{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:01:37Z","timestamp":1765357297301},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T00:00:00Z","timestamp":1675728000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T00:00:00Z","timestamp":1675728000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,7]]},"DOI":"10.1109\/icaic57335.2023.10044169","type":"proceedings-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:25:00Z","timestamp":1677090300000},"source":"Crossref","is-referenced-by-count":24,"title":["Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets"],"prefix":"10.1109","author":[{"given":"Daryle","family":"Smith","sequence":"first","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Computer Science,Greensboro,USA"}]},{"given":"Sajad","family":"Khorsandroo","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Computer Science,Greensboro,USA"}]},{"given":"Kaushik","family":"Roy","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Computer Science,Greensboro,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Malware statistics in 2022: Frequency, impact, cost & more","author":"Cook","year":"2022","journal-title":"Comparitech"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2019.00016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/app12178482"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/1140\/1\/012049"},{"key":"ref6","article-title":"What is supervised learning?","author":"Petersson","year":"2021","journal-title":"SearchEnterpriseAI"},{"key":"ref7","article-title":"What is unsupervised learning?","year":"2020","journal-title":"IBM Cloud Education"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3377869"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6760920"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3318396.3318448"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3484246"},{"key":"ref12","article-title":"Malware-exploratory","author":"Borges","year":"2021","journal-title":"Kaggle"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5220\/0010908200003120"}],"event":{"name":"2023 IEEE 2nd International Conference on AI in Cybersecurity (ICAIC)","location":"Houston, TX, USA","start":{"date-parts":[[2023,2,7]]},"end":{"date-parts":[[2023,2,9]]}},"container-title":["2023 IEEE 2nd International Conference on AI in Cybersecurity (ICAIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10044118\/10044119\/10044169.pdf?arnumber=10044169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T16:51:08Z","timestamp":1707843068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10044169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icaic57335.2023.10044169","relation":{},"subject":[],"published":{"date-parts":[[2023,2,7]]}}}