{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:50:16Z","timestamp":1761648616191,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_30","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T10:07:57Z","timestamp":1548324477000},"page":"389-402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["DeepMal4J: Java Malware Detection Employing Deep Learning"],"prefix":"10.1007","author":[{"given":"Pallavi Kumari","family":"Jha","sequence":"first","affiliation":[]},{"given":"Prem","family":"Shankar","sequence":"additional","affiliation":[]},{"given":"V. G.","family":"Sujadevi","sequence":"additional","affiliation":[]},{"given":"P.","family":"Prabhaharan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"unstructured":"Kaspersky Security Bulletin 2015. https:\/\/securelist.com\/kaspersky-security-bulletin-2015-overall-statistics-for-2015\/73038\/","key":"30_CR1"},{"unstructured":"Quick Heal Annual Threat Report 2017. http:\/\/dlupdate.quickheal.com\/documents\/other\/Quick_Heal_Annual_Threat_Report_2017.pdf","key":"30_CR2"},{"unstructured":"Watch guard annual security report 2017. https:\/\/media.scmagazine.com\/documents\/306\/wg-threat-reportq1-2017_76417.pdf","key":"30_CR3"},{"doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007. IEEE (2007)","key":"30_CR4","DOI":"10.1109\/ACSAC.2007.4413008"},{"issue":"02","key":"30_CR5","first-page":"56","volume":"5","author":"E Gandotra","year":"2014","unstructured":"Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5(02), 56 (2014)","journal-title":"J. Inf. Secur."},{"unstructured":"Hardy, W., et al.: DL4MD: a deep learning framework for intelligent malwares detection. In: Proceedings of the International Conference on Data Mining (DMIN). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2016)","key":"30_CR6"},{"doi-asserted-by":"crossref","unstructured":"Pascanu, R., et al.: Malwares classification with recurrent networks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2015)","key":"30_CR7","DOI":"10.1109\/ICASSP.2015.7178304"},{"doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2015)","key":"30_CR8","DOI":"10.1109\/MALWARE.2015.7413680"},{"doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA). IEEE (2010)","key":"30_CR9","DOI":"10.1109\/BWCCA.2010.85"},{"doi-asserted-by":"crossref","unstructured":"Ganesh, N., et al.: Static analysis of malicious Java applets. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics. ACM (2016)","key":"30_CR10","DOI":"10.1145\/2875475.2875477"},{"unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems (2014)","key":"30_CR11"},{"unstructured":"Socher, R., et al.: Recursive deep models for semantic compositionality over a sentiment treebank. In: Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing (2013)","key":"30_CR12"},{"unstructured":"Herrera, A., Cheney, B.: JMD: a hybrid approach for detecting Java malware. In: Proceedings of the 13th Australasian Information Security Conference (AISC 2015), vol. 27 (2015)","key":"30_CR13"},{"unstructured":"Contagio Malware Dump. http:\/\/contagiodump.blogspot.in\/2013\/03\/16800-clean-and-11960-malicious-files.html","key":"30_CR14"},{"unstructured":"Wang, X., Yiu, S.M.: A multi-task learning model for malware classification with useful file access pattern from API call sequence. arXiv preprint arXiv:1610.05945 (2016)","key":"30_CR15"},{"unstructured":"Wang, X.: An automatic analysis and detection tool for Java exploits. Virus Bulletin (2013)","key":"30_CR16"},{"unstructured":"Soman, S., Krintz, C., Vigna, G.: Detecting malicious java code using virtual machine auditing. In: Proceedings of the 12th Conference on USENIX Security Symposium, SSYM 2003, vol. 12, p. 11. USENIX Association, Berkeley (2003)","key":"30_CR17"},{"unstructured":"Kouznetsov, P.: JAD-the fast JAva Decompiler (2006). http:\/\/www.kpdus.com\/jad.html","key":"30_CR18"},{"doi-asserted-by":"crossref","unstructured":"Gestwicki, P.V., Jayaraman, B.: JIVE: Java interactive visualization environment. In: Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications. ACM (2004)","key":"30_CR19","DOI":"10.1145\/1028664.1028762"},{"doi-asserted-by":"crossref","unstructured":"Yao, K., Zweig, G., Hwang, M.-Y., Shi, Y., Yu, D.: Recurrent neural networks for language understanding. In: InterSpeech, pp. 2524\u20132528 (2013)","key":"30_CR20","DOI":"10.21437\/Interspeech.2013-569"},{"doi-asserted-by":"crossref","unstructured":"Vukotic, V., Raymond, C., Gravier, G.: Is it time to switch to word embedding and recurrent neural networks for spoken language understanding?. In: InterSpeech, Dresde, Germany (2015)","key":"30_CR21","DOI":"10.21437\/Interspeech.2015-41"},{"issue":"8","key":"30_CR22","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"10","key":"30_CR23","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1162\/089976600300015015","volume":"12","author":"FA Gers","year":"2000","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to forget: continual prediction with LSTM. Neural Comput. 12(10), 2451\u20132471 (2000)","journal-title":"Neural Comput."},{"unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)","key":"30_CR24"},{"doi-asserted-by":"crossref","unstructured":"Vukotic, V., Raymond, C., Gravier, G.: A step beyond local observations with a dialog aware bidirectional GRU network for Spoken Language Understanding. In: Interspeech (2016)","key":"30_CR25","DOI":"10.21437\/Interspeech.2016-1301"},{"unstructured":"Abadi, M., et al.: TensorFlow: a system for large-scale machine learning. In: OSDI, vol. 16 (2016)","key":"30_CR26"},{"issue":"4","key":"30_CR27","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/2740070.2631434","volume":"44","author":"Z Yuan","year":"2014","unstructured":"Yuan, Z., et al.: Droid-Sec: deep learning in Android malware detection. ACM SIGCOMM Comput. Commun. Rev. 44(4), 371\u2013372 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T21:44:49Z","timestamp":1662846289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}