{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:27Z","timestamp":1730213727380,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361451","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0355-0361","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Feature Vector for AI-Assisted Windows Malware Detection"],"prefix":"10.1109","author":[{"given":"Le Qi","family":"Yau","sequence":"first","affiliation":[{"name":"Temasek Junior College,Singapore"}]},{"given":"Yik Ting","family":"Lam","sequence":"additional","affiliation":[{"name":"Dunman High School,Singapore"}]},{"given":"Ashwin","family":"Lokesh","sequence":"additional","affiliation":[{"name":"Yishun Innova Junior College"}]},{"given":"Prannaya","family":"Gupta","sequence":"additional","affiliation":[{"name":"NUS High School of Math and Science,Singapore"}]},{"given":"Justin","family":"Lim","sequence":"additional","affiliation":[{"name":"NUS High School of Math and Science,Singapore"}]},{"given":"Ishneet Sukhvinder","family":"Singh","sequence":"additional","affiliation":[{"name":"Temasek Junior College,Singapore"}]},{"given":"Jia-Yi","family":"Loo","sequence":"additional","affiliation":[{"name":"Agency for Science, Technology and Research,Singapore"}]},{"given":"Mao V.","family":"Ngo","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design,Singapore"}]},{"given":"Sin G.","family":"Teo","sequence":"additional","affiliation":[{"name":"Agency for Science, Technology and Research,Singapore"}]},{"given":"Tram","family":"Truong-Huu","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology,Singapore"}]}],"member":"263","reference":[{"volume-title":"What is wannacry ransomware?","year":"2022","author":"Kaspersky","key":"ref1"},{"key":"ref2","article-title":"What is malware analysis? definition, types, stages, and best practices","volume":"1","author":"BasuMallick","year":"2021","journal-title":"Spiceworks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2016070105"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5474"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33488-7_19"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3477997.3478011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427242"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322377"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2910086"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/app9020239"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-020-01588-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152360"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.12.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IESYS.2017.8233569"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"volume-title":"Feature Hashing for Large Scale Multitask Learning","year":"2009","author":"Weinberger","key":"ref20","doi-asserted-by":"crossref","DOI":"10.1145\/1553374.1553516"},{"article-title":"LightGBM: A Highly Efficient Gradient Boosting Decision Tree","volume-title":"Proc. NeurIPS 2017","year":"2017","author":"Ke","key":"ref21"},{"journal-title":"Int. J. Adv. Comput.","article-title":"Random Forest Classifiers: A Survey and Future Research Directions","year":"2013","author":"Bernard","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.285"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.10.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref28","article-title":"EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks","volume":"abs\/1905.11946","author":"Tan","year":"2019","journal-title":"CoRR"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361451.pdf?arnumber=10361451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:32:58Z","timestamp":1705091578000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361451","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}