{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:46:40Z","timestamp":1730198800951,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/asiajcis.2019.00-12","type":"proceedings-article","created":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T01:53:00Z","timestamp":1568080380000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques"],"prefix":"10.1109","author":[{"given":"Ryo","family":"Ito","sequence":"first","affiliation":[]},{"given":"Mamoru","family":"Mimura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"jbremer cuckoosandbox\/cuckoo","year":"0","key":"ref10"},{"journal-title":"Yet another implementation of peid with yara","year":"0","key":"ref11"},{"journal-title":"Home ffri inc","year":"0","key":"ref12"},{"key":"ref13","article-title":"Datasets for anti-malware research - mws datasets 2018 -","author":"takata","year":"2018","journal-title":"IPSJ SIG Technical Report"},{"journal-title":"Cuckoo Sandbox Automated Malware Analysis","year":"0","key":"ref14"},{"journal-title":"UPX The Ultimate Packer for eXecutables","year":"0","author":"oberhumer","key":"ref15"},{"journal-title":"What is Zeus? A SophosLabs Technical Paper","year":"0","author":"wyke","key":"ref16"},{"journal-title":"Xgboost documentation - xgboost 0 83 dev0 documentation","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1968613.1968704"},{"key":"ref19","first-page":"104","article-title":"Comparison of pattern matching techniques on identification of same family malware","volume":"4","author":"mastjik","year":"2015","journal-title":"International Journal of Information Security Science"},{"key":"ref4","article-title":"Distributed representations of sentences and documents","volume":"abs 1405 4053","author":"le","year":"2014","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00437956.1954.11659520"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref5","first-page":"746","article-title":"Linguistic regularities in continuous space word representations","author":"mikolov","year":"2013","journal-title":"Human Language Technologies Conference of the North American Chapter of the Association of Computational Linguistics Proceedings"},{"journal-title":"Copyright Radim Rehurek gensim","year":"0","key":"ref8"},{"journal-title":"Scikit-Learn","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3022227.3022306"},{"journal-title":"Internet security threat report istr email threats 2018","year":"0","key":"ref1"},{"journal-title":"Windows pc software - free downloads and reviews","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0108-y"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046689"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176335"}],"event":{"name":"2019 14th Asia Joint Conference on Information Security (AsiaJCIS)","start":{"date-parts":[[2019,8,1]]},"location":"Kobe, Japan","end":{"date-parts":[[2019,8,2]]}},"container-title":["2019 14th Asia Joint Conference on Information Security (AsiaJCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8797685\/8826811\/08827005.pdf?arnumber=8827005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:48:10Z","timestamp":1658155690000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8827005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/asiajcis.2019.00-12","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}