{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:59:05Z","timestamp":1775627945160,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00029","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"176-183","source":"Crossref","is-referenced-by-count":0,"title":["BEACON: Behavioral Malware Classification with Large Language Model Embeddings and Deep Learning"],"prefix":"10.1109","author":[{"given":"Wadduwage Shanika","family":"Perera","sequence":"first","affiliation":[{"name":"Sam Houston State University,Department of Computer Science,Huntsville,TX,USA,77341"}]},{"given":"Haodi","family":"Jiang","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Department of Computer Science,Huntsville,TX,USA,77341"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCDM.2011.17"},{"key":"ref2","article-title":"Avast-ctu public cape dataset","author":"Bosansky","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"ref4","first-page":"3971","article-title":"Dos and don\u2019ts of machine learning in computer security","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Arp"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00168"},{"key":"ref6","first-page":"100529","article-title":"A comprehensive survey on deep learning based malware detection techniques","volume-title":"Computer Science Review","volume":"47","author":"M","year":"2023"},{"key":"ref7","article-title":"Malware detection by eating a whole exe","author":"Raff","year":"2017"},{"issue":"1","key":"ref8","article-title":"Deepgray: Malware classification using grayscale images with deep learning","volume-title":"The International FLAIRS Conference Proceedings","volume":"37","author":"Jiang"},{"key":"ref9","first-page":"101760","article-title":"A dynamic windows malware detection and prediction method based on contextual understanding of api call sequence","volume-title":"Computers & Security","volume":"92","author":"Amer","year":"2020"},{"key":"ref10","article-title":"Llms are also effective embedding models: An in-depth overview","author":"Tao","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref12","volume-title":"Text embeddings api","year":"2025"},{"issue":"17","key":"ref13","first-page":"3553","article-title":"Going beyond api calls in dynamic malware analysis: A novel dataset","volume-title":"Electronics","volume":"13","author":"Ili\u0107","year":"2024"},{"issue":"01","key":"ref14","first-page":"1210","article-title":"Dynamic malware analysis with feature engineering and feature learning","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Zhang"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.5220\/0010377907330742","article-title":"Malware classification with word embedding features","author":"Kale","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom60117.2023.00123"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/3359789.3359835","article-title":"Neurlux: Dynamic malware analysis without feature engineering","author":"Jindal","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3409083"},{"key":"ref19","article-title":"Maldetconv: Automated behaviour-based malware detection framework based on natural language processing and deep learning techniques","author":"Maniriho","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8195395"},{"key":"ref21","article-title":"Cysecbert: A domain-adapted language model for the cybersecurity domain","author":"Bayer","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3172432"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1109\/MILCOM61039.2024.10773857","article-title":"Transfer learning in pre-trained large language models for malware detection based on system calls","author":"S\u00e1nchez","year":"2024"},{"key":"ref24","article-title":"Semantic preprocessing for llm-based malware analysis","author":"Marais","year":"2025"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-3679775\/v1","article-title":"Efficient ransomware detection via portable executable file image analysis by llama-7b","author":"Li","year":"2023"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1109\/SPW67851.2025.00017","article-title":"Lamd: Context-driven android malware detection and classification with llms","author":"Qian","year":"2025"},{"key":"ref27","volume-title":"Yara","author":"Alvarez","year":"2025"},{"key":"ref28","volume-title":"Understand and count tokens","year":"2025"},{"key":"ref29","volume-title":"Recursivejsonsplitter","year":"2025"},{"key":"ref30","article-title":"Scikit-learn: Machine learning in python","author":"Pedregosa","year":"2018"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471489.pdf?arnumber=11471489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:19:43Z","timestamp":1775625583000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00029","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}