{"id":"https://openalex.org/W1978172697","doi":"https://doi.org/10.1109/fskd.2012.6233812","title":"A malicious code detection method based on statistical analysis","display_name":"A malicious code detection method based on statistical analysis","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W1978172697","doi":"https://doi.org/10.1109/fskd.2012.6233812","mag":"1978172697"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2012.6233812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6233812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101706134","display_name":"Yunlong Wu","orcid":"https://orcid.org/0000-0002-6911-954X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunlong Wu","raw_affiliation_strings":["National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China"],"affiliations":[{"raw_affiliation_string":"National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100418586","display_name":"Chen Chen","orcid":"https://orcid.org/0009-0000-7081-5668"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Chen","raw_affiliation_strings":["National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, P. R. China","National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China"],"affiliations":[{"raw_affiliation_string":"National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, P. R. China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108106064","display_name":"Huiquan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiquan Wang","raw_affiliation_strings":["National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China"],"affiliations":[{"raw_affiliation_string":"National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103027601","display_name":"Jie Zhou","orcid":"https://orcid.org/0000-0002-6309-0029"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Zhou","raw_affiliation_strings":["School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China","School of Computer National University of Defense Technology Changsha Hunan 410073 China"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer National University of Defense Technology Changsha Hunan 410073 China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101775095","display_name":"Xinhai Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinhai Xu","raw_affiliation_strings":["National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China"],"affiliations":[{"raw_affiliation_string":"National Laboratory for Parallel and Distributed Processing, School of Computer, National University of Defense Technology, Changsha, Hunan, 410073, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101706134"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06235536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":null,"first_page":"1452","last_page":"1455"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.8831744194030762},{"id":"https://openalex.org/keywords/false-positives-and-false-negatives","display_name":"False positives and false negatives","score":0.8224613666534424},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7756499648094177},{"id":"https://openalex.org/keywords/sort","display_name":"sort","score":0.689368724822998},{"id":"https://openalex.org/keywords/true-positive-rate","display_name":"True positive rate","score":0.6174137592315674},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5829543471336365},{"id":"https://openalex.org/keywords/statistical-analysis","display_name":"Statistical analysis","score":0.5323178172111511},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5194782018661499},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.4264785945415497},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4251285493373871},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3926738500595093},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.1453762948513031},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12195977568626404},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.08602544665336609}],"concepts":[{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.8831744194030762},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.8224613666534424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7756499648094177},{"id":"https://openalex.org/C88548561","wikidata":"https://www.wikidata.org/wiki/Q347599","display_name":"sort","level":2,"score":0.689368724822998},{"id":"https://openalex.org/C2989486834","wikidata":"https://www.wikidata.org/wiki/Q3808900","display_name":"True positive rate","level":2,"score":0.6174137592315674},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5829543471336365},{"id":"https://openalex.org/C2986587452","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical analysis","level":2,"score":0.5323178172111511},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5194782018661499},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.4264785945415497},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4251285493373871},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3926738500595093},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.1453762948513031},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12195977568626404},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.08602544665336609},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2012.6233812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6233812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1540715591","https://openalex.org/W1552906779","https://openalex.org/W1965735887","https://openalex.org/W1996696345","https://openalex.org/W2062303992","https://openalex.org/W2084641398","https://openalex.org/W2148888468","https://openalex.org/W2352360880","https://openalex.org/W2374753258","https://openalex.org/W2752932982","https://openalex.org/W2964933744","https://openalex.org/W3152006536","https://openalex.org/W6633127768"],"related_works":["https://openalex.org/W2027184711","https://openalex.org/W3119537175","https://openalex.org/W2951146195","https://openalex.org/W4292605373","https://openalex.org/W3123215897","https://openalex.org/W2810356275","https://openalex.org/W2153600354","https://openalex.org/W2102122784","https://openalex.org/W2208028087","https://openalex.org/W3164550676"],"abstract_inverted_index":{"The":[0],"malicious":[1],"code":[2],"detection":[3,40],"based":[4,42,95],"on":[5,43,96],"behaviors":[6,26],"has":[7],"proved":[8],"effective.":[9],"But":[10],"there":[11],"are":[12,27],"high":[13,17],"false":[14,18,108,112],"positives":[15,109],"and":[16,30,57,64,110],"negatives":[19,113],"when":[20],"using":[21,70],"this":[22,36,47,85],"method.":[23],"Because":[24],"the":[25,55,62,71,78,89,93,107,111],"always":[28],"out-of-order":[29],"redundant.":[31],"To":[32],"solve":[33],"these":[34],"problems,":[35],"paper":[37],"proposes":[38],"a":[39],"method":[41,48,86],"statistical":[44,97],"analysis.":[45,98],"Firstly,":[46],"uses":[49],"association":[50,72],"rules":[51],"to":[52,91],"sort":[53],"out":[54],"behaviors,":[56],"then":[58],"we":[59,74],"can":[60,75,87,104],"get":[61],"integrated":[63],"accurate":[65],"behavior":[66,81],"sequences.":[67,82],"Secondly,":[68],"by":[69],"algorithm":[73],"pick":[76],"up":[77],"signatures":[79,90],"of":[80],"In":[83],"addition,":[84],"detect":[88],"judge":[92],"threat":[94],"Experimental":[99],"results":[100],"indicate":[101],"that":[102],"it":[103],"reduce":[105],"both":[106],"effectively.":[114]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
