{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:51:16Z","timestamp":1743155476079,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030368074"},{"type":"electronic","value":"9783030368081"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36808-1_84","type":"book-chapter","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T15:04:08Z","timestamp":1575644648000},"page":"769-778","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Instruction Cognitive One-Shot Malware Outbreak Detection"],"prefix":"10.1007","author":[{"given":"Sean","family":"Park","sequence":"first","affiliation":[]},{"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[]},{"given":"Joarder","family":"Kamruzzaman","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Oliver","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"key":"84_CR1","doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2015)","DOI":"10.1109\/MALWARE.2015.7413680"},{"issue":"4","key":"84_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.icte.2018.10.006","volume":"4","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K.P.: DeepMalNet: evaluating shallow and deep networks for static PE malware detection. ICT Express 4(4), 255\u2013258 (2018)","journal-title":"ICT Express"},{"key":"84_CR3","unstructured":"Anderson, H.S., Kharkar, A., Filar, B., Evans, D., Roth, P.: Learning to evade static PE machine learning malware models via reinforcement learning (2018). arXiv:1801.08917"},{"key":"84_CR4","doi-asserted-by":"crossref","unstructured":"Zak, R., Raff, E., Nicholas, C.: What can N-grams learn for malware detection? In: 2017 12th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2017)","DOI":"10.1109\/MALWARE.2017.8323963"},{"key":"84_CR5","unstructured":"Raff, E., et al.: Malware detection by eating a whole exe. In: Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence (2018)"},{"key":"84_CR6","doi-asserted-by":"crossref","unstructured":"Park, S., Gondal, I., Kamruzzaman, J., Oliver, J.: Generative malware outbreak detection. In: IEEE International Conference on Industry Technology ICIT, Melbourne (2019)","DOI":"10.1109\/ICIT.2019.8754939"},{"key":"84_CR7","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., Frey, B.: Adversarial autoencoders (2015). arXiv:1511.05644"},{"key":"84_CR8","doi-asserted-by":"crossref","unstructured":"Kan, Z., et al.: Towards light-weight deep learning based malware detection. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 1. IEEE (2018)","DOI":"10.1109\/COMPSAC.2018.00092"},{"key":"84_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh, H., et al.: A deep recurrent neural network based approach for internet of things malware threat hunting. Future Gener. Comput. Syst. 85, 88\u201396 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"84_CR10","doi-asserted-by":"publisher","first-page":"S118","DOI":"10.1016\/j.diin.2018.04.024","volume":"26","author":"Q Le","year":"2018","unstructured":"Le, Q., et al.: Deep learning at the shallow end: malware classification for non-domain experts. Digit. Invest. 26, S118\u2013S126 (2018)","journal-title":"Digit. Invest."},{"key":"84_CR11","doi-asserted-by":"crossref","unstructured":"Raff, E., Sylvester, J., Nicholas, C.: Learning the PE header, malware detection with minimal domain knowledge. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. ACM (2017)","DOI":"10.1145\/3128572.3140442"},{"key":"84_CR12","doi-asserted-by":"crossref","unstructured":"Pascanu, R., et al.: Malware classification with recurrent networks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2015)","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"84_CR13","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), 4 November 2010, pp. 297\u2013300. IEEE (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"key":"84_CR14","doi-asserted-by":"crossref","unstructured":"Kolosnjaji, B., et al.: Adversarial malware binaries: evading deep learning for malware detection in executables. In: 2018 26th European Signal Processing Conference (EUSIPCO). IEEE (2018)","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"84_CR15","unstructured":"Grosse, K., et al.: Adversarial perturbations against deep neural networks for malware classification (2016). arXiv preprint arXiv:1606.04435"},{"key":"84_CR16","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems (2014)"},{"key":"84_CR17","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (2017)"},{"key":"84_CR18","unstructured":"Shin, E.C.R., Song, D., Moazzezi, R.: Recognizing functions in binaries with neural networks. In: 24th USENIX Security Symposium (USENIX Security 2015) (2015)"},{"issue":"90","key":"84_CR19","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19(90), 297\u2013301 (1965)","journal-title":"Math. Comput."},{"key":"84_CR20","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Pearson_correlation_coefficient. Accessed 21 Jun 2019"},{"key":"84_CR21","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2014). arXiv preprint arXiv:1412.6980"}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36808-1_84","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:29:44Z","timestamp":1710250184000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-36808-1_84"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030368074","9783030368081"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36808-1_84","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ajiips.com.au\/iconip2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}