{"id":"https://openalex.org/W4390352381","doi":"https://doi.org/10.1145/3617184.3630149","title":"Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature Fusion","display_name":"Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature Fusion","publication_year":2023,"publication_date":"2023-09-22","ids":{"openalex":"https://openalex.org/W4390352381","doi":"https://doi.org/10.1145/3617184.3630149"},"language":"en","primary_location":{"id":"doi:10.1145/3617184.3630149","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3630149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101494229","display_name":"Xiaolong Li","orcid":"https://orcid.org/0009-0001-9528-2973"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiaolong Li","raw_affiliation_strings":["Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China"],"affiliations":[{"raw_affiliation_string":"Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117073119","display_name":"Zhenhua Yan","orcid":"https://orcid.org/0009-0006-9023-8283"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhenhua Yan","raw_affiliation_strings":["Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China"],"affiliations":[{"raw_affiliation_string":"Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070257202","display_name":"Shuang Zhang","orcid":"https://orcid.org/0009-0002-3454-1748"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuang Zhang","raw_affiliation_strings":["Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China"],"affiliations":[{"raw_affiliation_string":"Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004290576","display_name":"Xinghua Li","orcid":"https://orcid.org/0009-0002-2402-9177"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinghua Li","raw_affiliation_strings":["Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China"],"affiliations":[{"raw_affiliation_string":"Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006152272","display_name":"Feng Wang","orcid":"https://orcid.org/0009-0009-0368-0770"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Feng Wang","raw_affiliation_strings":["Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China"],"affiliations":[{"raw_affiliation_string":"Power Science Research Institute of State Grid Ningxia Electric Power Co., LTD, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101494229"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19409151,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"274","last_page":"281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8118535280227661},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6423360705375671},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.5544949769973755},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5530796051025391},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.45019155740737915},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.44147807359695435},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40571820735931396},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37750953435897827},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3218308091163635},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15684428811073303}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8118535280227661},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6423360705375671},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5544949769973755},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5530796051025391},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.45019155740737915},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.44147807359695435},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40571820735931396},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37750953435897827},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3218308091163635},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15684428811073303},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3617184.3630149","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3630149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1586252162","https://openalex.org/W1888005072","https://openalex.org/W1956767865","https://openalex.org/W1968519345","https://openalex.org/W2010065958","https://openalex.org/W2023560454","https://openalex.org/W2079215333","https://openalex.org/W2086200747","https://openalex.org/W2126401948","https://openalex.org/W2144112223","https://openalex.org/W2150188172","https://openalex.org/W2154851992","https://openalex.org/W2267635142","https://openalex.org/W2315403234","https://openalex.org/W2591102410","https://openalex.org/W2601305972","https://openalex.org/W2632775315","https://openalex.org/W2778638786","https://openalex.org/W2788919350","https://openalex.org/W2914721378","https://openalex.org/W2942259124","https://openalex.org/W2963555845","https://openalex.org/W2969395615","https://openalex.org/W2981292756","https://openalex.org/W2996806689","https://openalex.org/W3039075121","https://openalex.org/W3094374491","https://openalex.org/W3100993589","https://openalex.org/W3104097132","https://openalex.org/W3196064684","https://openalex.org/W3206188534","https://openalex.org/W6659012365","https://openalex.org/W6763057493","https://openalex.org/W6779961489"],"related_works":["https://openalex.org/W3042604642","https://openalex.org/W121858127","https://openalex.org/W2165263102","https://openalex.org/W4289329995","https://openalex.org/W2373574911","https://openalex.org/W2775143306","https://openalex.org/W2046727832","https://openalex.org/W2012747176","https://openalex.org/W4247895841","https://openalex.org/W2253987509"],"abstract_inverted_index":{"Malicious":[0],"code":[1,19,26,58,80,108,136],"in":[2,20,120],"power":[3,92,121],"systems":[4,94,123],"exhibits":[5],"a":[6,29,43,115],"wide":[7],"variety":[8],"of":[9,32,41,56,67,78,91,106],"features,":[10],"diverse":[11],"origins,":[12],"and":[13,64,70,88,95,104],"complex":[14,44],"forms":[15],"compared":[16],"to":[17,36],"malicious":[18,25,57,79,107,135],"other":[21],"information":[22,93,122],"systems.":[23],"Analyzing":[24],"based":[27,124],"on":[28,125],"single":[30],"dimension":[31],"features":[33,99],"is":[34,59],"inadequate":[35],"meet":[37],"the":[38,52,62,76,85,110],"research":[39,50],"demands":[40],"such":[42,100],"spectrum.":[45],"In":[46],"this":[47,112,132],"paper,":[48],"we":[49,129],"into":[51],"multidimensional":[53,98,126],"feature":[54,118],"fusion":[55,119],"beneficial":[60],"for":[61,117,134],"comprehensive":[63],"accurate":[65],"identification":[66],"potential":[68],"threats":[69],"attacks,":[71],"as":[72,74,101],"well":[73],"improving":[75],"efficiency":[77],"analysis.":[81],"To":[82],"closely":[83],"integrate":[84],"business":[86],"operations":[87],"network":[89],"structure":[90],"organically":[96],"combine":[97],"assembly,":[102],"byte,":[103],"image":[105],"within":[109],"environment,":[111],"paper":[113],"proposes":[114],"method":[116,133],"features.":[127],"Furthermore,":[128],"experimentally":[130],"validate":[131],"lineage":[137],"analysis":[138],"using":[139],"graph":[140],"convolutional":[141],"neural":[142],"networks.":[143]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
