iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.3390/SYM12091406
{"id":"https://openalex.org/W3080126850","doi":"https://doi.org/10.3390/sym12091406","title":"WebShell Attack Detection Based on a Deep Super Learner","display_name":"WebShell Attack Detection Based on a Deep Super Learner","publication_year":2020,"publication_date":"2020-08-24","ids":{"openalex":"https://openalex.org/W3080126850","doi":"https://doi.org/10.3390/sym12091406","mag":"3080126850"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12091406","pdf_url":"https://www.mdpi.com/2073-8994/12/9/1406/pdf?version=1598252934","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/12/9/1406/pdf?version=1598252934","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061936818","display_name":"Zhuang Ai","orcid":"https://orcid.org/0000-0002-2251-5545"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuang Ai","raw_affiliation_strings":["College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073536083","display_name":"Nurbol Luktarhan","orcid":"https://orcid.org/0000-0002-4043-6920"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Nurbol Luktarhan","raw_affiliation_strings":["College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040322371","display_name":"Aijun Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"AiJun Zhou","raw_affiliation_strings":["College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025438395","display_name":"Dan Lv","orcid":"https://orcid.org/0000-0002-8029-0110"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Lv","raw_affiliation_strings":["College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Xinjiang University, Urumqi 830000, China","institution_ids":["https://openalex.org/I96908189"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5073536083"],"corresponding_institution_ids":["https://openalex.org/I96908189"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165,"provenance":"doaj"},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165,"provenance":"doaj"},"fwci":1.652,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":8,"citation_normalized_percentile":{"value":0.894089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":"12","issue":"9","first_page":"1406","last_page":"1406"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.6864786},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.64461625},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.573655},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.562326},{"id":"https://openalex.org/keywords/detection","display_name":"Detection","score":0.544659},{"id":"https://openalex.org/keywords/spam-detection","display_name":"Spam Detection","score":0.539393},{"id":"https://openalex.org/keywords/bot-detection","display_name":"Bot Detection","score":0.529155}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78528863},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.6864786},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.64461625},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5986092},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.4808703},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.47757915},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.44220388},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41780728},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39317113},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3227113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.099125594},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12091406","pdf_url":"https://www.mdpi.com/2073-8994/12/9/1406/pdf?version=1598252934","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12091406","pdf_url":"https://www.mdpi.com/2073-8994/12/9/1406/pdf?version=1598252934","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.57}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61433012"}],"datasets":[],"versions":[],"referenced_works_count":33,"referenced_works":["https://openalex.org/W1563554545","https://openalex.org/W1966176178","https://openalex.org/W2006374488","https://openalex.org/W2022916997","https://openalex.org/W2083606554","https://openalex.org/W2143880224","https://openalex.org/W2145870932","https://openalex.org/W2148143831","https://openalex.org/W2167101736","https://openalex.org/W2202042777","https://openalex.org/W2791691546","https://openalex.org/W2798523152","https://openalex.org/W2805465321","https://openalex.org/W2807154909","https://openalex.org/W2884764722","https://openalex.org/W2897617454","https://openalex.org/W2899469014","https://openalex.org/W2913833650","https://openalex.org/W2917498166","https://openalex.org/W2949547296","https://openalex.org/W2953926847","https://openalex.org/W2958825559","https://openalex.org/W2971269091","https://openalex.org/W2975195699","https://openalex.org/W2980877510","https://openalex.org/W2991439632","https://openalex.org/W2996036101","https://openalex.org/W2999390673","https://openalex.org/W3000339128","https://openalex.org/W3027917389","https://openalex.org/W3039940510","https://openalex.org/W3048330743","https://openalex.org/W3102349050"],"related_works":["https://openalex.org/W4386185023","https://openalex.org/W4386080799","https://openalex.org/W4320031223","https://openalex.org/W4317672133","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W4281902577","https://openalex.org/W4200629851","https://openalex.org/W3140988292","https://openalex.org/W3009072493"],"abstract_inverted_index":{"WebShell":[0,18,31],"is":[1,8],"a":[2,37,82,110,124],"common":[3],"network":[4],"backdoor":[5],"attack":[6,42],"that":[7,135],"characterized":[9],"by":[10],"high":[11],"concealment":[12],"and":[13,27,69,142,145],"great":[14],"harm.":[15],"However,":[16],"conventional":[17],"detection":[19],"methods":[20],"can":[21,138],"no":[22],"longer":[23],"cope":[24],"with":[25],"complex":[26],"flexible":[28],"variations":[29],"of":[30,54,65,77,103,106,117],"attacks.":[32],"Therefore,":[33],"this":[34,97,136],"paper":[35],"proposes":[36],"deep":[38,125],"super":[39,126],"learner":[40,127],"for":[41],"detection.":[43],"First,":[44],"the":[45,52,58,63,66,75,78,89,94,101,104,115,118],"collected":[46],"data":[47,56],"are":[48,72,147],"deduplicated":[49],"to":[50,61,80,92,99,113,128],"prevent":[51,100],"influence":[53],"duplicate":[55],"on":[57],"result.":[59],"Second,":[60],"detect":[62,129,140],"results":[64,133],"algorithm,":[67],"static":[68],"dynamic":[70],"feature":[71,76,84,119],"taken":[73],"as":[74],"algorithm":[79,91,112,137],"construct":[81],"comprehensive":[83],"set.":[85],"We":[86],"then":[87],"use":[88,109,123],"Word2Vec":[90],"vectorize":[93],"features.":[95],"During":[96],"period,":[98],"outbreak":[102],"number":[105],"features,":[107],"we":[108,122],"genetic":[111],"extract":[114],"validity":[116],"dimension.":[120],"Finally,":[121],"WebShell.":[130],"The":[131],"experimental":[132],"show":[134],"effectively":[139],"WebShell,":[141],"its":[143],"accuracy":[144],"recall":[146],"greatly":[148],"improved.":[149]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3080126850","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2024-11-06T09:23:01.141474","created_date":"2020-09-01"}