{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T17:25:22Z","timestamp":1770398722945,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072131"],"award-info":[{"award-number":["62072131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972106"],"award-info":[{"award-number":["61972106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key R&amp;D Program of Guangdong Province","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"Science and Technology Projects in Guangzhou","award":["202102010442"],"award-info":[{"award-number":["202102010442"]}]},{"name":"National Key Research and Development Program of China","award":["2019QY1406"],"award-info":[{"award-number":["2019QY1406"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["202032854"],"award-info":[{"award-number":["202032854"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1109\/tnse.2022.3155187","type":"journal-article","created":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T21:48:33Z","timestamp":1646776113000},"page":"2731-2739","source":"Crossref","is-referenced-by-count":28,"title":["A Malicious Mining Code Detection Method Based on Multi-Features Fusion"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6381-1984","authenticated-orcid":false,"given":"Shudong","family":"Li","sequence":"first","affiliation":[{"name":"Cyberspace Institute of Advance Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Laiyuan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advance Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Qianqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advance Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8182-2852","authenticated-orcid":false,"given":"Zhen","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering and the Center for Optical Imagery Analysis and Learning (OPTIMAL), Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9409-5359","authenticated-orcid":false,"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advance Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800353"},{"key":"ref35","first-page":"965","article-title":"Feature selection and extraction for malware classification","volume":"31","author":"lin","year":"2015","journal-title":"J Inf Sci Eng"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.future.2018.09.037","article-title":"Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks","volume":"91","author":"gang","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5268"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2728681"},{"key":"ref37","article-title":"DataCon: Multi-domain large-scale competition open data for security research [EB\/OL]","year":"2020"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MWC.2016.7553030","article-title":"Social vehicle swarms: A novel perspective on socially aware vehicular communication architecture","volume":"23","author":"yue","year":"2016","journal-title":"IEEE Wireless Commun"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900053"},{"key":"ref31","first-page":"395","article-title":"Automatic behaviour-based analysis and classification system for malware detection","volume":"2","author":"devesa","year":"0","journal-title":"Proc Int Conf Ent Inform Syst"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.adhoc.2013.08.008","article-title":"Smart Direct-LTE communication: An energy saving perspective","volume":"13","author":"shahid","year":"2014","journal-title":"Ad Hoc Netw"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.03.004"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2674684"},{"key":"ref10","article-title":"NRSMiner: A sophisticated mining botnet","year":"0"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"4902","DOI":"10.1109\/ACCESS.2016.2598736","article-title":"Energy efficient resource allocation in D2D-assisted heterogeneous networks with relays","volume":"4","author":"mudassar","year":"2016","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.future.2018.09.037","article-title":"Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks","volume":"91","author":"gang","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00079"},{"key":"ref18","first-page":"54","article-title":"Detection and prevention of malicious mining behaviors on webpages","volume":"216","author":"qin","year":"2018","journal-title":"Network Security Technology & Application"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0278-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"ref26","first-page":"59","article-title":"Hidden Markov models for malware classification","volume":"11","author":"stamp","year":"2015","journal-title":"J Comput Virol"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2021.102391"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101863"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0800-9"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compeleceng.2019.01.028","article-title":"Data collection using unmanned aerial vehicles for Internet of Things platforms","volume":"75","author":"shidrokh","year":"2019","journal-title":"Comput Elect Eng"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601325"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249229"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946482"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0345-9"},{"key":"ref7","article-title":"BlackBerry mobile website hacked, crooks installed a coinhive&#x2019;s code to mine monero","author":"paganini","year":"0"},{"key":"ref9","article-title":"WaterMiner &#x2013; A new evasive crypto-miner","year":"0"},{"key":"ref4","article-title":"Malicious mining trend report in the first half of 2019","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355576"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9396141"},{"key":"ref5","article-title":"Cryptocurrency mining affects over 500 million people. And they have no idea it is happening","author":"meshkov","year":"0"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/10256239\/09730096.pdf?arnumber=9730096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T19:19:47Z","timestamp":1696879187000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9730096\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":37,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2022.3155187","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}