{"id":"https://openalex.org/W1988906427","doi":"https://doi.org/10.1109/icmlc.2010.5580591","title":"Detecting Trojan horses based on system behavior using machine learning method","display_name":"Detecting Trojan horses based on system behavior using machine learning method","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W1988906427","doi":"https://doi.org/10.1109/icmlc.2010.5580591","mag":"1988906427"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2010.5580591","pdf_url":null,"source":{"id":"https://openalex.org/S4306419646","display_name":"International Conference on Machine Learning and Cybernetics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100376625","display_name":"Yufeng Liu","orcid":"https://orcid.org/0000-0003-0848-5113"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"funder","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu-Feng Liu","raw_affiliation_strings":["Data Mining Group, Software School, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Mining Group, Software School, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100370820","display_name":"Liwei Zhang","orcid":"https://orcid.org/0000-0003-3083-9002"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li-Wei Zhang","raw_affiliation_strings":["MOST Information Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MOST Information Center, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101456567","display_name":"Jian Liang","orcid":"https://orcid.org/0000-0001-5352-0278"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Liang","raw_affiliation_strings":["MOST Information Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MOST Information Center, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102261656","display_name":"Sheng Q\u00fc","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Qu","raw_affiliation_strings":["Network Service Group of Guo He LTD., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network Service Group of Guo He LTD., Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072008964","display_name":"Zhi-Qiang Ni","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi-Qiang Ni","raw_affiliation_strings":["Network Service Group of Guo He LTD., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network Service Group of Guo He LTD., Beijing, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.882,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":15,"citation_normalized_percentile":{"value":0.82442,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"855","last_page":"860"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9895,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan-horse","display_name":"Trojan horse","score":0.7930446},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5494305},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance","score":0.50904745},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.43027616},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4120146}],"concepts":[{"id":"https://openalex.org/C2777337426","wikidata":"https://www.wikidata.org/wiki/Q14639","display_name":"Trojan horse","level":2,"score":0.7930446},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.75974107},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73843116},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.70566916},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5494305},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.50904745},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49091178},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45786387},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.44537428},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.43027616},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4227406},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4120146},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3649767},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22998229},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1782527},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2010.5580591","pdf_url":null,"source":{"id":"https://openalex.org/S4306419646","display_name":"International Conference on Machine Learning and Cybernetics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.51,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1496741998","https://openalex.org/W1581009051","https://openalex.org/W2036323568","https://openalex.org/W2082729696","https://openalex.org/W2087671069","https://openalex.org/W2099053789","https://openalex.org/W2125055259","https://openalex.org/W2144112223","https://openalex.org/W2147169507","https://openalex.org/W2435251607","https://openalex.org/W4244238212"],"related_works":["https://openalex.org/W3007930164","https://openalex.org/W2372022046","https://openalex.org/W2369772021","https://openalex.org/W2366424719","https://openalex.org/W2365834504","https://openalex.org/W2364534619","https://openalex.org/W2364327168","https://openalex.org/W2362008218","https://openalex.org/W2357468668","https://openalex.org/W2053991765"],"abstract_inverted_index":{"The":[0],"Research":[1],"of":[2,16,27,136,149,176,181],"detection":[3,48],"malware":[4],"using":[5,58],"machine":[6],"learning":[7],"method":[8,158],"attracts":[9],"much":[10],"attention":[11],"recent":[12],"years.":[13],"However,":[14],"most":[15],"research":[17],"focused":[18],"on":[19,47],"code":[20],"analysis":[21,26],"which":[22,131],"is":[23,114,152,159,192],"signature-based":[24],"or":[25],"system":[28,53,89,142,189],"call":[29],"sequence":[30],"in":[31,55,76],"Linux":[32],"environment.":[33],"Obviously,":[34],"all":[35],"methods":[36,118],"have":[37],"their":[38,169],"strengths":[39],"and":[40,65,80,94,110,124,140,161,194],"weaknesses.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45,71,86,125],"concentrate":[46],"Trojan":[49,73,137,186],"horse":[50,74,138],"by":[51,83,98,188],"operation":[52,88],"information":[54,191],"Windows":[56],"environment":[57,79],"data":[59],"mining":[60],"technology.":[61],"Our":[62],"main":[63],"content":[64],"contribution":[66],"contains":[67],"as":[68],"follows:":[69],"First,":[70],"collect":[72,87],"samples":[75],"true":[77],"network":[78],"classify":[81],"them":[82],"scanner.":[84],"Secondly,":[85],"behavior":[90,190],"features":[91,123,162],"under":[92],"infected":[93],"clean":[95],"circumstances":[96],"separately":[97],"WMI":[99],"manager":[100],"tools.":[101],"And":[102],"then,":[103],"several":[104],"classic":[105],"classification":[106,173],"algorithms":[107],"are":[108,119,166],"applied":[109,120,160],"a":[111,127,155],"performance":[112],"comparison":[113],"given.":[115],"Feature":[116],"selection":[117],"to":[121],"those":[122],"get":[126],"feature":[128,156],"order":[129,135],"list":[130,151],"reflects":[132],"the":[133,141,146,150,179],"relevance":[134],"activities":[139],"feature.":[143],"We":[144],"believe":[145],"instructive":[147],"meaning":[148],"significant.":[153],"Finally,":[154],"combination":[157],"belongs":[163],"different":[164],"groups":[165],"combined":[167],"according":[168],"characteristic":[170],"for":[171],"high":[172],"performance.":[174],"Results":[175],"experiments":[177],"demonstrate":[178],"feasibility":[180],"our":[182],"assumption":[183],"that":[184],"detecting":[185],"horses":[187],"feasible":[193],"affective.":[195]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1988906427","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2}],"updated_date":"2025-02-18T18:51:09.697071","created_date":"2016-06-24"}