{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:19:30Z","timestamp":1764051570110,"version":"3.45.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,9]]},"DOI":"10.1109\/dsaa65442.2025.11247999","type":"proceedings-article","created":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T18:56:45Z","timestamp":1764010605000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Analysis of Neural Network Architectures for Telemetry-Driven Malware Behavior Classification"],"prefix":"10.1109","author":[{"given":"Michael","family":"Schladt","sequence":"first","affiliation":[{"name":"University of Cincinnati,Electrical and Computer Engineering,Cincinnati,USA"}]},{"given":"John","family":"Gallagher","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Electrical and Computer Engineering,Cincinnati,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.126"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref4","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"Kolter","year":"2006","journal-title":"Journal of machine learning research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89900-6_21"},{"key":"ref6","first-page":"61","article-title":"Classification of malware using structured control flow","author":"Cesare","year":"2010","journal-title":"AusPDC"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/acsac.2007.21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0028-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/malware.2015.7413681"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20160702001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/malware.2018.8659358"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.1036"},{"key":"ref18","first-page":"2733","article-title":"Sigl: Securing software installations through deep graph learning","volume-title":"USENIX Security Symposium","author":"Han","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56991-8_51"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-010-0141-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504162"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841778"},{"key":"ref24","article-title":"Malware detection by eating a whole exe","volume-title":"AAAI Workshop on Artificial Intelligence for Cyber Security","author":"Raff","year":"2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"journal-title":"Malbert: Using transformers for cybersecurity and malicious software detection","year":"2021","author":"Rahali","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3225137"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref30","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. 2019 Conf. of the North American Chapter of the ACL: Human Language Technologies","author":"Devlin","year":"2019"}],"event":{"name":"2025 IEEE 12th International Conference on Data Science and Advanced Analytics (DSAA)","start":{"date-parts":[[2025,10,9]]},"location":"Birmingham, United Kingdom","end":{"date-parts":[[2025,10,12]]}},"container-title":["2025 IEEE 12th International Conference on Data Science and Advanced Analytics (DSAA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11247920\/11247921\/11247999.pdf?arnumber=11247999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:14:14Z","timestamp":1764051254000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11247999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dsaa65442.2025.11247999","relation":{},"subject":[],"published":{"date-parts":[[2025,10,9]]}}}