{"id":"https://openalex.org/W4244216512","doi":"https://doi.org/10.1002/spy2.179","title":"Detection and defense of network virus using data mining technology","display_name":"Detection and defense of network virus using data mining technology","publication_year":2021,"publication_date":"2021-07-18","ids":{"openalex":"https://openalex.org/W4244216512","doi":"https://doi.org/10.1002/spy2.179"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.179","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.179","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103132455","display_name":"Zhijun Li","orcid":"https://orcid.org/0000-0002-8487-0403"},"institutions":[{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhijun Li","raw_affiliation_strings":["Integrated Business Department of Assets and Laboratory Management Center Hebei Normal University for Nationalities  Chengde Hebei China","Integrated Business Department of Assets and Laboratory Management Center, Hebei Normal University for Nationalities, Chengde, Hebei, China"],"affiliations":[{"raw_affiliation_string":"Integrated Business Department of Assets and Laboratory Management Center Hebei Normal University for Nationalities  Chengde Hebei China","institution_ids":["https://openalex.org/I94611258"]},{"raw_affiliation_string":"Integrated Business Department of Assets and Laboratory Management Center, Hebei Normal University for Nationalities, Chengde, Hebei, China","institution_ids":["https://openalex.org/I94611258"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112114863","display_name":"Xuedong Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuedong Jiang","raw_affiliation_strings":["Information Center Hebei Normal University for Nationalities  Chengde Hebei China","Information Center, Hebei Normal University for Nationalities, Chengde, Hebei, China"],"affiliations":[{"raw_affiliation_string":"Information Center Hebei Normal University for Nationalities  Chengde Hebei China","institution_ids":["https://openalex.org/I94611258"]},{"raw_affiliation_string":"Information Center, Hebei Normal University for Nationalities, Chengde, Hebei, China","institution_ids":["https://openalex.org/I94611258"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103132455"],"corresponding_institution_ids":["https://openalex.org/I94611258"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2702812,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"4","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7291306257247925},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.719770610332489},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.6213800311088562},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5858362317085266},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.543917179107666},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5336953401565552},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.46266981959342957},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46032726764678955},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.4156377911567688},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39618247747421265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3589760661125183},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15255770087242126},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11289295554161072}],"concepts":[{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7291306257247925},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.719770610332489},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.6213800311088562},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5858362317085266},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.543917179107666},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5336953401565552},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.46266981959342957},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46032726764678955},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.4156377911567688},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39618247747421265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3589760661125183},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15255770087242126},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11289295554161072},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.179","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.179","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W324493104","https://openalex.org/W963753554","https://openalex.org/W1545056863","https://openalex.org/W2085415563","https://openalex.org/W2108142795","https://openalex.org/W2173259274","https://openalex.org/W2280242822","https://openalex.org/W2493898271","https://openalex.org/W2544402076","https://openalex.org/W2592813858","https://openalex.org/W2604180402","https://openalex.org/W2613576226","https://openalex.org/W2615131380","https://openalex.org/W2805520061","https://openalex.org/W2925089654","https://openalex.org/W2962610426","https://openalex.org/W3003798257","https://openalex.org/W3015816094","https://openalex.org/W3094546687","https://openalex.org/W3124075121"],"related_works":["https://openalex.org/W4321442002","https://openalex.org/W2015265939","https://openalex.org/W2284072287","https://openalex.org/W2611067230","https://openalex.org/W4235469518","https://openalex.org/W2387706296","https://openalex.org/W2155788121","https://openalex.org/W2480201319","https://openalex.org/W4221011469","https://openalex.org/W166286667"],"abstract_inverted_index":{"Abstract":[0],"The":[1,64,126],"spread":[2],"of":[3,14,40,72,91,98,104],"network":[4],"viruses":[5],"has":[6],"posed":[7],"a":[8,93],"serious":[9],"threat":[10],"to":[11,21,36,49],"the":[12,15,38,55,70,76,79,108,111,115,119,123,130],"security":[13],"network;":[16],"therefore,":[17],"it":[18],"is":[19,133],"necessary":[20],"detect":[22],"and":[23,52,100,114,138,140,145],"defend":[24],"them":[25],"effectively.":[26],"This":[27],"paper":[28],"used":[29,54],"debugging":[30],"application":[31],"programming":[32],"interface":[33],"(API)":[34],"technology":[35],"obtain":[37],"features":[39],"API":[41,46,73],"calls":[42,47],"as":[43],"viruses,":[44],"filtered":[45],"according":[48],"information":[50],"entropy,":[51],"finally":[53],"support":[56],"vector":[57],"machine":[58],"(SVM)":[59],"model":[60],"for":[61],"virus":[62,81,136],"detection.":[63],"experimental":[65],"results":[66,127],"showed":[67],"that":[68,129],"when":[69],"number":[71],"was":[74],"1200,":[75],"algorithm":[77,121],"had":[78,122],"best":[80,124],"detection":[82,137],"performance,":[83],"with":[84,107],"an":[85,101],"average":[86],"true":[87],"positive":[88,95],"rate":[89,96],"(TPR)":[90],"95.2%,":[92],"false":[94],"(FPR)":[97],"3.31%,":[99],"overall":[102],"accuracy":[103],"95.42%;":[105],"compared":[106],"C4.5":[109],"algorithm,":[110,113,118],"K\u2010means":[112],"Naive":[116],"Bayes":[117],"SVM":[120],"performance.":[125],"show":[128],"proposed":[131],"method":[132],"effective":[134],"in":[135,147],"defense":[139],"can":[141],"be":[142],"further":[143],"promoted":[144],"applied":[146],"practice.":[148]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
