{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:45:04Z","timestamp":1763642704272},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/cscwd.2019.8791864","type":"proceedings-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T19:54:53Z","timestamp":1565294093000},"page":"28-32","source":"Crossref","is-referenced-by-count":4,"title":["Next Generation Antivirus Applied to Jar Malware Detection based on Runtime Behaviors using Neural Networks"],"prefix":"10.1109","author":[{"given":"Ricardo","family":"Pinheiro","sequence":"first","affiliation":[]},{"given":"Sidney","family":"Lima","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Edison","family":"Albuquerque","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Medeiros","sequence":"additional","affiliation":[]},{"given":"Danilo","family":"Souza","sequence":"additional","affiliation":[]},{"given":"Thyago","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Petronio","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Lima","sequence":"additional","affiliation":[]},{"given":"Jemerson","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Sthefano","family":"Silva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"key":"ref11","article-title":"Workflow Model and Architecture in Gis Environment","author":"souza","year":"1997","journal-title":"Proceedings of the 1st International Conference on Computer Supported Cooperative Work in Design - CSCWD 1997"},{"key":"ref12","article-title":"Strategic Planning in Semantic Crowdware Large Groups Decision MUTIRO project for the Rio 2016 Olympic Games","author":"medeiros","year":"2011","journal-title":"Proceedings of the 16th International Conference on Computer Supported Cooperative Work in Design - CSCWD 2012"},{"year":"0","key":"ref13"},{"journal-title":"Out with The Old In with The New Replacing Traditional Antivirus","year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"journal-title":"Online service in order to identify malware files by main commercial antiviruses worldwide","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.04.008"},{"journal-title":"Qualidade da Pesquisa Cient&#x00ED;fica Brasileira em Inform&#x00E1;tica na Educa&#x00E7;&#x00E3;o Desafios e Perspectivas","year":"2017","author":"patricia","key":"ref18"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"journal-title":"Explore the latest security trends-from malware delivery to mobile device risks-based on 2013 year-end data and ongoing research","year":"2014","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2007.4281460"},{"year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2009.4968033"},{"journal-title":"Cisco 2014 Annual Security Report","year":"0","key":"ref2"},{"key":"ref1","article-title":"Locale Similarity Semantic Search in Large Groups Decision MUTIRO project for the Rio 2016 Olympic Games","author":"medeiros","year":"2011","journal-title":"Proceedings of the 15th International Conference on Computer Supported Cooperative Work in Design - CSCWD 2011"},{"year":"0","key":"ref9"}],"event":{"name":"2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2019,5,6]]},"location":"Porto, Portugal","end":{"date-parts":[[2019,5,8]]}},"container-title":["2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8785422\/8791497\/08791864.pdf?arnumber=8791864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:14:58Z","timestamp":1657840498000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8791864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2019.8791864","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}