{"id":"https://openalex.org/W3159902214","doi":"https://doi.org/10.1155/2021/5599556","title":"N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection","display_name":"N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection","publication_year":2021,"publication_date":"2021-04-23","ids":{"openalex":"https://openalex.org/W3159902214","doi":"https://doi.org/10.1155/2021/5599556","mag":"3159902214"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5599556","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2021/5599556","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5599556.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/5599556.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048188687","display_name":"Huiwen Bai","orcid":"https://orcid.org/0000-0002-8985-6977"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiwen Bai","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-8985-6977","affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062243742","display_name":"Guangjie Liu","orcid":"https://orcid.org/0000-0003-4729-7406"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guangjie Liu","raw_affiliation_strings":["School of Electronic and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-4729-7406","affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359503","display_name":"Weiwei Liu","orcid":"https://orcid.org/0000-0001-7353-9136"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiwei Liu","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059965075","display_name":"Yingxue Quan","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingxue Quan","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009451103","display_name":"Shuhua Huang","orcid":"https://orcid.org/0000-0003-3569-7891"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuhua Huang","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062243742"],"corresponding_institution_ids":["https://openalex.org/I200845125"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.1611,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.87930342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.914544403553009},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8205709457397461},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5866597294807434},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48616501688957214},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.44679972529411316},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.44570648670196533},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.44126197695732117},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4333326816558838},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41779494285583496},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39637547731399536},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21931710839271545}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.914544403553009},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8205709457397461},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5866597294807434},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48616501688957214},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.44679972529411316},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.44570648670196533},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.44126197695732117},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4333326816558838},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41779494285583496},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39637547731399536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21931710839271545}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2021/5599556","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2021/5599556","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5599556.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e3a4efb119354f4a822448b953a8519d","is_oa":true,"landing_page_url":"https://doaj.org/article/e3a4efb119354f4a822448b953a8519d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2021/5599556","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5599556","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2021/5599556","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2021/5599556","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5599556.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1931098107","display_name":null,"funder_award_id":"30918012204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3986486420","display_name":null,"funder_award_id":"30918012204","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5515644545","display_name":null,"funder_award_id":"U1836104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G664343225","display_name":null,"funder_award_id":"61702235","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G6732892750","display_name":null,"funder_award_id":"U1836104","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8982426284","display_name":null,"funder_award_id":"61702235","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3159902214.pdf","grobid_xml":"https://content.openalex.org/works/W3159902214.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W47191821","https://openalex.org/W79696261","https://openalex.org/W1438616768","https://openalex.org/W1532142362","https://openalex.org/W1583484179","https://openalex.org/W1597305440","https://openalex.org/W1827212170","https://openalex.org/W1968597682","https://openalex.org/W1972428331","https://openalex.org/W1985686072","https://openalex.org/W2002478203","https://openalex.org/W2032724464","https://openalex.org/W2053715745","https://openalex.org/W2074023167","https://openalex.org/W2095410061","https://openalex.org/W2108700604","https://openalex.org/W2126059122","https://openalex.org/W2137786570","https://openalex.org/W2275058769","https://openalex.org/W2401896535","https://openalex.org/W2525905924","https://openalex.org/W2600788550","https://openalex.org/W2768073432","https://openalex.org/W2768985374","https://openalex.org/W2789983203","https://openalex.org/W2792736988","https://openalex.org/W2897230315","https://openalex.org/W2906631928","https://openalex.org/W2945015800","https://openalex.org/W2982413766","https://openalex.org/W3040974506","https://openalex.org/W3049465447","https://openalex.org/W3098133640","https://openalex.org/W4298098758","https://openalex.org/W6635716266","https://openalex.org/W6694258738","https://openalex.org/W6891707678"],"related_works":["https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W4245250093","https://openalex.org/W3114159050","https://openalex.org/W2484248966","https://openalex.org/W4244354662","https://openalex.org/W2609233367","https://openalex.org/W4200054778","https://openalex.org/W2777464647","https://openalex.org/W2965539362"],"abstract_inverted_index":{"Mobile":[0],"malware":[1,25,32],"poses":[2],"a":[3],"great":[4],"challenge":[5],"to":[6,22,37,65,173,183],"mobile":[7,10,17,24,27,31,52,73],"devices":[8],"and":[9,86,155],"communication.":[11],"With":[12],"the":[13,35,51,67,72,76,81,88,96,104,108,111,128,157,175,186],"explosive":[14],"growth":[15],"of":[16,110,118,143,168,177,207],"networks,":[18],"it":[19],"is":[20,48,160,203],"significant":[21],"detect":[23,66],"for":[26,50],"security.":[28],"Since":[29],"most":[30],"relies":[33],"on":[34],"networks":[36],"coordinate":[38],"operations,":[39],"steal":[40],"information,":[41],"or":[42],"launch":[43],"attacks,":[44],"evading":[45],"network":[46,68,82,134,154],"monitor":[47],"difficult":[49],"malware.":[53,74],"In":[54,75,181],"this":[55],"paper,":[56],"we":[57,79],"present":[58],"an":[59,163],"N-gram,":[60],"semantic-based":[61],"neural":[62,133],"modeling":[63],"method":[64],"traffic":[69,83],"generated":[70,97],"by":[71],"proposed":[77,112,125,179,201],"scheme,":[78],"segment":[80],"into":[84,103],"flows":[85],"extract":[87],"application":[89],"layer":[90],"payload":[91,99],"from":[92,138,162],"each":[93,139],"packet.":[94],"Then,":[95],"flow":[98,115,149],"data":[100],"are":[101,145,193],"converted":[102],"text":[105,116],"form":[106],"as":[107],"input":[109],"model.":[113],"Each":[114],"consists":[117],"several":[119,189],"domains":[120,144],"with":[121,135,185],"20":[122],"words.":[123],"The":[124,195],"scheme":[126,202],"models":[127],"domain":[129],"representation":[130,150],"using":[131,151],"convolutional":[132],"multiwidth":[136],"kernels":[137],"domain.":[140],"Afterward,":[141],"relationships":[142],"adaptively":[146],"encoded":[147],"in":[148,205],"gated":[152],"recurrent":[153],"then":[156],"classification":[158],"result":[159],"obtained":[161],"attention":[164],"layer.":[165],"A":[166],"series":[167],"experiments":[169,191],"have":[170],"been":[171],"conducted":[172],"verify":[174],"effectiveness":[176],"our":[178,200],"scheme.":[180],"addition,":[182],"compare":[184],"state-of-the-art":[187],"methods,":[188],"comparative":[190],"also":[192],"conducted.":[194],"experiment":[196],"results":[197],"depict":[198],"that":[199],"better":[204],"terms":[206],"accuracy.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
