{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T17:23:38Z","timestamp":1775496218143,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3305274","type":"journal-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:56:40Z","timestamp":1692035800000},"page":"87945-87957","source":"Crossref","is-referenced-by-count":4,"title":["ACMFNN: A Novel Design of an Augmented Convolutional Model for Intelligent Cross-Domain Malware Localization via Forensic Neural Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6895-3576","authenticated-orcid":false,"given":"Rijvan","family":"Beg","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. K.","family":"Pateriya","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deepak Singh","family":"Tomar","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127195"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3240765"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080510"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3200866"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3051354"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2021.3076600"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2023.3242051"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3253770"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3262265"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3077295"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171226"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3090998"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3262614"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6835"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00579-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093366"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3103139"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2884928"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.3016023"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1109\/TETC.2019.2910086","article-title":"Windows malware detector using convolutional neural network based on visualization images","volume":"9","author":"darshan","year":"2021","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3131713"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087316"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094064"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3091427"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3020954"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100063"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3170544"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2996379"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3160357"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3139334"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3122083"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3124725"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089586"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3150573"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075315"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082173"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10216992.pdf?arnumber=10216992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T18:20:38Z","timestamp":1694456438000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10216992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3305274","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}