{"id":"https://openalex.org/W1998991482","doi":"https://doi.org/10.4304/jcp.9.6.1347-1354","title":"Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy","display_name":"Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W1998991482","doi":"https://doi.org/10.4304/jcp.9.6.1347-1354","mag":"1998991482"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.9.6.1347-1354","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.9.6.1347-1354","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026377750","display_name":"Jun Fu","orcid":"https://orcid.org/0000-0002-8692-6810"},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Fu","raw_affiliation_strings":["th Research Institute of China Electronics Technology Group Corporation, Nanjing 210007, China"],"affiliations":[{"raw_affiliation_string":"th Research Institute of China Electronics Technology Group Corporation, Nanjing 210007, China","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083357029","display_name":"Huan Yang","orcid":"https://orcid.org/0000-0003-1808-4735"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Yang","raw_affiliation_strings":["Wuhan Univ.,"],"affiliations":[{"raw_affiliation_string":"Wuhan Univ.,","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006343148","display_name":"Yiwen Liang","orcid":"https://orcid.org/0000-0002-8297-5009"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiwen Liang","raw_affiliation_strings":["Computer School, Wuhan University, Wuhan 430079, China"],"affiliations":[{"raw_affiliation_string":"Computer School, Wuhan University, Wuhan 430079, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113825325","display_name":"Chengyu Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengyu Tan","raw_affiliation_strings":["Computer School, Wuhan University, Wuhan 430079, China"],"affiliations":[{"raw_affiliation_string":"Computer School, Wuhan University, Wuhan 430079, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006343148"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.07709414,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5775240063667297},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41406959295272827}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5775240063667297},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41406959295272827}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4304/jcp.9.6.1347-1354","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.9.6.1347-1354","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.957.8540","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.957.8540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.jcomputers.us/vol9/jcp0906-08.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W97507690","https://openalex.org/W186464874","https://openalex.org/W632824900","https://openalex.org/W1556613707","https://openalex.org/W1567351693","https://openalex.org/W1634470931","https://openalex.org/W1982883298","https://openalex.org/W1990722933","https://openalex.org/W2007357782","https://openalex.org/W2010376102","https://openalex.org/W2051150411","https://openalex.org/W2057855325","https://openalex.org/W2079239688","https://openalex.org/W2112104279","https://openalex.org/W2150330006","https://openalex.org/W2397273008","https://openalex.org/W6603921776","https://openalex.org/W6633436049","https://openalex.org/W6634136695","https://openalex.org/W6636925375","https://openalex.org/W6645940392","https://openalex.org/W6647844716","https://openalex.org/W6652085163","https://openalex.org/W6663401212","https://openalex.org/W6676700423","https://openalex.org/W6682632518"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2317200988","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Abstract\u2014Evasive":[0],"software":[1,25],"keyloggers":[2,44],"hide":[3],"their":[4,32],"malicious":[5,48],"behaviors":[6],"to":[7,69,96],"defeat":[8],"run-time":[9],"detection.":[10,33],"In":[11],"this":[12],"paper,":[13],"based":[14],"on":[15],"the":[16,19,38,62,72,85,89],"analysis":[17],"of":[18,74,91],"evasion":[20],"mechanisms":[21],"used":[22],"by":[23,50,61],"common":[24],"keyloggers,":[26],"we":[27,40],"established":[28],"a":[29,75,78],"framework":[30,39,86],"for":[31],"Using":[34],"an":[35],"enticement":[36],"strategy,":[37],"built":[41],"could":[42,87],"induce":[43],"exhibited":[45],"more":[46],"obvious":[47],"activities":[49,57],"mimicking":[51],"user":[52],"keystrokes.":[53],"These":[54],"\u2018amplified":[55],"\u2019":[56],"are":[58],"then":[59],"correlated":[60],"dendritic":[63,102],"cell":[64,103],"algorithm":[65,104],"(an":[66],"immune-inspired":[67],"algorithm)":[68],"final":[70],"determine":[71],"existence":[73],"keylogger":[76,92],"in":[77],"host.":[79],"Preliminary":[80],"experimental":[81],"results":[82],"showed":[83],"that":[84],"improve":[88],"performance":[90],"detection":[93],"and":[94],"hard":[95],"evade.":[97],"Index":[98],"Terms\u2014keylogger,":[99],"keystroke":[100],"simulation,":[101],"(DCA),":[105],"correlation":[106],"I.":[107]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
