{"id":"https://openalex.org/W2745825492","doi":"https://doi.org/10.1007/978-3-319-65636-6_49","title":"Mining Unknown Network Protocol\u2019s Stealth Attack Behavior","display_name":"Mining Unknown Network Protocol\u2019s Stealth Attack Behavior","publication_year":2017,"publication_date":"2017-08-16","ids":{"openalex":"https://openalex.org/W2745825492","doi":"https://doi.org/10.1007/978-3-319-65636-6_49","mag":"2745825492"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-65636-6_49","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-65636-6_49","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055007481","display_name":"Yan-Jing Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan-Jing Hu","raw_affiliation_strings":["Key Laboratory of Cryptology and Information Security, Chinese PLA, Engineering University of the Armed Police Force, Xi\u2019an, 710086, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, 710071, China","Key Laboratory of Cryptology and Information Security, Chinese PLA, Engineering University of the Armed Police Force, Xi\u2019an, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Chinese PLA, Engineering University of the Armed Police Force, Xi\u2019an, 710086, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Chinese PLA, Engineering University of the Armed Police Force, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055007481"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210134428"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13718593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"545","last_page":"553"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.767764151096344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6827280521392822},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6790801882743835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.449675589799881},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4266106188297272},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.42623764276504517},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.4118945002555847},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22383123636245728},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.053099215030670166}],"concepts":[{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.767764151096344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6827280521392822},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6790801882743835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.449675589799881},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4266106188297272},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.42623764276504517},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.4118945002555847},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22383123636245728},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.053099215030670166},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-65636-6_49","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-65636-6_49","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W36091977","https://openalex.org/W86565278","https://openalex.org/W1538589829","https://openalex.org/W1596976394","https://openalex.org/W1993692165","https://openalex.org/W1994449893","https://openalex.org/W2023764457","https://openalex.org/W2043756236","https://openalex.org/W2056127986","https://openalex.org/W2066220442","https://openalex.org/W2068224601","https://openalex.org/W2091537325","https://openalex.org/W2121749752","https://openalex.org/W2130971075","https://openalex.org/W2142684873","https://openalex.org/W2469346691","https://openalex.org/W2473598730","https://openalex.org/W2486765974","https://openalex.org/W2499748587","https://openalex.org/W2505164333","https://openalex.org/W2513712568","https://openalex.org/W2604254197"],"related_works":["https://openalex.org/W2590472383","https://openalex.org/W2383873009","https://openalex.org/W2393580911","https://openalex.org/W2212184297","https://openalex.org/W3207130397","https://openalex.org/W3156456913","https://openalex.org/W2804364458","https://openalex.org/W2390945180","https://openalex.org/W4298130764","https://openalex.org/W2394052932"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
