{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T21:33:54Z","timestamp":1778276034130,"version":"3.51.4"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/icassp.2015.7178304","type":"proceedings-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T22:45:43Z","timestamp":1439419543000},"page":"1916-1920","source":"Crossref","is-referenced-by-count":305,"title":["Malware classification with recurrent networks"],"prefix":"10.1109","author":[{"given":"Razvan","family":"Pascanu","sequence":"first","affiliation":[]},{"given":"Jack W.","family":"Stokes","sequence":"additional","affiliation":[]},{"given":"Hermineh","family":"Sanossian","sequence":"additional","affiliation":[]},{"given":"Mady","family":"Marinescu","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639349"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref14","article-title":"The &#x201C;echo state&#x201D; approach to analysing and training recurrent neural networks","author":"jaeger","year":"2001","journal-title":"Tech Rep German National Research Center for Information Technology"},{"key":"ref15","article-title":"On the difficulty of training recurrent neural models","author":"pascanu","year":"2013","journal-title":"ICML"},{"key":"ref16","article-title":"On the importance of momentum and initialization in deep learning","author":"sutskever","year":"2013","journal-title":"ICML"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342215"},{"key":"ref19","first-page":"273","article-title":"Behavior based spyware de-tection","author":"kirda","year":"2006","journal-title":"Proc 15th Usenix Security Symp"},{"key":"ref4","first-page":"130","article-title":"A biologically inspired immune system for computers","author":"kephart","year":"1994","journal-title":"In Artificial Life IV Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2010-343","article-title":"Recurrent neural network based language model","author":"mikolov","year":"2010","journal-title":"Proceedings of Interspeech"},{"key":"ref5","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","author":"kolter","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref7","article-title":"Generating sequences with recurrent neural networks","author":"graves","year":"2013","journal-title":"Tech Rep arXiv 1308 0850"},{"key":"ref2","first-page":"1","article-title":"Using file relationships in malware classification","volume":"7591","author":"nikos","year":"2013"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1126\/science.1091277","article-title":"Harnessing nonlinearity: Predicting chaotic systems and saving energy in wireless communication","author":"jaeger","year":"2004","journal-title":"Science"},{"key":"ref1","article-title":"A survey of malware detection techniques","author":"idika","year":"2007","journal-title":"Tech Report Purdue Univ"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0120-x"},{"key":"ref22","first-page":"92","article-title":"Evaluation of pooling operations in convolutional architectures for object recognition","author":"scherer","year":"2010","journal-title":"Proc of the Intl Conf on Artificial Neural Networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.47"},{"key":"ref24","article-title":"Improving neural networks by preventing co-adaptation of feature detectors","author":"hinton","year":"2012","journal-title":"Tech Rep arXiv 1207 0580"},{"key":"ref23","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"2011","journal-title":"AISTATS"},{"key":"ref26","first-page":"1553","article-title":"Imad: in-execution malware analysis and detection","author":"syed","year":"2009","journal-title":"Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation"},{"key":"ref25","article-title":"Theano: a CPU and GPU math expression com-piler","author":"james","year":"2010","journal-title":"Proceedings of the Python for Scientific Computing Conference (SciPy)"}],"event":{"name":"ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"South Brisbane, Queensland, Australia","start":{"date-parts":[[2015,4,19]]},"end":{"date-parts":[[2015,4,24]]}},"container-title":["2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7158221\/7177909\/07178304.pdf?arnumber=7178304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T09:46:41Z","timestamp":1653040001000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7178304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icassp.2015.7178304","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}