{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:41Z","timestamp":1750220561489,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,28]]},"DOI":"10.1145\/3469213.3471388","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T04:19:38Z","timestamp":1629346778000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research and application of internal malicious code threat detection system"],"prefix":"10.1145","author":[{"given":"Zhang","family":"Xiaojun","sequence":"first","affiliation":[{"name":"Beijing Aerospace Control Center, China"}]},{"given":"Li","family":"Yingcai","sequence":"additional","affiliation":[{"name":"Beijing Institute of Space Mechanism &amp; Elctricity, China"}]},{"given":"Zhang","family":"Fuqiang","sequence":"additional","affiliation":[{"name":"Beijing Aerospace Control Center, China"}]},{"given":"Zhang","family":"Qian","sequence":"additional","affiliation":[{"name":"Beijing Aerospace Control Center, China"}]},{"given":"Han","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Aerospace Control Center, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Zhang Qunling.Design and Test of Malicious Code Detection system [D]. Beijing:Beijing University of Posts and Telecommunications 2012.  Zhang Qunling.Design and Test of Malicious Code Detection system [D]. Beijing:Beijing University of Posts and Telecommunications 2012."},{"key":"e_1_3_2_1_2_1","volume-title":"Detecting distributed denial of service attacks using source IP address monitoring","author":"Tao","year":"2004","unstructured":"Tao P, Leckie C, Ramamohanarao K. Detecting distributed denial of service attacks using source IP address monitoring . 2004 . http:\/\/www.ee.mu.oz.aupgradtaopresearchdetection.pdf. Tao P, Leckie C, Ramamohanarao K. Detecting distributed denial of service attacks using source IP address monitoring. 2004. http:\/\/www.ee.mu.oz.aupgradtaopresearchdetection.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"Zhang Erchao.System Security Technology Research [D].Beijing:Beijing University of posts and Telecommunications 2013.  Zhang Erchao.System Security Technology Research [D].Beijing:Beijing University of posts and Telecommunications 2013."},{"issue":"2","key":"e_1_3_2_1_4_1","volume":"17","author":"Zhixin Sun","year":"2006","unstructured":"Sun Zhixin , Tang Yiwei , Zhang Wei , etc. Router abnormal traffic filtering algorithm based on feature clustering , Journal of Software , 2006 , 17 ( 2 ). Sun Zhixin, Tang Yiwei, Zhang Wei, etc. Router abnormal traffic filtering algorithm based on feature clustering, Journal of Software, 2006, 17(2).","journal-title":"Journal of Software"},{"issue":"10","key":"e_1_3_2_1_5_1","volume":"21","author":"Yingwu Zhu","year":"2010","unstructured":"Zhu Yingwu , Yang Jiahai , Zhang Jinxiang . Anomaly detection based on traffic information structure , Journal of Software , 2010 , 21 ( 10 ). Zhu Yingwu, Yang Jiahai, Zhang Jinxiang. Anomaly detection based on traffic information structure, Journal of Software, 2010, 21(10).","journal-title":"Journal of Software"}],"event":{"name":"ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems","acronym":"ICAIIS 2021","location":"Chongqing China"},"container-title":["2021 2nd International Conference on Artificial Intelligence and Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469213.3471388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3469213.3471388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:32Z","timestamp":1750195712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469213.3471388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":5,"alternative-id":["10.1145\/3469213.3471388","10.1145\/3469213"],"URL":"https:\/\/doi.org\/10.1145\/3469213.3471388","relation":{},"subject":[],"published":{"date-parts":[[2021,5,28]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}