{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:27:23Z","timestamp":1730222843913,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T00:00:00Z","timestamp":1691884800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T00:00:00Z","timestamp":1691884800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009515","name":"EU DUCA","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/100009515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,13]]},"DOI":"10.1109\/fuzz52849.2023.10309775","type":"proceedings-article","created":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T18:51:41Z","timestamp":1699555901000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Image-Based Malware Detection Through a Deep Neuro-Fuzzy Model"],"prefix":"10.1109","author":[{"given":"Francesco","family":"Mercaldo","sequence":"first","affiliation":[{"name":"University of Molise,Campobasso,Italy"}]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[{"name":"Institute for Informatics and Telematics, National Research Council of Italy (CNR),Pisa,Italy"}]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[{"name":"University of Molise,Campobasso,Italy"}]}],"member":"263","reference":[{"volume-title":"The biggest cyber hacks of 2021","year":"2021","author":"Bosun","key":"ref1"},{"volume-title":"Cyber attack on us fuel pipeline operator blamed on darkside, a \u2018robin hood\u2019 criminal gang","year":"2021","key":"ref2"},{"volume-title":"Mysterious \u2018robin hood\u2019 hackers donating stolen money","year":"2020","author":"Tidy","key":"ref3"},{"volume-title":"Colonial hackers stole data thursday ahead of shutdown","year":"2021","author":"Robertson","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39570-8_14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s23010075"},{"volume-title":"Biden says \u2018no evidence\u2019 russia involved in us pipeline hack but putin should act","year":"2021","author":"Helmore","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006094"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/info11060304"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407074"},{"volume-title":"Alarming cyber security facts to know for 2021 and beyond","year":"2021","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101691"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5220\/0009817804990506"},{"issue":"1","key":"ref14","first-page":"44","article-title":"Dynamic mobile malware detection through system call-based image representation","volume":"12","author":"Casolare","year":"2021","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW51248.2020.00082"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.09.047"},{"key":"ref20","first-page":"744","article-title":"Mobile malware detection in the real world","volume-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C)","author":"Mercaldo"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2804345.2804349"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533803"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10188-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8077220"},{"key":"ref25","article-title":"\u201c how does it detect a malicious app?\u201d explaining the predictions of ai-based android malware detector","author":"Lu","year":"2021","journal-title":"arXiv preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.118"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68796-0_17"},{"key":"ref28","article-title":"Deep transfer learning for static malware classification","author":"Chen","year":"2018","journal-title":"arXiv preprint"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05816-y"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348206"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02196-4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167802"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2013.6566472"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2014.6814026"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.6"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2009.5276989"},{"issue":"2","key":"ref40","first-page":"732","article-title":"Phylogenetic analysis for ransomware detection and classification into families","author":"Martinelli","year":"2018","journal-title":"ICETE"}],"event":{"name":"2023 IEEE International Conference on Fuzzy Systems (FUZZ)","start":{"date-parts":[[2023,8,13]]},"location":"Incheon, Korea, Republic of","end":{"date-parts":[[2023,8,17]]}},"container-title":["2023 IEEE International Conference on Fuzzy Systems (FUZZ)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10309665\/10309668\/10309775.pdf?arnumber=10309775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T04:17:42Z","timestamp":1710389862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10309775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,13]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/fuzz52849.2023.10309775","relation":{},"subject":[],"published":{"date-parts":[[2023,8,13]]}}}