{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:20:24Z","timestamp":1778948424411,"version":"3.51.4"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736218"],"award-info":[{"award-number":["U1736218"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502044"],"award-info":[{"award-number":["61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2882517","type":"journal-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T19:56:26Z","timestamp":1542743786000},"page":"75268-75277","source":"Crossref","is-referenced-by-count":33,"title":["Webshell Traffic Detection With Character-Level Features Based on Deep Learning"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hongchao","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Hanbing","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1278-1735","authenticated-orcid":false,"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuqi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xingyu","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3058060.3058083"},{"key":"ref32","first-page":"5","article-title":"Research of webshell detection based on decision tree","volume":"6","author":"jiankang","year":"2012","journal-title":"Journal of Network New Media"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref30","author":"joulin","year":"2016","journal-title":"Bag of tricks for efficient text classification"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3174"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36456-0_38"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/951762.951766"},{"key":"ref13","article-title":"Efficient estimation of word representations in vector space","volume":"abs 1301 3781","author":"mikolov","year":"2013","journal-title":"Comput Sci"},{"key":"ref14","first-page":"143","article-title":"A probabilistic analysis of the Rocchio algorithm with TFIDF for text categorization","author":"joachims","year":"1996","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref15","first-page":"413","article-title":"Intrusion detection using a hybrid support vector machine based on entropy and TF-IDF","volume":"4","author":"chen","year":"2008","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2015.7259377"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3171592.3171593"},{"key":"ref18","article-title":"Word2vec parameter learning explained","volume":"abs 1411 2738","author":"rong","year":"2014","journal-title":"Comput Sci"},{"key":"ref19","first-page":"251","article-title":"Webshell detection method based on correlation analysis","volume":"4","author":"ying","year":"2018","journal-title":"Journal of Inf Sec Research"},{"key":"ref28","first-page":"4","article-title":"Research of Linux webshell detection based on SVM classifier","volume":"5","author":"meng","year":"2014","journal-title":"Netinfo Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2016.2584107"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3194452.3194470"},{"key":"ref3","author":"scott","year":"2011","journal-title":"Web Shell Detection Using NeoPI"},{"key":"ref6","first-page":"601","article-title":"LSTM neural networks for language modeling","author":"sundermeyer","year":"2012","journal-title":"Proc INTERSPEECH"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"ref5","first-page":"69","article-title":"Deep convolutional neural networks for sentiment analysis of short texts","author":"dos","year":"2014","journal-title":"Proc 25th Int Conf Comput Linguistics Tech Papers"},{"key":"ref8","year":"2018","journal-title":"Official Website"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref2","first-page":"924","article-title":"Black box detection of webshell based on support vector machine","volume":"47","author":"ye","year":"2015","journal-title":"J Nanjing Univ Aeronaut Astronaut"},{"key":"ref9","first-page":"492","volume":"473","author":"rivest","year":"1992","journal-title":"The MD5 Message-Digest Algorithm"},{"key":"ref1","year":"2017","journal-title":"China Internet network security report"},{"key":"ref20","first-page":"184","article-title":"Syntactic n-gram collection from a large-scale corpus of Internet finnish","volume":"268","author":"laippala","year":"2014","journal-title":"Human Language Technologies - The Baltic Perspective Proceedings of the 6th International Conference Baltic HLT"},{"key":"ref22","first-page":"807","article-title":"Rectified linear units improve restricted Boltzmann machines","author":"nair","year":"2010","journal-title":"Proc 27th Int Conf Mach Learn"},{"key":"ref21","first-page":"649","article-title":"Character-level convolutional networks for text classification","author":"zhang","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref24","first-page":"212","article-title":"Improving neural networks by preventing co-adaptation of feature detectors","volume":"3","author":"hinton","year":"2012","journal-title":"Comput Sci"},{"key":"ref23","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"Proc Int Conf Mach Learn (JMLR)"},{"key":"ref26","article-title":"Detection method of webshell based on Simhash algorithm","volume":"3","author":"kong","year":"2018","journal-title":"Commun Technol"},{"key":"ref25","article-title":"PHP webshell real-time dynamic detection","author":"du","year":"2014","journal-title":"Netw Secur Technol Appl"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08540857.pdf?arnumber=8540857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:15:45Z","timestamp":1642004145000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8540857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2882517","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}