{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T02:48:43Z","timestamp":1769395723761,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T00:00:00Z","timestamp":1520812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,12]]},"DOI":"10.1145\/3194452.3194470","type":"proceedings-article","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T12:24:55Z","timestamp":1527596695000},"page":"52-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Detecting Webshell Based on Random Forest with FastText"],"prefix":"10.1145","author":[{"given":"Yong","family":"Fang","sequence":"first","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, Sichuan, P.R.China"}]},{"given":"Yaoyao","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Electronics and Information Engineering, Sichuan University, Chengdu, Sichuan, P.R.China"}]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, Sichuan, P.R.China"}]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, Sichuan, P.R.China"}]}],"member":"320","published-online":{"date-parts":[[2018,3,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Acunetix Web Application Vulnerability Report 2016. {EB\/OL}:https:\/\/d3eaqdewfg2crq.cloudfront.net\/resources\/acunetix-web-application-vulnerability-report-2016.pdf.  Acunetix Web Application Vulnerability Report 2016. {EB\/OL}:https:\/\/d3eaqdewfg2crq.cloudfront.net\/resources\/acunetix-web-application-vulnerability-report-2016.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"Scott B. & H. Ben. Web Shell Detection Using NeoPI {EB\/OL}:http:\/\/resources.infosecinstitute.com\/web-shell-detection\/.  Scott B. & H. Ben. Web Shell Detection Using NeoPI {EB\/OL}:http:\/\/resources.infosecinstitute.com\/web-shell-detection\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Journal of Network New Media","author":"Jiankang H U","year":"2012","unstructured":"Jiankang H U , Zhen X U , Duohe M A , Research of Webshell Detection Based on Decision Tree{J} . Journal of Network New Media , 2012 . Jiankang H U, Zhen X U, Duohe M A, et al. Research of Webshell Detection Based on Decision Tree{J}. Journal of Network New Media, 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"Black box detection of webshell based on support vector machine {J}","author":"Ye J","year":"2015","unstructured":"F Ye , J Gong , W Yang . Black box detection of webshell based on support vector machine {J} . Journal of Nanjing University of Aeronautics & Astronautics , 2015 . F Ye, J Gong, W Yang. Black box detection of webshell based on support vector machine {J}. Journal of Nanjing University of Aeronautics & Astronautics, 2015."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2015.7335066"},{"key":"e_1_3_2_1_6_1","volume-title":"Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE","author":"Tu T D","unstructured":"Tu T D , Guang C , Xiaojun G , Webshell detection techniques in web applications{C}\/\/Computing , Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE , 2014: 1--7. Tu T D, Guang C, Xiaojun G, et al. Webshell detection techniques in web applications{C}\/\/Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE, 2014: 1--7."},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis{C}\/\/Information Security for South Africa (ISSA), 2015","volume":"2015","author":"Wrench P M","unstructured":"Wrench P M , Irwin B V W . Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis{C}\/\/Information Security for South Africa (ISSA), 2015 . IEEE , 2015 : 1 -- 8 . Wrench P M, Irwin B V W. Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis{C}\/\/Information Security for South Africa (ISSA), 2015. IEEE, 2015: 1--8.","journal-title":"IEEE"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3058060.3058083"},{"key":"e_1_3_2_1_9_1","unstructured":"L Shi Y Fang. Webshell Detection Method Research Based on Web Log {J}.  L Shi Y Fang. Webshell Detection Method Research Based on Web Log {J}."},{"key":"e_1_3_2_1_10_1","unstructured":"Journal of Information Security Research 2016.  Journal of Information Security Research 2016."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882992"},{"key":"e_1_3_2_1_12_1","unstructured":"Package Information {EB\/OL}: https:\/\/pecl.php.net\/package\/vld  Package Information {EB\/OL}: https:\/\/pecl.php.net\/package\/vld"},{"key":"e_1_3_2_1_13_1","volume-title":"Bag of tricks for efficient text classification {J}. arXiv preprint arXiv:1607.01759","author":"Joulin A","year":"2016","unstructured":"Joulin A , Grave E , Bojanowski P , Bag of tricks for efficient text classification {J}. arXiv preprint arXiv:1607.01759 , 2016 . Joulin A, Grave E, Bojanowski P, et al. Bag of tricks for efficient text classification {J}. arXiv preprint arXiv:1607.01759, 2016."},{"key":"e_1_3_2_1_14_1","volume-title":"Convolutional neural networks for sentence classification {J}. arXiv preprint arXiv:1408.5882","author":"Kim Y.","year":"2014","unstructured":"Kim Y. Convolutional neural networks for sentence classification {J}. arXiv preprint arXiv:1408.5882 , 2014 . Kim Y. Convolutional neural networks for sentence classification {J}. arXiv preprint arXiv:1408.5882, 2014."},{"key":"e_1_3_2_1_15_1","volume-title":"Wiener M. Classification and regression by randomForest{J}. R news","author":"Liaw A","year":"2002","unstructured":"Liaw A , Wiener M. Classification and regression by randomForest{J}. R news , 2002 , 2(3): 18--22. Liaw A, Wiener M. Classification and regression by randomForest{J}. R news, 2002, 2(3): 18--22."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-016-0027-2"},{"key":"e_1_3_2_1_17_1","unstructured":"Webshell-sample {EB\/OL}: https:\/\/github.com\/ysrc\/webshellsample\/tree\/master\/-php  Webshell-sample {EB\/OL}: https:\/\/github.com\/ysrc\/webshellsample\/tree\/master\/-php"},{"key":"e_1_3_2_1_18_1","unstructured":"PHP-backdoors {EB\/OL}: https:\/\/github.com\/bartblaze\/PHP-backdoors.  PHP-backdoors {EB\/OL}: https:\/\/github.com\/bartblaze\/PHP-backdoors."}],"event":{"name":"ICCAI 2018: 2018 International Conference on Computing and Artificial Intelligence","location":"Chengdu China","acronym":"ICCAI 2018","sponsor":["Sichuan University"]},"container-title":["Proceedings of the 2018 International Conference on Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194452.3194470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3194452.3194470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:46Z","timestamp":1750213606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194452.3194470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,12]]},"references-count":18,"alternative-id":["10.1145\/3194452.3194470","10.1145\/3194452"],"URL":"https:\/\/doi.org\/10.1145\/3194452.3194470","relation":{},"subject":[],"published":{"date-parts":[[2018,3,12]]},"assertion":[{"value":"2018-03-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}