{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T16:35:48Z","timestamp":1764002148123,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319686110"},{"type":"electronic","value":"9783319686127"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68612-7_11","type":"book-chapter","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T11:31:17Z","timestamp":1508844677000},"page":"91-99","source":"Crossref","is-referenced-by-count":28,"title":["DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks"],"prefix":"10.1007","author":[{"given":"Ishai","family":"Rosenberg","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Sicard","sequence":"additional","affiliation":[]},{"given":"Eli","family":"David","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,25]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","first-page":"S94","DOI":"10.1016\/j.diin.2014.03.012","volume":"11","author":"S Alrabaee","year":"2014","unstructured":"Alrabaee, S., Saleem, N., Preda, S., Wang, L., Debbabi, M.: Oba2: an onion approach to binary code authorship attribution. Digit. Invest. 11, S94\u2013S103 (2014)","journal-title":"Digit. Invest."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Alrabaee, S., Shirani, P., Debbabi, M., Wang, L.: On the feasibility of malware authorship attribution. arXiv preprint arXiv:1701.02711 (2017)","DOI":"10.1007\/978-3-319-51966-1_17"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Bencsath, B., Pek, G., Buttyan, L., Felegyhazi, M.: The cousins of stuxnet: duqu, flame, and gauss. In: Proceedings of Future Internet (2012)","DOI":"10.3390\/fi4040971"},{"key":"11_CR4","unstructured":"Marquis-Boire, M., Marschalek, M., Guarnieri, C.: Big game hunting: the peculiarities in nation-state malware research. In: Proceedings of Black Hat USA (2015)"},{"key":"11_CR5","unstructured":"Caliskan-Islam, A., Yamaguchi, F., Dauber, E., Harang, R., Rieck, K., Greenstadt, R., Narayanan, A.: When coding style survives compilation: de-anonymizing programmers from executable binaries. arXiv preprint arXiv:1512.08546 (2015)"},{"key":"11_CR6","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert, R., Weston, J., Bottou, L., Karlen, M., Kavukcuoglu, K., Kuksa, P.: Natural language processing (Almost) from scratch. J. Mach. Learn. Res. 12, 2493\u20132537 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"David, O.E., Netanyahu N.S.: DeepSign: deep learning for automatic malware signature generation and classification. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138 (2015)","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"11_CR8","unstructured":"Glorot, X., Bordes, A., Bengio. Y.: Deep sparse rectifier neural networks. In: Proceedings of 14th International Conference on Artificial Intelligence and Statistics, pp. 315\u2013323 (2011)"},{"key":"11_CR9","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A.C., Bengio, Y.: Generative adversarial nets. In: Advances in Neural Information Processing Systems (NIPS), pp. 2672\u20132680 (2014)"},{"key":"11_CR10","unstructured":"Hathaway, O.A., Crootof, R.: The Law of Cyber-Attack. Faculty Scholarship Series. Paper 3852 (2012)"},{"key":"11_CR11","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/S0304-3800(02)00064-9","volume":"154","author":"JD Olden","year":"2002","unstructured":"Olden, J.D., Jackson, D.A.: Illuminating the \u2018black-box\u2019: a randomization approach for understanding variable contributions in artificial neural networks. Ecol. Model. 154, 135\u2013150 (2002)","journal-title":"Ecol. Model."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Pfeffer, A., Call, C., Chamberlain, J., Kellogg, L., Ouellette, J., Patten, T., Zacharias, G., Lakhotia, A., Golconda, S., Bay, J., Hall, R., Scofield, D.: Malware analysis and attribution using genetic information. In: Proceedings of the 7th IEEE International Conference on Malicious and Unwanted Software (2012)","DOI":"10.1109\/MALWARE.2012.6461006"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-23822-2_10","volume-title":"Computer Security \u2013 ESORICS 2011","author":"N Rosenblum","year":"2011","unstructured":"Rosenblum, N., Zhu, X., Miller, B.P.: Who wrote this code? identifying the authors of program binaries. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 172\u2013189. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23822-2_10"},{"key":"11_CR14","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"11_CR15","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538\u2013556 (2009). ISSN 1532\u20132882","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Virvilis N., Gritzalis D.: The big four - what we did wrong in protecting critical ICT infrastructures from advanced persistent threat detection? In: Proceedings of the 8th International Conference on Availability, Reliability & Security, pp. 248\u2013254. IEEE (2013)","DOI":"10.1109\/ARES.2013.32"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","volume-title":"Computer Vision \u2013 ECCV 2014","author":"MD Zeiler","year":"2014","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8689, pp. 818\u2013833. Springer, Cham (2014). doi: 10.1007\/978-3-319-10590-1_53"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68612-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T18:20:56Z","timestamp":1750962056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68612-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319686110","9783319686127"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68612-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}