{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:37:29Z","timestamp":1761845849767},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10437114","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:45:36Z","timestamp":1708976736000},"page":"5159-5164","source":"Crossref","is-referenced-by-count":2,"title":["A Visual Analytics Framework for Explainable Malware Detection in Edge Computing Networks"],"prefix":"10.1109","author":[{"given":"Dilara T.","family":"Uysal","sequence":"first","affiliation":[{"name":"University of London,Birkbeck College,UK"}]},{"given":"Shimaa","family":"Naser","sequence":"additional","affiliation":[{"name":"Khalifa University,Abu Dhabi,UAE"}]},{"given":"Zaid","family":"Almahmoud","sequence":"additional","affiliation":[{"name":"University of London,Birkbeck College,UK"}]},{"given":"Sami","family":"Muhaidat","sequence":"additional","affiliation":[{"name":"Khalifa University,Abu Dhabi,UAE"}]},{"given":"Paul D.","family":"Yoo","sequence":"additional","affiliation":[{"name":"University of London,Birkbeck College,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ojvt.2022.3219898"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2022.3191601"},{"key":"ref3","article-title":"Security attacks and solutions for digital twins","author":"Suhail","year":"2022","journal-title":"arXiv preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6658842"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101740"},{"volume-title":"Virus Total","year":"2019","key":"ref8"},{"volume-title":"MalwareBazaar | Malware sample exchange","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","start":{"date-parts":[[2023,12,4]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10437114.pdf?arnumber=10437114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T01:08:18Z","timestamp":1709255298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10437114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10437114","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}