{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:11:23Z","timestamp":1760303483632,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032080660","type":"print"},{"value":"9783032080677","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08067-7_9","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:34Z","timestamp":1760301454000},"page":"167-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["contrastBERT: Behavioral Anomaly Detection for\u00a0Malware Using Contrastive Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4391-0269","authenticated-orcid":false,"given":"John","family":"Carter","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6354-4281","authenticated-orcid":false,"given":"Spiros","family":"Mancoridis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8178-8463","authenticated-orcid":false,"given":"Pavlos","family":"Protopapas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7820-3927","authenticated-orcid":false,"given":"Brian","family":"Mitchell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"9_CR1","unstructured":"Ali, T., Kostakos, P.: HuntGPT: integrating machine learning-based anomaly detection and explainable AI with large language models (LLMs) (2023). https:\/\/arxiv.org\/abs\/2309.16021"},{"key":"9_CR2","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate (2016). https:\/\/arxiv.org\/abs\/1409.0473"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Biradar, K.M., Mandal, M., Dube, S., Vipparthi, S.K., Tyagi, D.K.: Triplet-set feature proximity learning for video anomaly detection. Image Vision Comput. 150, 105205 (2024). https:\/\/doi.org\/10.1016\/j.imavis.2024.105205, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S026288562400310X","DOI":"10.1016\/j.imavis.2024.105205"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Carter, J., Mancoridis, S., Protopapas, P.: sysBERT: improved behavioral malware detection using BERT trained on sys2vec embeddings. In: Proceedings of the 57th Hawaii International Conference on System Sciences, pp. 7122\u20137131 (2025). https:\/\/doi.org\/10.24251\/HICSS.2025.851","DOI":"10.24251\/HICSS.2025.851"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Carter, J., Mancoridis, S., Protopapas, P., Galinkin, E.: Behavioral malware detection using a language model classifier trained on sys2vec embeddings. In: Proceedings of the 56th Hawaii International Conference on System Sciences, pp. 7582\u20137591 (2024). https:\/\/doi.org\/10.24251\/HICSS.2024.911","DOI":"10.24251\/HICSS.2024.911"},{"key":"9_CR6","unstructured":"Contributors, P.: torch.nn.tripletmarginloss. https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.TripletMarginLoss.html. Accessed 14 Apr 2025"},{"key":"9_CR7","unstructured":"Contributors, P.: torch.nn.tripletmarginwithdistanceloss. https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.TripletMarginWithDistanceLoss.html. Accessed 14 Apr 2025"},{"key":"9_CR8","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. CoRR abs\/1810.04805 (2018). http:\/\/arxiv.org\/abs\/1810.04805"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-030-01261-8_28","volume-title":"Computer Vision \u2013 ECCV 2018","author":"X Dong","year":"2018","unstructured":"Dong, X., Shen, J.: Triplet loss in siamese network for object tracking. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11217, pp. 472\u2013488. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01261-8_28"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Elhafsi, A., Sinha, R., Agia, C., Shah, A., Vorobeychik, Y., Sanders, W.H.: Semantic anomaly detection with large language models. Auton. Rob. 47, 1035\u20131055 (2023). https:\/\/doi.org\/10.1007\/s10514-023-10132-6","DOI":"10.1007\/s10514-023-10132-6"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-022-00424-3","volume":"19","author":"AS Kale","year":"2023","unstructured":"Kale, A.S., Pandya, V., Troia, F., Stamp, M.: Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. J. Comput. Virol. Hacking Tech. 19(1), 1\u201316 (2023). https:\/\/doi.org\/10.1007\/s11416-022-00424-3","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"9_CR12","unstructured":"Liu, Y., et al.: RoBERTa: a robustly optimized BERT pretraining approach (2019). https:\/\/arxiv.org\/abs\/1907.11692"},{"key":"9_CR13","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space (2013). https:\/\/arxiv.org\/abs\/1301.3781"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Mitchell, B.S., Chandnani, A., Carter, J., Roumelioti, D., Mancoridis, S.: Malware detection in cloud native environments. In: Proceedings of the 2024 Artificial Intelligence and Cloud Computing Conference (AICCC 2024), Tokyo, Japan (2024)","DOI":"10.1145\/3719384.3719465"},{"key":"9_CR15","doi-asserted-by":"publisher","unstructured":"Natsos, D., Symeonidis, A.L.: Transformer-based malware detection using process resource utilization metrics. Results Eng. 25, 104250 (2025). https:\/\/doi.org\/10.1016\/j.rineng.2025.104250, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2590123025003366","DOI":"10.1016\/j.rineng.2025.104250"},{"key":"9_CR16","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Qiu, Y., Misu, T., Busso, C.: Use of triplet-loss function to improve driving anomaly detection using conditional generative adversarial network. In: 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC), pp.\u00a01\u20137 (2020). https:\/\/doi.org\/10.1109\/ITSC45102.2020.9294562","DOI":"10.1109\/ITSC45102.2020.9294562"},{"key":"9_CR18","unstructured":"Rehurek, R., Sojka, P.: Gensim\u2013python framework for vector space modelling. NLP Centre, Faculty of Informatics, Masaryk University, Brno, Czech Republic, vol. 3, no. 2 (2011)"},{"key":"9_CR19","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter (2020). https:\/\/arxiv.org\/abs\/1910.01108"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Santhanam, K., Khattab, O., Saad-Falcon, J., Potts, C., Zaharia, M.: ColBERTv2: effective and efficient retrieval via lightweight late interaction (2022). https:\/\/arxiv.org\/abs\/2112.01488","DOI":"10.18653\/v1\/2022.naacl-main.272"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815\u2013823 (2015). https:\/\/doi.org\/10.1109\/CVPR.2015.7298682","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"9_CR22","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS 2017, pp. 6000\u20136010. Curran Associates Inc., Red Hook (2017)"},{"key":"9_CR23","unstructured":"Wolf, T., et al.: HuggingFace\u2019s transformers: state-of-the-art natural language processing. CoRR abs\/1910.03771 (2019). http:\/\/arxiv.org\/abs\/1910.03771"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Zhao, W., Wu, J., Meng, Z.: AppPoet: large language model based android malware detection via multi-view prompt engineering (2024). https:\/\/arxiv.org\/abs\/2404.18816","DOI":"10.1016\/j.eswa.2024.125546"}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08067-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:37Z","timestamp":1760301457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08067-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032080660","9783032080677"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08067-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}