{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:35:48Z","timestamp":1730234148768,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T00:00:00Z","timestamp":1704499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T00:00:00Z","timestamp":1704499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,6]]},"DOI":"10.1109\/icce59016.2024.10444433","type":"proceedings-article","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T13:47:20Z","timestamp":1709128040000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["An Advanced Malware Detection System Based on NLP to Generate Genetic Markers"],"prefix":"10.1109","author":[{"given":"Quang Duy","family":"Tran","sequence":"first","affiliation":[{"name":"San Jose State University,Department of Computer Science,CA,USA"}]},{"given":"Jaehyun","family":"Lim","sequence":"additional","affiliation":[{"name":"Silicon Valley Cybersecurity Institute,Saratoga High School"}]},{"given":"Fabio","family":"Di Troia","sequence":"additional","affiliation":[{"name":"San Jose State University,CA,USA"}]}],"member":"263","reference":[{"volume-title":"Computer Viruses and Malware","year":"2022","author":"Aycock","key":"ref1"},{"key":"ref2","article-title":"Global ransomware victimization rate 2022","author":"Petrosyan","year":"2022","journal-title":"Percentage of organizations victimized by ransomware attacks worldwide from 2018 to 2022"},{"journal-title":"CBS NEWS","article-title":"\u201cWannaCry\u201d ransomware attack losses could reach $4 billion","author":"Berr","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92624-7_12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2011.98"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00345-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5815\/ijeme.2018.02.03"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iwcdm.2011.17"},{"key":"ref11","first-page":"1","article-title":"Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches","volume-title":"Proceedings of the International Conference on Advanced Computing and Communication Systems (ICACCS)","author":"Mujumdar"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-68737-3_7","article-title":"Detection of malicious android applications: Classical machine learning vs. deep neural network integrated with clustering","volume-title":"International Conference on Broadband Communications, Networks and Systems","author":"Rathore"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00424-3"},{"volume-title":"Efficient estimation of word representations in vector space","year":"2013","author":"Mikolov","key":"ref15"},{"key":"ref16","article-title":"Efficient Estimation of Word Representations in Vector Space","author":"Mikolov","year":"2013","journal-title":"arXiv preprint arXiv:1301.3781"},{"key":"ref17","article-title":"Distributed Representations of Sentences and Documents","author":"Le","year":"2014","journal-title":"arXiv preprint arXiv:1405.4053"},{"key":"ref18","article-title":"Na\u00efve Bayes","author":"Webb","year":"2011","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/00220670209598786"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/bf00994018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"volume-title":"Deep bidirectional and unidirectional LSTM recurrent neural network for network-wide traffic speed prediction","year":"2018","author":"Cui","key":"ref23"},{"volume-title":"Alphabet soup of deep learning topics","year":"2019","author":"Stamp","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0248-7"},{"volume-title":"VirusShare.com - Because Sharing is Caring","year":"2011","author":"Roberts","key":"ref26"},{"key":"ref27","first-page":"2825","article-title":"GridSearchCV","volume":"12","author":"Pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","start":{"date-parts":[[2024,1,6]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,8]]}},"container-title":["2024 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10444098\/10444131\/10444433.pdf?arnumber=10444433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:39:58Z","timestamp":1709253598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10444433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icce59016.2024.10444433","relation":{},"subject":[],"published":{"date-parts":[[2024,1,6]]}}}