{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T16:24:44Z","timestamp":1769271884130,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1109\/dsaa53316.2021.9564144","type":"proceedings-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T22:54:28Z","timestamp":1634770468000},"page":"1-10","source":"Crossref","is-referenced-by-count":8,"title":["Combining Static and Dynamic Analysis to Improve Machine Learning-based Malware Classification"],"prefix":"10.1109","author":[{"given":"Rajchada","family":"Chanajitt","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Pfahringer","sequence":"additional","affiliation":[]},{"given":"Heitor Murilo","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","author":"o'malley","year":"2019","journal-title":"Keras Tuner"},{"key":"ref10","year":"2019","journal-title":"Malimg Dataset"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref13","author":"chen","year":"2020","journal-title":"STAMINA Scalable deep learning approach for malware classification"},{"key":"ref14","first-page":"444","article-title":"Neurlux: dynamic malware analysis with-out feature engineering","author":"jindal","year":"0","journal-title":"Computer Security Applications Conference"},{"key":"ref15","author":"forensics","year":"2020","journal-title":"VirusShare"},{"key":"ref16","year":"2020","journal-title":"VirusSign"},{"key":"ref17","year":"2020","journal-title":"Filehorse"},{"key":"ref18","author":"baskin","year":"0","journal-title":"Noriben malware analysis sandbox"},{"key":"ref19","author":"kramer","year":"2017","journal-title":"Acquiring a memory dump from fleeting malware"},{"key":"ref28","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"ref27","article-title":"Tune: A research platform for distributed model selection and training","author":"liaw","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.285"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2015.04.001","article-title":"Amal: High-fidelity, behavior-based automated malware analysis and classification","volume":"52","author":"mohaisen","year":"2015","journal-title":"Computers & Security"},{"key":"ref29","author":"abadi","year":"2016","journal-title":"Tensorflow Large-scale machine learning on heterogeneous distributed systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2013.8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.45","article-title":"Toward automated dynamic malware analysis using cwsandbox","volume":"5","author":"holz","year":"2007","journal-title":"IEEE Security & Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app9183680"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5329-5_19"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2018.8659358"},{"key":"ref20","author":"walters","year":"2016","journal-title":"The Volatility Framework"},{"key":"ref22","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"JMLR"},{"key":"ref21","year":"2019","journal-title":"Falcon sandbox"},{"key":"ref24","author":"lundberg","year":"2021","journal-title":"SHAP"},{"key":"ref23","article-title":"A unified approach to interpreting model predictions","volume":"30","author":"lundberg","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref26","author":"stevens","year":"2020","journal-title":"New tool Xorsearch py"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_6"}],"event":{"name":"2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA)","location":"Porto, Portugal","start":{"date-parts":[[2021,10,6]]},"end":{"date-parts":[[2021,10,9]]}},"container-title":["2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9564091\/9564109\/09564144.pdf?arnumber=9564144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:23Z","timestamp":1652197643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9564144\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dsaa53316.2021.9564144","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}