{"id":"https://openalex.org/W3168482278","doi":"https://doi.org/10.1109/jiot.2020.3029970","title":"Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation","display_name":"Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation","publication_year":2020,"publication_date":"2020-10-12","ids":{"openalex":"https://openalex.org/W3168482278","doi":"https://doi.org/10.1109/jiot.2020.3029970","mag":"3168482278"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3029970","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3029970","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078928845","display_name":"Weina Niu","orcid":"https://orcid.org/0000-0002-0072-5541"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weina Niu","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102947751","display_name":"Jing Xiao","orcid":"https://orcid.org/0000-0002-9995-8467"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian\u2019An Xiao","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087699948","display_name":"Xiyue Zhang","orcid":"https://orcid.org/0000-0003-1806-7134"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiyue Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035626891","display_name":"Xiaoming Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoming Huang","raw_affiliation_strings":["China Electronic Technology Group Company Ltd., Cyberspace Security Research Institute, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"China Electronic Technology Group Company Ltd., Cyberspace Security Research Institute, Chengdu, China","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5078928845"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":2.0043,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.87868005,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"12","first_page":"9905","last_page":"9919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8356418013572693},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8324957489967346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5574479699134827},{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.5339020490646362},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5237112641334534},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.46346938610076904},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.449483722448349},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4425492286682129},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43845996260643005},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4338891804218292},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36765623092651367},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1429137885570526}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8356418013572693},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8324957489967346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5574479699134827},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.5339020490646362},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5237112641334534},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.46346938610076904},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.449483722448349},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4425492286682129},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43845996260643005},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4338891804218292},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36765623092651367},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1429137885570526}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2020.3029970","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3029970","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/35621","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/35621","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8909702553","display_name":null,"funder_award_id":"U19A2066","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G935485695","display_name":null,"funder_award_id":"61902262","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W22566950","https://openalex.org/W155384935","https://openalex.org/W790201181","https://openalex.org/W1507388815","https://openalex.org/W1674877186","https://openalex.org/W1936523258","https://openalex.org/W1982610171","https://openalex.org/W1983776999","https://openalex.org/W1988109548","https://openalex.org/W1989204408","https://openalex.org/W1993468264","https://openalex.org/W2009799512","https://openalex.org/W2101823270","https://openalex.org/W2126310301","https://openalex.org/W2133554125","https://openalex.org/W2135349594","https://openalex.org/W2148500771","https://openalex.org/W2198623851","https://openalex.org/W2341637790","https://openalex.org/W2396855773","https://openalex.org/W2529444969","https://openalex.org/W2566527471","https://openalex.org/W2566869048","https://openalex.org/W2582475844","https://openalex.org/W2585395835","https://openalex.org/W2604974201","https://openalex.org/W2605910922","https://openalex.org/W2612185149","https://openalex.org/W2743556905","https://openalex.org/W2792383919","https://openalex.org/W2804240301","https://openalex.org/W2818789173","https://openalex.org/W2889655092","https://openalex.org/W2893988961","https://openalex.org/W2897632664","https://openalex.org/W2900633536","https://openalex.org/W2901528928","https://openalex.org/W2914411038","https://openalex.org/W2921822472","https://openalex.org/W2947499652","https://openalex.org/W2963276095","https://openalex.org/W2963401152","https://openalex.org/W2963414839","https://openalex.org/W2979779535","https://openalex.org/W3001898499","https://openalex.org/W3005260862","https://openalex.org/W6606342502","https://openalex.org/W6637096788","https://openalex.org/W6679978652","https://openalex.org/W6704243981"],"related_works":["https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W2733931179","https://openalex.org/W1642214788","https://openalex.org/W4256304280","https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W2395100307","https://openalex.org/W2909615516","https://openalex.org/W3183826413"],"abstract_inverted_index":{"Advanced":[0],"persistent":[1],"threat":[2],"(APT),":[3],"with":[4,55,82,195,355],"intense":[5],"penetration,":[6],"long":[7],"duration,":[8],"and":[9,25,85,135,189,203,224,237,260,281,305],"high":[10,356],"customization,":[11],"has":[12,289],"become":[13],"one":[14],"of":[15,27,47,74,122,173,217,255,298,329],"the":[16,23,45,67,72,83,186,215,247,262,293,302,327,335,341,349,353],"most":[17,161],"grievous":[18],"threats":[19],"to":[20,39,41,69,89,131,146,169,198,234,241,258,267,347,351],"cybersecurity.":[21],"Furthermore,":[22],"design":[24],"development":[26],"Internet-of-Things":[28],"(IoT)":[29],"devices":[30],"often":[31],"do":[32],"not":[33,65,345],"focus":[34],"on":[35,71,78,150,214,228,274,292],"security,":[36],"leading":[37],"APT":[38,70,76,111,148,162,212,269,313],"extend":[40],"IoT,":[42],"such":[43],"as":[44],"Internet":[46,73,216],"emerging":[48],"unmanned":[49],"aerial":[50],"vehicles":[51],"(UAVs).":[52],"Whether":[53],"malware":[54,77,101,112,143,149,174,213,270,314],"attack":[56,117,129],"payload":[57],"can":[58,325],"be":[59],"successfully":[60],"implanted":[61],"into":[62],"UAVs":[63,79,151,202,218],"or":[64],"is":[66,125,139,232,332],"key":[68],"UAVs.":[75],"establishes":[80],"communication":[81],"command":[84],"control":[86,92],"(C&C)":[87],"server":[88,172],"achieve":[90,326],"remote":[91],"for":[93,141,175],"UAVs-aware":[94],"information":[95,176],"stealing.":[96],"Existing":[97],"effective":[98],"methods":[99,145],"detect":[100],"by":[102,251,309],"analyzing":[103],"malicious":[104,205,306],"behaviors":[105],"generated":[106],"during":[107],"C&C":[108,171],"communication.":[109],"However,":[110],"usually":[113],"adopts":[114],"a":[115,119],"low-traffic":[116],"mode,":[118],"large":[120],"amount":[121],"normal":[123,299,303],"traffic":[124,239,250,304],"mixed":[126],"in":[127,185],"each":[128],"step,":[130],"avoid":[132],"virus":[133],"checking":[134],"killing.":[136],"Therefore,":[137],"it":[138],"difficult":[140],"traditional":[142],"detection":[144,219,280,323,337],"discover":[147,268],"that":[152,160,320],"carry":[153],"weak":[154],"abnormal":[155],"signals.":[156],"Fortunately,":[157],"we":[158],"found":[159],"attacks":[163],"use":[164],"domain":[165,206,271],"name":[166],"system":[167],"(DNS)":[168],"locate":[170],"transmission":[177],"periodically.":[178],"This":[179,208],"behavior":[180],"will":[181],"leave":[182],"some":[183],"records":[184],"network":[187,249],"flow":[188],"DNS":[190,229,253,256],"logs,":[191],"which":[192,231,331],"provides":[193],"us":[194],"an":[196,211],"opportunity":[197],"identify":[199],"infected":[200],"internal":[201],"external":[204],"names.":[207],"article":[209],"proposes":[210],"method":[220,288,324,343],"combining":[221],"string":[222],"matching":[223],"Fourier":[225,282],"transformation":[226],"based":[227,273],"traffic,":[230],"able":[233],"handle":[235],"encrypted":[236],"obfuscated":[238],"due":[240],"packet":[242],"payloads":[243],"independence.":[244],"We":[245],"preprocessed":[246],"collected":[248],"converting":[252],"timestamps":[254],"request":[257],"strings":[259],"used":[261],"trained":[263],"random":[264],"forest":[265],"model":[266],"names":[272],"features":[275],"extracted":[276],"through":[277],"string-matching-based":[278],"periodicity":[279,284,336,354],"transformation-based":[283],"detection.":[285],"The":[286],"proposed":[287,322,342],"been":[290],"evaluated":[291],"data":[294],"set,":[295],"including":[296],"part":[297],"domains":[300,307],"from":[301,312],"marked":[308],"security":[310],"experts":[311],"traffic.":[315],"Experimental":[316],"results":[317],"have":[318],"shown":[319],"our":[321],"accuracy":[328],"94%,":[330],"better":[333],"than":[334],"algorithm":[338],"alone.":[339],"Moreover,":[340],"does":[344],"need":[346],"set":[348],"confidence":[350],"filter":[352],"confidence.":[357]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
