{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:33:36Z","timestamp":1730320416120,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230835","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["An investigation of a deep learning based malware detection system"],"prefix":"10.1145","author":[{"given":"Mohit","family":"Sewak","sequence":"first","affiliation":[{"name":"BITS, Pilani, Department of CS & IS, Goa Campus, Zuarinagar Goa, India"}]},{"given":"Sanjay K.","family":"Sahay","sequence":"additional","affiliation":[{"name":"BITS, Pilani, Department of CS & IS, Goa Campus, Zuarinagar Goa, India"}]},{"given":"Hemant","family":"Rathore","sequence":"additional","affiliation":[{"name":"BITS, Pilani, Department of CS & IS, Goa Campus, Zuarinagar Goa, India"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2012 Date last accessed 15-July-2014. Malicia project. http:\/\/malicia-project.com. (2012 Date last accessed 15-July-2014). 2012 Date last accessed 15-July-2014. Malicia project. http:\/\/malicia-project.com. (2012 Date last accessed 15-July-2014)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0105-1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"volume-title":"2015 International Joint Conference on Neural Networks (IJCNN). 1--8.","author":"David O. E.","key":"e_1_3_2_1_6_1","unstructured":"O. E. David and N. S. Netanyahu . 2015. DeepSign: Deep learning for automatic malware signature generation and classification . In 2015 International Joint Conference on Neural Networks (IJCNN). 1--8. O. E. David and N. S. Netanyahu. 2015. DeepSign: Deep learning for automatic malware signature generation and classification. In 2015 International Joint Conference on Neural Networks (IJCNN). 1--8."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"e_1_3_2_1_9_1","volume-title":"Deep Learning for Classification of Malware System Call Sequences. In AI 2016: Advances in Artificial Intelligence, Byeong Ho Kang and Quan Bai (Eds.). 137--149","author":"Kolosnjaji Bojan","year":"2016","unstructured":"Bojan Kolosnjaji , Apostolis Zarras , George Webster , and Claudia Eckert . 2016 . Deep Learning for Classification of Malware System Call Sequences. In AI 2016: Advances in Artificial Intelligence, Byeong Ho Kang and Quan Bai (Eds.). 137--149 . Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert. 2016. Deep Learning for Classification of Malware System Call Sequences. In AI 2016: Advances in Artificial Intelligence, Byeong Ho Kang and Quan Bai (Eds.). 137--149."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_1_11_1","first-page":"965","article-title":"Feature Selection and Extraction for Malware Classification","volume":"31","author":"Lin Chih-Ta","year":"2015","unstructured":"Chih-Ta Lin , Nai-Jian Wang , Han Xiao , and Claudia Eckert . 2015 . Feature Selection and Extraction for Malware Classification . Journal of Information Science and Engineering 31 (2015), 965 -- 992 . Chih-Ta Lin, Nai-Jian Wang, Han Xiao, and Claudia Eckert. 2015. Feature Selection and Extraction for Malware Classification. Journal of Information Science and Engineering 31 (2015), 965--992.","journal-title":"Journal of Information Science and Engineering"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570109"},{"volume-title":"2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 1916--1920","author":"Pascanu R.","key":"e_1_3_2_1_13_1","unstructured":"R. Pascanu , J. W. Stokes , H. Sanossian , M. Marinescu , and A. Thomas . 2015. Malware classification with recurrent networks . In 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 1916--1920 . R. Pascanu, J. W. Stokes, H. Sanossian, M. Marinescu, and A. Thomas. 2015. Malware classification with recurrent networks. In 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 1916--1920."},{"key":"e_1_3_2_1_14_1","first-page":"421","article-title":"Improving the Detection Accuracy of Unknown Malware by Partitioning the Executables in Groups. Advanced Computing and Communication Technologies","volume":"452","author":"Sahay Sanjay K.","year":"2016","unstructured":"Sanjay K. Sahay and Ashu Sharma . 2016 . Improving the Detection Accuracy of Unknown Malware by Partitioning the Executables in Groups. Advanced Computing and Communication Technologies , Springer 452 (2016), 421 -- 431 . Sanjay K. Sahay and Ashu Sharma. 2016. Improving the Detection Accuracy of Unknown Malware by Partitioning the Executables in Groups. Advanced Computing and Communication Technologies, Springer 452 (2016), 421--431.","journal-title":"Springer"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_18_1","unstructured":"Ashu Sharma and S.K. Sahay. 2018 (In Press). Group-wise classification approach to improve Android malicious apps detection accuracy. International Journal of Network Security (2018 (In Press)). Ashu Sharma and S.K. Sahay. 2018 (In Press). Group-wise classification approach to improve Android malicious apps detection accuracy. International Journal of Network Security (2018 (In Press))."},{"key":"e_1_3_2_1_19_1","first-page":"48","article-title":"Detecting internet worms using data mining techniques","volume":"6","author":"Siddiqui Muazzam","year":"2008","unstructured":"Muazzam Siddiqui , Morgan C Wang , and Joohan Lee . 2008 . Detecting internet worms using data mining techniques . Journal of Systemics, Cybernetics and Informatics 6 , 6 (2008), 48 -- 53 . Muazzam Siddiqui, Morgan C Wang, and Joohan Lee. 2008. Detecting internet worms using data mining techniques. Journal of Systemics, Cybernetics and Informatics 6, 6 (2008), 48--53.","journal-title":"Journal of Systemics, Cybernetics and Informatics"},{"key":"e_1_3_2_1_20_1","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava Nitish","year":"2015","unstructured":"Nitish Srivastava , Geoffrey Hinton , Alex Krizhevsky , Ilya Sutskever , and Ruslan Salakhutdinov . 2015 . Dropout: a simple way to prevent neural networks from overfitting . The Journal of Machine Learning Research 15 , 1 (2015), 1929 -- 1958 . Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2015. Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15, 1 (2015), 1929--1958.","journal-title":"The Journal of Machine Learning Research"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1599272.1599278"},{"key":"e_1_3_2_1_22_1","volume-title":"A multi-task learning model for malware classification with useful file access pattern from API call sequence. CoRR abs\/1610.05945","author":"Wang Xin","year":"2016","unstructured":"Xin Wang and Siu-Ming Yiu . 2016. A multi-task learning model for malware classification with useful file access pattern from API call sequence. CoRR abs\/1610.05945 ( 2016 ). Xin Wang and Siu-Ming Yiu. 2016. A multi-task learning model for malware classification with useful file access pattern from API call sequence. CoRR abs\/1610.05945 (2016)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T02:36:13Z","timestamp":1693967773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":23,"alternative-id":["10.1145\/3230833.3230835","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230835","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}