{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:17:24Z","timestamp":1732771044920,"version":"3.29.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724407","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning-Based Malware Detection"],"prefix":"10.1109","author":[{"given":"Sumisha","family":"Mohan","sequence":"first","affiliation":[{"name":"SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203"}]},{"given":"S.","family":"Babu","sequence":"additional","affiliation":[{"name":"SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203"}]},{"given":"Bhumika","family":"Sahoo","sequence":"additional","affiliation":[{"name":"SRM Institute of Science &#x0026; Technology Kattankulathur,Department of Computing Technologies,Chengalpattu,Tamil Nadu,India,603203"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"85","article-title":"Malware Analysis and Detection","volume":"4","author":"Afianian","year":"2018","journal-title":"Journal of Cybersecurity"},{"issue":"7","key":"ref2","first-page":"23","article-title":"Deep Neural Networks for Malware Detection","volume":"120","author":"Gan","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"article-title":"Machine Learning in Action","year":"2012","author":"Harrington","key":"ref4"},{"article-title":"An Overview of Gradient Descent Optimization Algorithms","year":"2016","author":"Ruder","key":"ref5"},{"issue":"3","key":"ref6","first-page":"341","article-title":"A Review of Machine Learning Algorithms for Malware Detection","volume":"22","author":"Wang","year":"2007","journal-title":"Journal of Computer Science and Technology"},{"issue":"4","key":"ref7","first-page":"260","article-title":"Comparative Analysis of Malware Detection Techniques","volume":"9","author":"Chebbi","year":"2018","journal-title":"Journal of Information Security"},{"issue":"2","key":"ref8","first-page":"93","article-title":"Deep Neural Network Classifier for Malware Detection","volume":"2","author":"Saxe","year":"2018","journal-title":"Cybersecurity Journal"},{"issue":"1","key":"ref9","first-page":"45","article-title":"Federated Learning for Cybersecurity: Opportunities and Challenges","volume":"5","author":"Zhang","year":"2022","journal-title":"Cybersecurity Review"},{"issue":"4","key":"ref10","first-page":"189","article-title":"DeepMal: Deep LearningBased Malware Detection for IoT Devices","volume":"7","author":"Smith","year":"2023","journal-title":"Journal of Cybersecurity Research"},{"issue":"5","key":"ref11","first-page":"35","article-title":"Deep Learning-Based Malware Family Classification Using Gated Recurrent Units","volume":"12","author":"Gomez","year":"2023","journal-title":"International Journal of Information Security"},{"issue":"2","key":"ref12","first-page":"67","article-title":"Federated Learning for Malware Detection Across Networks","volume":"15","author":"Nguyen","year":"2022","journal-title":"Journal of Network Security"},{"issue":"3","key":"ref13","first-page":"110120","article-title":"AI and Machine Learning in Cybersecurity","volume":"8","author":"Patel","year":"2023","journal-title":"Journal of Cyber Threat Intelligence"},{"key":"ref14","first-page":"102798","article-title":"A Review on Deep Learning Algorithms for Malware Detection","volume":"58","author":"Li","year":"2021","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"ref15","first-page":"25","article-title":"Recent Advances in AI-based Malware Detection","volume":"1","author":"Yao","year":"2020","journal-title":"Cybersecurity and Privacy Journal"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724407.pdf?arnumber=10724407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:47:04Z","timestamp":1732690024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724407","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}