":["https://openalex.org/I204730241"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012440258","display_name":"Chafiq Titouna","orcid":null},"institutions":[{"id":"https://openalex.org/I204730241","display_name":"Universit\u00e9 Paris Cit\u00e9","ror":"https://ror.org/05f82e368","country_code":"FR","type":"education","lineage":["https://openalex.org/I204730241"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Chafiq Titouna","raw_affiliation_strings":["University of Paris, France"],"affiliations":[{"raw_affiliation_string":"University of Paris, France","institution_ids":["https://openalex.org/I204730241"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.918,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.628995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9833,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5267125},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.43960568},{"id":"https://openalex.org/keywords/rgb-color-model","display_name":"RGB color model","score":0.42234036},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.42157695}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9146358},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83514285},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.67794746},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6382984},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5697346},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5267125},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5130016},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.51208997},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.43960568},{"id":"https://openalex.org/C82990744","wikidata":"https://www.wikidata.org/wiki/Q166194","display_name":"RGB color model","level":2,"score":0.42234036},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.42157695},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.41212183},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34931898},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19806173},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13914964}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob50308.2020.9253386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1533861849","https://openalex.org/W2060692877","https://openalex.org/W2122672392","https://openalex.org/W2141198770","https://openalex.org/W2313513770","https://openalex.org/W2432142698","https://openalex.org/W2586845402","https://openalex.org/W2599823825","https://openalex.org/W2749928722","https://openalex.org/W2768773469","https://openalex.org/W2789983203","https://openalex.org/W2791541601","https://openalex.org/W2792310543","https://openalex.org/W2849849680","https://openalex.org/W2899639977","https://openalex.org/W2963401022","https://openalex.org/W2981360604","https://openalex.org/W2990954041","https://openalex.org/W3001765853","https://openalex.org/W4288089473","https://openalex.org/W6736853"],"related_works":["https://openalex.org/W4249118297","https://openalex.org/W4200054778","https://openalex.org/W3195586271","https://openalex.org/W2968504645","https://openalex.org/W2810666735","https://openalex.org/W2717179875","https://openalex.org/W2609233367","https://openalex.org/W2395100307","https://openalex.org/W2233081671","https://openalex.org/W2067547021"],"abstract_inverted_index":{"With":[0],"the":[1,24,36,45,61,66,127,159,163,176],"proliferation":[2],"of":[3,26,40,47,68,135,165],"Mobile":[4],"Internet,":[5],"handheld":[6],"devices":[7],"are":[8],"facing":[9],"continuous":[10],"threats":[11],"from":[12],"apps":[13,189],"that":[14,180],"contain":[15],"malicious":[16,19],"intents.":[17],"These":[18],"apps,":[20,123],"or":[21,86],"malware,":[22],"have":[23],"capability":[25],"dynamically":[27],"changing":[28],"their":[29,41,76,98],"intended":[30],"code":[31],"as":[32],"they":[33],"spread.":[34],"Moreover,":[35],"diversity":[37],"and":[38,55,78,93,115,148,151,168,186,197],"volume":[39],"variants":[42,67],"severely":[43],"undermine":[44],"effectiveness":[46],"traditional":[48],"defenses,":[49],"which":[50],"typically":[51],"use":[52],"signature-based":[53],"techniques,":[54],"make":[56],"them":[57],"unable":[58],"to":[59,91],"detect":[60,92],"previously":[62],"unknown":[63,95],"malware.":[64,118],"However,":[65],"malware":[69,96,169,188],"families":[70,100],"share":[71],"typical":[72],"behavioral":[73,81],"patterns":[74],"reflecting":[75],"origin":[77],"purpose.":[79],"The":[80,172],"patterns,":[82],"obtained":[83,160,174],"either":[84],"statically":[85],"dynamically,":[87],"can":[88],"be":[89],"exploited":[90],"classify":[94],"into":[97,139],"known":[99],"using":[101,144,175],"machine":[102],"learning":[103],"techniques.":[104],"In":[105],"this":[106],"paper,":[107],"we":[108],"propose":[109],"a":[110,117,133,140,145,154],"new":[111,187],"approach":[112,125],"for":[113,162],"detecting":[114],"analyzing":[116],"Mainly":[119],"focused":[120],"on":[121,158],"android":[122],"our":[124,181],"adopts":[126],"two":[128],"following":[129],"steps:":[130],"(1)":[131],"performs":[132],"transformation":[134],"an":[136],"APK":[137],"file":[138],"lightweight":[141],"RGB":[142],"image":[143],"predefined":[146],"dictionary":[147],"intelligent":[149],"mapping,":[150],"(2)":[152],"trains":[153],"convolutional":[155],"neural":[156],"network":[157],"images":[161],"purpose":[164],"signature":[166],"detection":[167],"family":[170],"classification.":[171],"results":[173],"Androzoo":[177],"dataset":[178],"show":[179],"system":[182],"classifies":[183],"both":[184],"legacy":[185],"with":[190],"high":[191],"accuracy,":[192],"low":[193,198],"false-negative":[194],"rate":[195,200],"(FNR),":[196],"false-positive":[199],"(FPR).":[201]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3100013573","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3}],"updated_date":"2025-01-02T05:46:09.065450","created_date":"2020-11-23"}