{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T05:10:11Z","timestamp":1728623411615},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3473021","type":"journal-article","created":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T17:24:00Z","timestamp":1727976240000},"page":"145148-145158","source":"Crossref","is-referenced-by-count":0,"title":["APTracker: A Comprehensive and Analytical Malware Dataset Based on Attribution to APT Groups"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0009-0000-8387-5619","authenticated-orcid":false,"given":"Mohamad","family":"Erfan Mazaheri","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran 19839, Iran"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4723-5793","authenticated-orcid":false,"given":"Alireza","family":"Shameli-Sendi","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran 19839, Iran"}]}],"member":"263","reference":[{"volume-title":"What is Malware? Prevention, Detection and How Attacks Work","year":"2024","author":"Yasar","key":"ref1"},{"volume-title":"What is a Threat Actor? Types & Examples","year":"2024","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68612-7_11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68734-2_15"},{"key":"ref5","first-page":"479","article-title":"Misleading authorship attribution of source code using adversarial learning","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Security)","author":"Quiring"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3292577"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080507"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243738"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943639"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468606"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_3"},{"key":"ref14","article-title":"When coding style survives compilation: De-anonymizing programmers from executable binaries","author":"Caliskan","year":"2015","journal-title":"arXiv:1512.08546"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.03.012"},{"key":"ref16","article-title":"Adversarial binaries for authorship identification","author":"Meng","year":"2018","journal-title":"arXiv:1809.08316"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_10"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9396141"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823152"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3175719"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012907"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4197"},{"volume-title":"APTMalware","year":"2019","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3386581"},{"key":"ref26","article-title":"Identifying authorship style in malicious binaries: Techniques, challenges & datasets","author":"Gray","year":"2021","journal-title":"arXiv:2101.06124"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74753-4_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSC61021.2023.10354155"},{"volume-title":"VX-Underground","year":"2024","key":"ref29"},{"volume-title":"MalwareBazzar","year":"2024","key":"ref30"},{"volume-title":"MITRE ATT&CK","year":"2024","key":"ref31"},{"volume-title":"In The Wild Collection","year":"2024","key":"ref32"},{"volume-title":"APT Groups and Operations","year":"2024","key":"ref33"},{"volume-title":"Malpedia","year":"2024","key":"ref34"},{"volume-title":"APTracker","year":"2024","author":"Mazaheri","key":"ref35"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10704627.pdf?arnumber=10704627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T04:32:40Z","timestamp":1728621160000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10704627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3473021","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}