{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:30:33Z","timestamp":1752283833428,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172042"],"award-info":[{"award-number":["62172042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,13]]},"DOI":"10.1109\/icct52962.2021.9658113","type":"proceedings-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T20:36:39Z","timestamp":1641328599000},"page":"339-343","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model"],"prefix":"10.1109","author":[{"given":"Weijie","family":"Han","sequence":"first","affiliation":[]},{"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Kechang","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966342"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.036"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.comcom.2019.08.003","article-title":"Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance","volume":"147","author":"arivudainambi","year":"2019","journal-title":"Computer Communications"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"118s","DOI":"10.1016\/j.diin.2018.04.024","article-title":"Deep learning at the shallow end: malware classification for non-domain experts","volume":"26","author":"quan","year":"2018","journal-title":"Digital Investigation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966340"},{"journal-title":"Malware Detection with LSTM using Opcode Language","year":"0","author":"lu","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7247095"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.comnet.2019.04.007","article-title":"ASSCA: API sequence and statistics features combined architecture for malware detection","volume":"157","author":"lu","year":"2019","journal-title":"Computer Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107234"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100148"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.06.014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945787"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107099"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.comnet.2019.06.015","article-title":"A multi-dimensional machine learning approach to predict advanced malware","volume":"160","author":"serif","year":"2019","journal-title":"Computer Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102202"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.095"}],"event":{"name":"2021 IEEE 21st International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2021,10,13]]},"location":"Tianjin, China","end":{"date-parts":[[2021,10,16]]}},"container-title":["2021 IEEE 21st International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9657830\/9657831\/09658113.pdf?arnumber=9658113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:25Z","timestamp":1652201785000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9658113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icct52962.2021.9658113","relation":{},"subject":[],"published":{"date-parts":[[2021,10,13]]}}}