{"id":"https://openalex.org/W4399211739","doi":"https://doi.org/10.3233/idt-240382","title":"Application of intelligent algorithms in library resource malicious download detection system","display_name":"Application of intelligent algorithms in library resource malicious download detection system","publication_year":2024,"publication_date":"2024-05-31","ids":{"openalex":"https://openalex.org/W4399211739","doi":"https://doi.org/10.3233/idt-240382"},"language":"en","primary_location":{"id":"doi:10.3233/idt-240382","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240382","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086731812","display_name":"Xueqi Zhang","orcid":"https://orcid.org/0000-0003-0345-0405"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xueqi Zhang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5086731812"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07083029,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"3","first_page":"2495","last_page":"2509"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.705917477607727},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6796286106109619},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5579556226730347},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3827047646045685},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33102554082870483},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2503817081451416},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22632238268852234}],"concepts":[{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.705917477607727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6796286106109619},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5579556226730347},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3827047646045685},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33102554082870483},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2503817081451416},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22632238268852234}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/idt-240382","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240382","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2890164172","https://openalex.org/W2969612742","https://openalex.org/W2991419331","https://openalex.org/W2998607255","https://openalex.org/W3003986086","https://openalex.org/W3006259430","https://openalex.org/W3010681226","https://openalex.org/W3039795404","https://openalex.org/W3039807308","https://openalex.org/W3094726226","https://openalex.org/W3119972824","https://openalex.org/W3125005646","https://openalex.org/W3213861068","https://openalex.org/W4226327328","https://openalex.org/W4283585446","https://openalex.org/W4366548666","https://openalex.org/W6772319790","https://openalex.org/W6784965098"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2183842793","https://openalex.org/W4255676640","https://openalex.org/W2485259751","https://openalex.org/W4236216870","https://openalex.org/W4243876796","https://openalex.org/W2485273903","https://openalex.org/W2482041988","https://openalex.org/W2497349655"],"abstract_inverted_index":{"The":[0,92,142],"malicious":[1,33,155],"download":[2,34,45,156],"of":[3,111,154,164],"library":[4,43,159,165],"resources":[5],"may":[6],"lead":[7],"to":[8],"serious":[9],"security":[10,163],"risks":[11],"and":[12,41,47,69,78,126,139,167,179,183],"data":[13,46],"leakage.":[14],"To":[15],"address":[16],"this":[17,19,61],"issue,":[18],"study":[20,172],"proposes":[21],"an":[22],"intelligent":[23,62],"algorithm":[24,63],"based":[25,120,130],"on":[26,121,131],"Sliding":[27,50,146],"Event":[28,51,147],"Windows":[29,148],"for":[30,54,66,158],"detecting":[31],"the":[32,98,103,108,112,152,162],"behavior.":[35],"This":[36,171],"research":[37,143,182],"method":[38,119,129],"includes":[39],"collecting":[40],"analyzing":[42],"resource":[44,176],"establishing":[48],"a":[49,82,89,117,127],"Window":[52],"model":[53],"behavioral":[55],"analysis.":[56],"For":[57],"each":[58],"event":[59],"window,":[60],"was":[64],"utilized":[65],"feature":[67],"extraction":[68],"behavior":[70],"classification.":[71],"Experimental":[72],"results":[73],"showed":[74],"that":[75,145],"window":[76],"size":[77],"class":[79],"radius":[80,87],"had":[81,88],"large":[83],"impact,":[84],"while":[85],"clustering":[86],"small":[90],"impact.":[91],"maximum":[93],"topic":[94],"cluster":[95],"ratio":[96],"affected":[97],"false":[99],"alarm":[100],"rate.":[101],"In":[102],"ROC":[104],"curve":[105],"area":[106],"comparison,":[107],"AUC":[109],"values":[110],"proposed":[113],"method,":[114],"RBM":[115],"Method,":[116],"detection":[118,128,157],"IP":[122,132],"request":[123,133],"time":[124],"interval,":[125],"frequency":[134],"were":[135],"0.904,":[136],"0.879,":[137],"0.841,":[138],"0.797,":[140],"respectively.":[141],"confirmed":[144],"can":[149,173],"effectively":[150],"improve":[151],"accuracy":[153],"resources,":[160,166],"enhance":[161],"protect":[168],"user":[169],"privacy.":[170],"further":[174],"optimize":[175],"utilization":[177],"efficiency":[178],"promote":[180],"scientific":[181],"innovative":[184],"development.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
