{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:02:46Z","timestamp":1770224566833,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/icit.2019.8754939","type":"proceedings-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T22:14:55Z","timestamp":1562278495000},"page":"1149-1154","source":"Crossref","is-referenced-by-count":7,"title":["Generative Malware Outbreak Detection"],"prefix":"10.1109","author":[{"given":"Sean","family":"Park","sequence":"first","affiliation":[]},{"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[]},{"given":"Joarder","family":"Kamruzzaman","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Oliver","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21735-7_7"},{"key":"ref11","article-title":"The IDA pro book: the unofficial guide to the world's most popular disassembler","author":"eagle","year":"2011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.12"},{"key":"ref13","article-title":"Deconvolutional paragraph representation learning","author":"zhang","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref16","year":"0"},{"key":"ref17","author":"husz\u00e1r","year":"0"},{"key":"ref18","article-title":"Fighting Metamorphism using Deep Neural Network with Fourier","author":"sean","year":"0"},{"key":"ref19","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.11.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"ref6","author":"andrew","year":"2015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref8","article-title":"Adversarial autoencoders","author":"makhzani","year":"2015"},{"key":"ref7","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.5.21"},{"key":"ref9","article-title":"The Numerics of GANs","author":"mescheder","year":"2017"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref20","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5220\/0001863603170320"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_6"},{"key":"ref24","first-page":"48","article-title":"A survey of malware detection techniques","author":"idika","year":"2007"},{"key":"ref23","article-title":"Proposal of n-gram based algorithm for malware classification","author":"pekta?","year":"2011","journal-title":"The Fifth International Conference on Emerging Security Information Systems and Technologies"},{"key":"ref26","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22786-8_6"}],"event":{"name":"2019 IEEE International Conference on Industrial Technology (ICIT)","location":"Melbourne, Australia","start":{"date-parts":[[2019,2,13]]},"end":{"date-parts":[[2019,2,15]]}},"container-title":["2019 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8746085\/8754907\/08754939.pdf?arnumber=8754939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:13:59Z","timestamp":1657854839000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8754939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icit.2019.8754939","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}