{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:27:23Z","timestamp":1775179643671,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/ic3.2019.8844877","type":"proceedings-article","created":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:37:05Z","timestamp":1568939825000},"page":"1-6","source":"Crossref","is-referenced-by-count":19,"title":["VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud"],"prefix":"10.1109","author":[{"given":"Preeti","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Kashish","family":"Khurana","sequence":"additional","affiliation":[]},{"given":"Saloni","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Manish K.","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"44","article-title":"Anomaly Detection in Cloud Based Application using System Calls","author":"aranitasi","year":"0","journal-title":"Eighth International Conference on Cloud Computing GRIDs and Virtualization"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0141"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01012-6_19"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778011"},{"key":"ref14","year":"1998"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref4","year":"2018","journal-title":"CSA Annual Report"},{"key":"ref3","year":"2018","journal-title":"Cyber security breaches survey"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2013.6620049"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2136-x"},{"key":"ref8","first-page":"211","article-title":"Detecting anomalies in IaaS environments through virtual machine host system call analysis","author":"alarifi","year":"0","journal-title":"International Conference for Internet Technology and Secured Transactions"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref2","author":"thales","year":"2016","journal-title":"VORMETRIC DATA THREAT REPORT"},{"key":"ref1","author":"columbus","year":"2017","journal-title":"Roundup Of Cloud Computing Forecasts"},{"key":"ref9","first-page":"1","article-title":"Malware detection by eating a whole exe","author":"raff","year":"0","journal-title":"Thirty-Second AAAI Conference on Artificial Intelligence"}],"event":{"name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","location":"Noida, India","start":{"date-parts":[[2019,8,8]]},"end":{"date-parts":[[2019,8,10]]}},"container-title":["2019 Twelfth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8830728\/8844868\/08844877.pdf?arnumber=8844877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:52:45Z","timestamp":1658155965000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8844877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ic3.2019.8844877","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}