{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T11:17:26Z","timestamp":1743160646417,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/kse.2018.8573374","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T20:06:45Z","timestamp":1544731605000},"page":"382-388","source":"Crossref","is-referenced-by-count":20,"title":["Comparison of Three Deep Learning-based Approaches for IoT Malware Detection"],"prefix":"10.1109","author":[{"given":"Khanh Duy Tung","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tran Minh","family":"Tuan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Son Hai","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anh Phan","family":"Viet","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mizuhito","family":"Ogawa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nguyen Le","family":"Minh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"229","article-title":"Obfuscation code localization based on cfg generation of malware","author":"hai","year":"2015","journal-title":"et al"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref12","first-page":"436","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"et al"},{"key":"ref13","article-title":"Convolutional neural networks generalization utilizing the data graph structure","author":"hechtlinger","year":"2016","journal-title":"et al"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995496"},{"key":"ref16","first-page":"484","article-title":"Mastering the game of go with deep neural networks and tree search","volume":"529","author":"silver","year":"2016","journal-title":"et al"},{"key":"ref17","article-title":"Language modeling with gated convolutional networks","author":"dauphin","year":"2016","journal-title":"et al"},{"key":"ref18","article-title":"Malware detection by eating a whole exe","author":"raff","year":"2017","journal-title":"et al"},{"key":"ref19","article-title":"Reducing overfitting in deep networks by decorrelating representations","author":"cogswell","year":"2015","journal-title":"et al"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.98"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522972"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5120\/6194-8715"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2012.6408191"},{"key":"ref2","first-page":"130","article-title":"A biologically inspired immune system for computers","author":"kephart","year":"1994","journal-title":"et al"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"journal-title":"Tech Rep","article-title":"Mcafee labs threat report","year":"2018","key":"ref1"},{"key":"ref20","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"abadi","year":"0","journal-title":"et al"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"ref21","article-title":"Keras","author":"chollet","year":"2015","journal-title":"et al"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IESYS.2017.8233558"},{"key":"ref23","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"et al"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-1104"}],"event":{"name":"2018 10th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2018,11,1]]},"location":"Ho Chi Minh City","end":{"date-parts":[[2018,11,3]]}},"container-title":["2018 10th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8553666\/8573236\/08573374.pdf?arnumber=8573374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:36:39Z","timestamp":1643268999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8573374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/kse.2018.8573374","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}