{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:47:25Z","timestamp":1725734845890},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3195528.3195533","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T09:02:25Z","timestamp":1532336545000},"page":"20-26","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Big data"],"prefix":"10.1145","author":[{"given":"Emmanuel","family":"Masabo","sequence":"first","affiliation":[{"name":"Makerere University, Kampala, Uganda"}]},{"given":"Kyanda Swaib","family":"Kaawaase","sequence":"additional","affiliation":[{"name":"Makerere University, Kampala, Uganda"}]},{"given":"Julianne","family":"Sansa-Otim","sequence":"additional","affiliation":[{"name":"Makerere University, Kampala, Uganda"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_2_1","unstructured":"Brian Bloom. 2012. Big data analytics defining new malware strategy. (2012). https:\/\/www.itworldcanada.com\/article\/ big-data-analytics-defining-new-malware-strategy\/45468 Brian Bloom. 2012. Big data analytics defining new malware strategy. (2012). https:\/\/www.itworldcanada.com\/article\/ big-data-analytics-defining-new-malware-strategy\/45468"},{"volume-title":"Deep Learning for Classification of Malware System Call Sequences. AI 2016: Advances in Artificial Intelligence","year":"2016","author":"Bojan Kolosnjaji","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Tony Bradley. 2012. FireAMP Fights Malware with Big Data Analytics. (2012). Tony Bradley. 2012. FireAMP Fights Malware with Big Data Analytics. (2012)."},{"key":"e_1_3_2_1_5_1","unstructured":"Jason Brownlee. 2016. How To Prepare Your Data For Machine Learning in Python with Scikit-Learn. (2016). https:\/\/machinelearningmastery.com\/prepare-data-machine-learning-python-scikit-learn\/ Jason Brownlee. 2016. How To Prepare Your Data For Machine Learning in Python with Scikit-Learn. (2016). https:\/\/machinelearningmastery.com\/prepare-data-machine-learning-python-scikit-learn\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Ashley DeVan. 2016. The 7 V's of Big Data. (2016). https:\/\/www.impactradius.com\/blog\/7-vs-big-data\/ Ashley DeVan. 2016. The 7 V's of Big Data. (2016). https:\/\/www.impactradius.com\/blog\/7-vs-big-data\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30085-3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_20"},{"key":"e_1_3_2_1_9_1","unstructured":"IBM. 2013. Smarter security intelligence. (2013) 1--8. IBM. 2013. Smarter security intelligence. (2013) 1--8."},{"key":"e_1_3_2_1_10_1","unstructured":"Ibm.com. {n. d.}. Big Data Analytics | IBM Analytics. ({n. d.}). https:\/\/www.ibm.com\/analytics\/hadoop\/big-data-analytics Ibm.com. {n. d.}. Big Data Analytics | IBM Analytics. ({n. d.}). https:\/\/www.ibm.com\/analytics\/hadoop\/big-data-analytics"},{"key":"e_1_3_2_1_11_1","unstructured":"SAS Insights. {n. d.}. What is Big Data and why it matters. ({n. d.}). https:\/\/www.sas.com\/en{_}us\/insights\/big-data\/what-is-big-data.html SAS Insights. {n. d.}. What is Big Data and why it matters. ({n. d.}). https:\/\/www.sas.com\/en{_}us\/insights\/big-data\/what-is-big-data.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_21"},{"key":"e_1_3_2_1_13_1","unstructured":"Krmaxwell. 2015. A toolto retrieve malware directly from the source for security researchers. (2015). https:\/\/github.com\/krmaxwell\/maltrieve Krmaxwell. 2015. A toolto retrieve malware directly from the source for security researchers. (2015). https:\/\/github.com\/krmaxwell\/maltrieve"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3021460.3021485"},{"volume-title":"MCSMGS: Malware Classification Model Based on Deep Learning. 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","year":"2017","author":"Meng Xi","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Marco Ramilli. 2016. Malware Training Sets: a machine learning dataset for everyone. (2016). http:\/\/marcoramilli.blogspot.it\/2016\/12\/malware-training-sets-machine-learning.html Marco Ramilli. 2016. Malware Training Sets: a machine learning dataset for everyone. (2016). http:\/\/marcoramilli.blogspot.it\/2016\/12\/malware-training-sets-machine-learning.html"},{"key":"e_1_3_2_1_17_1","unstructured":"Matilda Rhode Pete Burnap and Kevin Jones. 2017. Early Stage Malware Prediction Using Recurrent Neural Networks. December(2017) 1--28. arXiv:1708.03513 http:\/\/arxiv.org\/abs\/1708.03513 Matilda Rhode Pete Burnap and Kevin Jones. 2017. Early Stage Malware Prediction Using Recurrent Neural Networks. December(2017) 1--28. arXiv:1708.03513 http:\/\/arxiv.org\/abs\/1708.03513"},{"volume-title":"Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning. 2016 IEEE Global Communications Conference (GLOBECOM)","year":"2016","author":"Shibahara Toshiki","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"TechSpective. 2015. Big data analytics leads the way for next-gen malware protection. (2015). https:\/\/techspective.net\/2015\/04\/27\/big-data-analytics-leads-the-way-for-next-gen-malware-protection\/ TechSpective. 2015. Big data analytics leads the way for next-gen malware protection. (2015). https:\/\/techspective.net\/2015\/04\/27\/big-data-analytics-leads-the-way-for-next-gen-malware-protection\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-016-0022-0"},{"key":"e_1_3_2_1_21_1","unstructured":"Jake VanderPals. 2016. Python Data Science Handbook | Python Data Science Handbook. O'Reilly Sebastopol CA. 541 pages. https:\/\/jakevdp.github.io\/PythonDataScienceHandbook\/index.html Jake VanderPals. 2016. Python Data Science Handbook | Python Data Science Handbook. O'Reilly Sebastopol CA. 541 pages. https:\/\/jakevdp.github.io\/PythonDataScienceHandbook\/index.html"},{"key":"e_1_3_2_1_22_1","unstructured":"VX-Collection. 2016. VX Heaven windows virus collection. (2016). https:\/\/archive.org\/details\/vxheaven-windows-virus-collection VX-Collection. 2016. VX Heaven windows virus collection. (2016). https:\/\/archive.org\/details\/vxheaven-windows-virus-collection"},{"volume-title":"PhD Forum: Deep Learning-Based Real-Time Malware Detection with Multi-Stage Analysis. 2017 IEEE International Conference on Smart Computing, SMARTCOMP 2017","year":"2017","author":"Yuan Xiaoyong","key":"e_1_3_2_1_23_1"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 2018 International Conference on Software Engineering in Africa"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3195528.3195533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T23:31:28Z","timestamp":1673479888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195528.3195533"}},"subtitle":["deep learning for detecting malware"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":22,"alternative-id":["10.1145\/3195528.3195533","10.1145\/3195528"],"URL":"https:\/\/doi.org\/10.1145\/3195528.3195533","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}