{"id":"https://openalex.org/W4389195780","doi":"https://doi.org/10.1007/978-3-031-49187-0_4","title":"SIFAST: An Efficient Unix Shell Embedding Framework for\u00a0Malicious Detection","display_name":"SIFAST: An Efficient Unix Shell Embedding Framework for\u00a0Malicious Detection","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4389195780","doi":"https://doi.org/10.1007/978-3-031-49187-0_4"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-49187-0_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-49187-0_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070822766","display_name":"Songyue Chen","orcid":"https://orcid.org/0009-0009-1969-1167"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songyue Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of CyberSecurity, University of Chinese Academy of China, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0009-1969-1167","affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of China, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101761591","display_name":"Rong Yang","orcid":"https://orcid.org/0000-0001-5620-7615"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rong Yang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of CyberSecurity, University of Chinese Academy of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of China, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100778898","display_name":"Hong Zhang","orcid":"https://orcid.org/0000-0002-3273-5779"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhang","raw_affiliation_strings":["National Computer network Emergency Response technical Team/Coordination Center of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Computer network Emergency Response technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006018670","display_name":"Hongwei Wu","orcid":"https://orcid.org/0000-0002-2816-749X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Wu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of CyberSecurity, University of Chinese Academy of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of China, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040688748","display_name":"Yanqin Zheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yanqin Zheng","raw_affiliation_strings":["Chinatelecom Cloud, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Chinatelecom Cloud, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023599556","display_name":"Xingyu Fu","orcid":"https://orcid.org/0000-0002-2543-3975"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingyu Fu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of CyberSecurity, University of Chinese Academy of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of China, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100713362","display_name":"Qingyun Liu","orcid":"https://orcid.org/0000-0003-4815-3463"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyun Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of CyberSecurity, University of Chinese Academy of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of China, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101761591"],"corresponding_institution_ids":["https://openalex.org/I4210156404"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.7194,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.94205052,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"78"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unix","display_name":"Unix","score":0.8851455450057983},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.856023907661438},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.8297334313392639},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5879872441291809},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5111668705940247},{"id":"https://openalex.org/keywords/shell","display_name":"Shell (structure)","score":0.4717743396759033},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.44914841651916504},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.37137818336486816},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2972027659416199},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.0876818597316742}],"concepts":[{"id":"https://openalex.org/C112968700","wikidata":"https://www.wikidata.org/wiki/Q11368","display_name":"Unix","level":3,"score":0.8851455450057983},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.856023907661438},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.8297334313392639},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5879872441291809},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5111668705940247},{"id":"https://openalex.org/C2781052500","wikidata":"https://www.wikidata.org/wiki/Q2230313","display_name":"Shell (structure)","level":2,"score":0.4717743396759033},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.44914841651916504},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.37137818336486816},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2972027659416199},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0876818597316742},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-49187-0_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-49187-0_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1485912969","https://openalex.org/W2493916176","https://openalex.org/W2797678261","https://openalex.org/W2885245002","https://openalex.org/W2900587877","https://openalex.org/W2968580482","https://openalex.org/W3008088841","https://openalex.org/W3008500749","https://openalex.org/W3088057074","https://openalex.org/W3091934055","https://openalex.org/W3106196258","https://openalex.org/W3118316519","https://openalex.org/W3148862282","https://openalex.org/W3156387737","https://openalex.org/W3156636935","https://openalex.org/W3163821226","https://openalex.org/W3190769725","https://openalex.org/W3205859170","https://openalex.org/W4211235181","https://openalex.org/W4225796304","https://openalex.org/W4281399909","https://openalex.org/W4283650315","https://openalex.org/W4287848938","https://openalex.org/W4301075642","https://openalex.org/W4308086462","https://openalex.org/W4313121063","https://openalex.org/W4376122956"],"related_works":["https://openalex.org/W2033889310","https://openalex.org/W644889988","https://openalex.org/W2086577855","https://openalex.org/W2119018183","https://openalex.org/W1575418055","https://openalex.org/W2105855614","https://openalex.org/W2496732697","https://openalex.org/W189459719","https://openalex.org/W98055531","https://openalex.org/W3169128101"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-02-06T02:01:19.302388","created_date":"2025-10-10T00:00:00"}
