{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:44:27Z","timestamp":1730231067101,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icbase59196.2023.10303222","type":"proceedings-article","created":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T17:50:59Z","timestamp":1699033859000},"page":"302-306","source":"Crossref","is-referenced-by-count":0,"title":["Malicious Process Identification via System Audit Logs Analysis"],"prefix":"10.1109","author":[{"given":"Zeri","family":"Zhang","sequence":"first","affiliation":[{"name":"Tianjin University of Technology,School of Computer Science and Engineering,Tianjin,China"}]},{"given":"Kai","family":"Shi","sequence":"additional","affiliation":[{"name":"Tianjin University of Technology,School of Computer Science and Engineering,Tianjin,China"}]},{"given":"Mengshu","family":"Wang","sequence":"additional","affiliation":[{"name":"Tianjin University of Technology,School of Computer Science and Engineering,Tianjin,China"}]},{"given":"Anxing","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tianjin University of Technology,School of Computer Science and Engineering,Tianjin,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978378"},{"journal-title":"BERT Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"devlin","key":"ref15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516731"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00046"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363217"},{"journal-title":"Aadhaar Data Breach","year":"0","key":"ref2"},{"journal-title":"Scraped data of 500 million LinkedIn users being sold online 2 million records leaked as proof","year":"0","key":"ref1"},{"journal-title":"Transparent Computing Defense Advanced Research Projects Agency","year":"2014","key":"ref17"},{"journal-title":"Auto-encoding variational bayes","year":"2013","author":"kingma","key":"ref16"},{"key":"ref18","volume":"9","author":"van der maaten","year":"2008","journal-title":"Visualizing data using t-sne"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00064"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00026"},{"key":"ref9","first-page":"3005","article-title":"{ATLAS}: A sequence-based learning approach for attack investigation","author":"alsaheel","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"ref4","first-page":"1705","article-title":"Enabling Refinable {Cross-Host} Attack Investigation with Efficient Data Flow Tagging and Tracking","author":"ji","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00047"},{"key":"ref6","first-page":"487","article-title":"{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data","author":"hossain","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24167"}],"event":{"name":"2023 4th International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)","start":{"date-parts":[[2023,8,25]]},"location":"Nanjing, China","end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 4th International Conference on Big Data &amp; Artificial Intelligence &amp; Software Engineering (ICBASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10303003\/10303015\/10303222.pdf?arnumber=10303222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:33:49Z","timestamp":1701113629000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10303222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icbase59196.2023.10303222","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}