{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:39:16Z","timestamp":1725525556856},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/candar.2017.19","type":"proceedings-article","created":{"date-parts":[[2018,4,26]],"date-time":"2018-04-26T18:46:11Z","timestamp":1524768371000},"page":"337-343","source":"Crossref","is-referenced-by-count":2,"title":["Is Emulating \"Binary Grep in Eyes\" Possible with Machine Learning?"],"prefix":"10.1109","author":[{"given":"Mamoru","family":"Mimura","sequence":"first","affiliation":[]},{"given":"Yuhei","family":"Otsubo","sequence":"additional","affiliation":[]},{"given":"Hidema","family":"Tanaka","sequence":"additional","affiliation":[]},{"given":"Atsuhiro","family":"Goto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Chainer","year":"0","key":"ref10"},{"journal-title":"Analyzing MSOffice malware with OfficeMalScanner","year":"0","author":"boldewin","key":"ref11"},{"journal-title":"VirusTotal","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2016.17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref6","first-page":"61","article-title":"DL4MD: A Deep Learning Framework for Intelligent Malware Detection","author":"hardy","year":"2016","journal-title":"Proc 2016 International Conference on Data Mining"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841778"},{"key":"ref7","first-page":"3901","article-title":"Application of Deep Belief Networks for Opcode Based Malware Detection","author":"ding","year":"2015","journal-title":"Proc 2016 International Joint Conference on Neural Networks"},{"key":"ref2","first-page":"610","article-title":"Recognizing Functions in Binaries with Neural Networks","author":"chul","year":"2015","journal-title":"Proc 24th USENIX Security Sym-nosium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"journal-title":"Proceedings of International Conference on Learning Representations","article-title":"Adam: A Method for Stochastic Optimization","year":"2015","author":"kingma","key":"ref9"}],"event":{"name":"2017 Fifth International Symposium on Computing and Networking (CANDAR)","start":{"date-parts":[[2017,11,19]]},"location":"Aomori","end":{"date-parts":[[2017,11,22]]}},"container-title":["2017 Fifth International Symposium on Computing and Networking (CANDAR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8338657\/8345393\/08345454.pdf?arnumber=8345454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T20:01:11Z","timestamp":1526932871000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8345454\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/candar.2017.19","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}