{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:01:12Z","timestamp":1742936472952,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811078439"},{"type":"electronic","value":"9789811078446"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7844-6_11","type":"book-chapter","created":{"date-parts":[[2018,1,2]],"date-time":"2018-01-02T05:42:22Z","timestamp":1514871742000},"page":"104-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Malware Detection with Convolutional Neural Network Using Hardware Events"],"prefix":"10.1007","author":[{"given":"Wei","family":"Guo","sequence":"first","affiliation":[]},{"given":"Tenghai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jizeng","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,3]]},"reference":[{"key":"11_CR1","unstructured":"The AV-TEST Institute. http:\/\/www.av-test.org\/en\/statistics\/malware\/. Accessed 25 June 2017"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the 1st India Software Engineering Conference, pp. 5\u201314. ACM (2008)","DOI":"10.1145\/1342211.1342215"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Das, S., Xiao, H., Liu, Y., et al.: Online malware defense using attack behavior model. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1322\u20131325. IEEE (2016)","DOI":"10.1109\/ISCAS.2016.7527492"},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"138","DOI":"10.14429\/dsj.66.9701","volume":"66","author":"A Kapoor","year":"2016","unstructured":"Kapoor, A., Dhavale, S.: Control flow graph based multiclass malware detection using bi-normal separation. Def. Sci. J. 66(2), 138\u2013145 (2016)","journal-title":"Def. Sci. J."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Tobiyama, S., Yamaguchi, Y., Shimada, H., et al.: Malware detection with deep neural network using process behavior. In: Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 577\u2013582. IEEE (2016)","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"11_CR6","unstructured":"Intel VTune Amplifier 2016. https:\/\/software.intel.com\/en-us\/intel-vtune-amplifier-xe. Accessed 25 June 2017"},{"key":"11_CR7","unstructured":"Cesare, S., Xiang, Y.: Classification of malware using structured control flow. In: Eighth Australasian Symposium on Parallel and Distributed Computing, pp. 61\u201370. Australian Computer Society, Inc. (2010)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Cesare, S., Xiang, Y.: Malware variant detection using similarity search over sets of control flow graphs. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, vol. 21, pp. 181\u2013189. IEEE (2011)","DOI":"10.1109\/TrustCom.2011.26"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Wu, W.C., Hung, S.H.: DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. In: Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems. pp. 247\u2013252. ACM (2014)","DOI":"10.1145\/2663761.2664223"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Yeh, C.W., Yeh, W.T., Hung, S.H., et al.: Flattened data in convolutional neural networks: using malware detection as case study. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems. pp. 130\u2013135. ACM (2016)","DOI":"10.1145\/2987386.2987406"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TIFS.2015.2491300","volume":"11","author":"S Das","year":"2016","unstructured":"Das, S., Liu, Y., Zhang, W., et al.: Semantics-based online malware detection: towards efficient real-time protection against malware. IEEE Trans. Inf. Forensics Secur. 11(2), 289\u2013302 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-26362-5_1","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"KN Khasawneh","year":"2015","unstructured":"Khasawneh, K.N., Ozsoy, M., Donovick, C., Abu-Ghazaleh, N., Ponomarev, D.: Ensemble learning for low-level hardware-supported malware detection. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 3\u201325. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_1"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-11379-1_6","volume-title":"Research in Attacks, Intrusions and Defenses","author":"A Tang","year":"2014","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, Salvatore J.: Unsupervised anomaly-based malware detection using hardware features. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 109\u2013129. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11379-1_6"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kompalli, S.: Using existing hardware services for malware detection. In: Security and Privacy Workshops (SPW), pp. 204\u2013208. IEEE (2014)","DOI":"10.1109\/SPW.2014.49"},{"key":"11_CR15","unstructured":"Guide, P.: Intel 64 and IA-32 Architectures Software Developers Manual. Volume 3B: System programming Guide, Part 2. Chaps. 18, 19 (2011)"},{"key":"11_CR16","unstructured":"Hqx, https:\/\/code.google.com\/archive\/p\/hqx\/. Accessed 25 June 2017"},{"key":"11_CR17","unstructured":"VirusShare. https:\/\/virusshare.com\/. Accessed 25 June 2017"},{"key":"11_CR18","unstructured":"MiBench Version 1.0. http:\/\/vhosts.eecs.umich.edu\/mibench\/\/. Accessed 25 June 2017"},{"key":"11_CR19","unstructured":"MediaBench Consortium. http:\/\/mathstat.slu.edu\/~fritts\/mediabench\/. Accessed 25 June 2017"},{"key":"11_CR20","unstructured":"Training LeNet on MNIST with Caffe. http:\/\/caffe.berkeleyvision.org\/gathered\/examples\/mnist.html. Accessed 25 June 2017"},{"issue":"8","key":"11_CR21","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2016","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2016)","journal-title":"Pattern Recogn. Lett."}],"container-title":["Communications in Computer and Information Science","Computer Engineering and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7844-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T04:32:58Z","timestamp":1613709178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7844-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811078439","9789811078446"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7844-6_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"3 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCCET","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF National Conference on Computer Engineering and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nccet2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.nccet.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}