{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:41:37Z","timestamp":1730259697346,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/ict62760.2024.10606032","type":"proceedings-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T17:51:06Z","timestamp":1722361866000},"page":"01-06","source":"Crossref","is-referenced-by-count":0,"title":["Unveiling Hidden Threats in PDFs with Hybrid Malware Classification"],"prefix":"10.1109","author":[{"given":"Sh M","family":"Zeeshan Javed","sequence":"first","affiliation":[{"name":"National University of Science and Technology,Islamabad,Pakistan"}]},{"given":"Faisal","family":"Amjad","sequence":"additional","affiliation":[{"name":"National University of Science and Technology,Islamabad,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/app112412134"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8485365"},{"volume-title":"Readers vulnerability by year, Available online at","author":"Acrobat","key":"ref3"},{"key":"ref4","first-page":"271","article-title":"Detecting malicious documents with platform diversity","volume-title":"USENIX Security Symposium","author":"Xu","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.012"},{"volume-title":"CIC-EvasivePDF2022 PDF dataset by year 2024","key":"ref6"},{"volume-title":"MalwareBazaar dataset available online in April 2024","key":"ref7"},{"volume-title":"Virustotal availabale online","year":"2024","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7611741"},{"issue":"2021","key":"ref10","first-page":"314","article-title":"Improving malicious PDF classifier with feature engineering: A data-driven approach","volume":"115","author":"Falah","journal-title":"Future Generation Computer Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5220\/0010908400003120"},{"volume-title":"PDF tools","year":"2024","author":"Stevens","key":"ref12"},{"volume-title":"peepdf - PDF analysis tool","year":"2024","author":"Esparza","key":"ref13"}],"event":{"name":"2024 IEEE 30th International Conference on Telecommunications (ICT)","start":{"date-parts":[[2024,6,24]]},"location":"Amman, Jordan","end":{"date-parts":[[2024,6,27]]}},"container-title":["2024 IEEE 30th International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10606101\/10606018\/10606032.pdf?arnumber=10606032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T14:37:58Z","timestamp":1722436678000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10606032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ict62760.2024.10606032","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}