{"id":"https://openalex.org/W3195689053","doi":"https://doi.org/10.1145/3469213.3471388","title":"Research and application of internal malicious code threat detection system","display_name":"Research and application of internal malicious code threat detection system","publication_year":2021,"publication_date":"2021-05-28","ids":{"openalex":"https://openalex.org/W3195689053","doi":"https://doi.org/10.1145/3469213.3471388","mag":"3195689053"},"language":"en","primary_location":{"id":"doi:10.1145/3469213.3471388","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3469213.3471388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 2nd International Conference on Artificial Intelligence and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100617329","display_name":"Xiaojun Zhang","orcid":"https://orcid.org/0000-0001-8803-2303"},"institutions":[{"id":"https://openalex.org/I4210166468","display_name":"Beijing Aerospace Flight Control Center","ror":"https://ror.org/007a14354","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210166468"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhang Xiaojun","raw_affiliation_strings":["Beijing Aerospace Control Center, China"],"affiliations":[{"raw_affiliation_string":"Beijing Aerospace Control Center, China","institution_ids":["https://openalex.org/I4210166468"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033548311","display_name":"Yingcai Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Yingcai","raw_affiliation_strings":["Beijing Institute of Space Mechanism &amp; Elctricity, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Space Mechanism &amp; Elctricity, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101750974","display_name":"Fuqiang Zhang","orcid":"https://orcid.org/0000-0002-0168-8690"},"institutions":[{"id":"https://openalex.org/I4210166468","display_name":"Beijing Aerospace Flight Control Center","ror":"https://ror.org/007a14354","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210166468"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhang Fuqiang","raw_affiliation_strings":["Beijing Aerospace Control Center, China"],"affiliations":[{"raw_affiliation_string":"Beijing Aerospace Control Center, China","institution_ids":["https://openalex.org/I4210166468"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010875771","display_name":"Qian Zhang","orcid":"https://orcid.org/0000-0002-0651-469X"},"institutions":[{"id":"https://openalex.org/I4210166468","display_name":"Beijing Aerospace Flight Control Center","ror":"https://ror.org/007a14354","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210166468"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhang Qian","raw_affiliation_strings":["Beijing Aerospace Control Center, China"],"affiliations":[{"raw_affiliation_string":"Beijing Aerospace Control Center, China","institution_ids":["https://openalex.org/I4210166468"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100452557","display_name":"Han Li","orcid":"https://orcid.org/0000-0001-5101-5542"},"institutions":[{"id":"https://openalex.org/I4210166468","display_name":"Beijing Aerospace Flight Control Center","ror":"https://ror.org/007a14354","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210166468"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Li","raw_affiliation_strings":["Beijing Aerospace Control Center, China"],"affiliations":[{"raw_affiliation_string":"Beijing Aerospace Control Center, China","institution_ids":["https://openalex.org/I4210166468"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100617329"],"corresponding_institution_ids":["https://openalex.org/I4210166468"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14372886,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9524000287055969,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9524000287055969,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9327999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7182942032814026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.571122944355011},{"id":"https://openalex.org/keywords/interconnection","display_name":"Interconnection","score":0.5226171612739563},{"id":"https://openalex.org/keywords/openness-to-experience","display_name":"Openness to experience","score":0.5130456686019897},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.4697967767715454},{"id":"https://openalex.org/keywords/informatization","display_name":"Informatization","score":0.4629865884780884},{"id":"https://openalex.org/keywords/terminal","display_name":"Terminal (telecommunication)","score":0.4472358524799347},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4453502595424652},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41231268644332886},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4011715352535248},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2031882405281067},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18005242943763733}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7182942032814026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.571122944355011},{"id":"https://openalex.org/C123745756","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnection","level":2,"score":0.5226171612739563},{"id":"https://openalex.org/C84976871","wikidata":"https://www.wikidata.org/wiki/Q2015673","display_name":"Openness to experience","level":2,"score":0.5130456686019897},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.4697967767715454},{"id":"https://openalex.org/C2776352007","wikidata":"https://www.wikidata.org/wiki/Q181588","display_name":"Informatization","level":2,"score":0.4629865884780884},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.4472358524799347},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4453502595424652},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41231268644332886},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4011715352535248},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2031882405281067},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18005242943763733},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3469213.3471388","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3469213.3471388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 2nd International Conference on Artificial Intelligence and Information Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2366834094","https://openalex.org/W2384289521","https://openalex.org/W2589605869","https://openalex.org/W2978225435","https://openalex.org/W2392708612","https://openalex.org/W2377620891","https://openalex.org/W2009722433","https://openalex.org/W2372357978","https://openalex.org/W2365642005","https://openalex.org/W2379077625"],"abstract_inverted_index":{"With":[0],"the":[1,14,36,40,46,50,71],"continuous":[2],"development":[3,74],"of":[4,18,73],"network":[5,20,32],"technology,":[6],"global":[7],"informatization":[8],"has":[9],"become":[10],"a":[11],"reality.":[12],"While":[13],"openness":[15],"and":[16,55,58,64,75,81],"interconnection":[17],"IP":[19],"protocols":[21],"bring":[22],"convenience":[23],"to":[24,34,68],"data":[25],"communication,":[26],"it":[27],"also":[28],"provides":[29],"space":[30],"for":[31],"intruders":[33],"enter":[35],"void.":[37],"In":[38],"particular,":[39],"terminal":[41,51],"system":[42],"design":[43],"is":[44,52],"fragile,":[45],"software":[47],"running":[48],"on":[49],"becoming":[53],"more":[54,56],"complicated,":[57],"its":[59],"various":[60],"components":[61],"are":[62,66],"interdependent,":[63],"vulnerabilities":[65,78],"prone":[67],"occur":[69],"in":[70],"process":[72],"maintenance.":[76],"0day":[77],"emerge":[79],"endlessly,":[80],"static":[82],"protection":[83],"methods":[84],"have":[85],"exposed":[86],"deficiencies.":[87]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
