{"id":"https://openalex.org/W2060148910","doi":"https://doi.org/10.12720/jcm.8.11.716-723","title":"Worm Detection without Knowledge Base in Industrial Networks","display_name":"Worm Detection without Knowledge Base in Industrial Networks","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2060148910","doi":"https://doi.org/10.12720/jcm.8.11.716-723","mag":"2060148910"},"language":"en","primary_location":{"id":"doi:10.12720/jcm.8.11.716-723","is_oa":false,"landing_page_url":"https://doi.org/10.12720/jcm.8.11.716-723","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100844256","display_name":"Huayang Cao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Huayang Cao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048138933","display_name":"Jinjing Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinjing Zhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Peidong Zhu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peidong Zhu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102809441","display_name":"Xicheng Lu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xicheng Lu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5011973331","display_name":"Chonglun Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chonglun Zhao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100844256"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.38,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67425633,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":"11","first_page":"716","last_page":"723"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5861678123474121},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.53792804479599},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.5088536739349365},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39071646332740784},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15627267956733704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5861678123474121},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.53792804479599},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.5088536739349365},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39071646332740784},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15627267956733704},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.12720/jcm.8.11.716-723","is_oa":false,"landing_page_url":"https://doi.org/10.12720/jcm.8.11.716-723","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2029674613","https://openalex.org/W2055209575","https://openalex.org/W2073903244","https://openalex.org/W2137262404","https://openalex.org/W2150053566","https://openalex.org/W2154639126","https://openalex.org/W2159438919","https://openalex.org/W2165184405","https://openalex.org/W2171010205","https://openalex.org/W6635486414"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2385713529","https://openalex.org/W1850639582","https://openalex.org/W2599749361"],"abstract_inverted_index":{"A":[0],"sophisticated":[1],"worm,":[2],"namely":[3],"Stuxnet,":[4],"attacked":[5],"Iran":[6],"nuclear":[7],"facilities":[8],"in":[9,27,68],"2010.":[10],"This":[11,79],"incident,":[12],"together":[13],"with":[14],"newly":[15],"found":[16],"similar":[17],"worms,":[18],"e.g.,":[19],"Duqu,":[20],"Flame,":[21],"Gauss,":[22],"highlight":[23],"the":[24,88,98,115],"cyber":[25],"threat":[26],"industrial":[28],"networks.":[29],"These":[30],"worms":[31],"are":[32,35,42,60],"highlytargeted":[33],"and":[34,86,93],"carefully":[36],"tested":[37],"before":[38],"being":[39],"released.":[40],"They":[41],"difficult":[43],"to":[44],"be":[45],"detected":[46],"by":[47],"current":[48],"security":[49],"products,":[50],"as":[51],"there":[52],"is":[53],"no":[54],"knowledge":[55,75],"about":[56],"them":[57],"when":[58],"they":[59],"spreading.":[61],"We":[62,108],"introduce":[63],"a":[64,82,111],"worm":[65,83],"detection":[66],"mechanism":[67,80],"this":[69,118],"paper,":[70],"which":[71],"doesn\u2019t":[72],"need":[73],"any":[74],"of":[76,90,102,117],"known":[77],"worms.":[78],"maintains":[81],"propagation":[84],"model":[85],"traces":[87],"spread":[89],"suspicious":[91],"files":[92],"triggers":[94],"alerts":[95],"based":[96],"on":[97],"model.":[99],"The":[100],"experiment":[101],"detecting":[103],"Stuxnet":[104],"shows":[105],"its":[106],"efficiency.":[107],"also":[109],"give":[110],"performance":[112],"analysis":[113],"at":[114],"end":[116],"paper.":[119],"\uf020":[120]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
