{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:16:34Z","timestamp":1771330594058,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1109\/clei60451.2023.10346179","type":"proceedings-article","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T19:22:24Z","timestamp":1702581744000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Static Analysis for Malware Classification Using Machine and Deep Learning"],"prefix":"10.1109","author":[{"given":"Marcelo Invert Palma","family":"Salas","sequence":"first","affiliation":[{"name":"Universidade Estadual de Campinas (UNICAMP),Laboratory of Security and Cryptography,Campinas,SP,Brazil"}]},{"given":"Paulo","family":"De Geus","sequence":"additional","affiliation":[{"name":"Universidade Estadual de Campinas (UNICAMP),Laboratory of Security and Cryptography,Campinas,SP,Brazil"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Exposing weaknesses of malware detectors with explainability-guided evasion attacks","author":"Wang","year":"2021","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101859"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"ref4","volume-title":"Cuckoo sandbox-automated malware analysis","author":"Guarnieri","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3594554"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5815\/ijeme.2018.02.03"},{"key":"ref7","article-title":"Microsoft malware classification challenge","author":"Ronen","year":"2018","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0292-8"},{"key":"ref9","article-title":"Ember: an open dataset for training static pe malware machine learning models","author":"Anderson","year":"2018","journal-title":"arXiv preprint"},{"key":"ref10","article-title":"Malware detection by eating a whole exe","author":"Raff","year":"2017","journal-title":"arXiv preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102159"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906934"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"ref15","article-title":"An in-depth look into the win32 portable executable file format, part 2","author":"Pietrek","year":"2002","journal-title":"MSDN Magazine"},{"issue":"3","key":"ref16","first-page":"15","article-title":"Peering inside the pe: a tour of the win32 (r) portable executable file format","volume":"9","author":"Pietrek","year":"1994","journal-title":"Microsoft Systems Journal-US Edition"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.8.4-2.6827"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref19","article-title":"Malware detection by eating a whole exe","author":"Raff","year":"2017","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"}],"event":{"name":"2023 XLIX Latin American Computer Conference (CLEI)","location":"La Paz, Bolivia","start":{"date-parts":[[2023,10,16]]},"end":{"date-parts":[[2023,10,20]]}},"container-title":["2023 XLIX Latin American Computer Conference (CLEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10346085\/10345779\/10346179.pdf?arnumber=10346179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:42:04Z","timestamp":1705023724000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10346179\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/clei60451.2023.10346179","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]}}}