{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:57Z","timestamp":1766298357570,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/5gwf49715.2020.9221100","type":"proceedings-article","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T20:02:36Z","timestamp":1602619356000},"page":"212-217","source":"Crossref","is-referenced-by-count":18,"title":["Lightweight IoT Malware Detection Solution Using CNN Classification"],"prefix":"10.1109","author":[{"given":"Ahmad M.N.","family":"Zaza","sequence":"first","affiliation":[]},{"given":"Suleiman K.","family":"Kharroub","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Abualsaud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"IoTPOT: analysing the rise of IoT compromises","volume":"9","author":"pa","year":"2020","journal-title":"Emu"},{"journal-title":"pypi","article-title":"virustotal-api","year":"2020","key":"ref11"},{"journal-title":"cortesi - binvis io - a browser-based tool for visualising binary data","article-title":"binvis.io - a browser-based tool for visualising binary data","year":"2019","key":"ref12"},{"key":"ref13","article-title":"cortesi\/scurve","author":"cortesi","year":"2020","journal-title":"Github"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/KSE.2018.8573374"},{"key":"ref15","article-title":"Epoch vs Batch Size vs Iterations","author":"sharma","year":"2019","journal-title":"Medium Towards Data Science"},{"journal-title":"Optimizers - keras documentation","year":"2020","key":"ref16"},{"journal-title":"TensorFlow&#x2122;","article-title":"Module: tf.losses: TensorFlow Core r2.0","year":"2020","key":"ref17"},{"journal-title":"Guardsquare","article-title":"Code hardening (obfuscation & encryption)","year":"2019","key":"ref18"},{"journal-title":"Limits in HDF5","year":"2019","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089618"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948888"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916886"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCE.2018.8441717"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"journal-title":"Preparing The ISO\/IEC 30141 Iot Reference Architecture Edition 2 Through A Mindshare","year":"2019","author":"franberg","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"ref20","article-title":"NVIDIA GeForce GTX 1050 Max-Q GPU","author":"hinum","year":"2018","journal-title":"Notebookcheck"}],"event":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","start":{"date-parts":[[2020,9,10]]},"location":"Bangalore, India","end":{"date-parts":[[2020,9,12]]}},"container-title":["2020 IEEE 3rd 5G World Forum (5GWF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9214304\/9221016\/09221100.pdf?arnumber=9221100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:54:17Z","timestamp":1656345257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9221100\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/5gwf49715.2020.9221100","relation":{},"subject":[],"published":{"date-parts":[[2020,9]]}}}