{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:25:19Z","timestamp":1778171119267,"version":"3.51.4"},"reference-count":5,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,10]]},"DOI":"10.1109\/gcce59613.2023.10315559","type":"proceedings-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T18:52:44Z","timestamp":1700160764000},"page":"475-477","source":"Crossref","is-referenced-by-count":4,"title":["Dynamic Analysis for Malware Detection Using API Calls and Memory Usage With Machine Learning Approach"],"prefix":"10.1109","author":[{"given":"Tohru","family":"Tomiyama","sequence":"first","affiliation":[{"name":"Hosei University,Graduate School of Science and Engineering,Department of Applied Informatics,Tokyo,Japan"}]},{"given":"Qian","family":"Wu","sequence":"additional","affiliation":[{"name":"Hosei University,Faculty of Science and Engineering,Department of Applied Informatics,Tokyo,Japan"}]},{"given":"Atsushi","family":"Kanai","sequence":"additional","affiliation":[{"name":"Hosei University,Graduate School of Science and Engineering,Department of Applied Informatics,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Q1 2022 Phishing and Malware Report:Malware Skyrockets, Microsoft Is the Most Impersonated Brand","volume-title":"Vade Secure","author":"Petitto","year":"2022"},{"key":"ref2","volume-title":"CYBER SECURITY REPORT THE FIRST HALF OF 2022","year":"2022"},{"key":"ref3","volume-title":"Information Security 10 Major Threats 2022","year":"2022"},{"issue":"2","key":"ref4","first-page":"305","article-title":"A Study of Characteristic of Malware Based on API Call Sequence and System Load Status Analysis","volume-title":"Computer Security Symposium 2016","volume":"2016","author":"Sato"},{"issue":"2","key":"ref5","first-page":"923","article-title":"Malware detection method based on API call patterns, elapsed time and system load between API calls","volume-title":"Computer Security Symposium 2017","volume":"2017","author":"Sato"}],"event":{"name":"2023 IEEE 12th Global Conference on Consumer Electronics (GCCE)","location":"Nara, Japan","start":{"date-parts":[[2023,10,10]]},"end":{"date-parts":[[2023,10,13]]}},"container-title":["2023 IEEE 12th Global Conference on Consumer Electronics (GCCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10315246\/10315146\/10315559.pdf?arnumber=10315559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:20:12Z","timestamp":1710375612000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10315559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/gcce59613.2023.10315559","relation":{},"subject":[],"published":{"date-parts":[[2023,10,10]]}}}