{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:58:04Z","timestamp":1773154684201,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/milcom47813.2019.9020870","type":"proceedings-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:00:21Z","timestamp":1583506821000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["ScriptNet: Neural Static Analysis for Malicious JavaScript Detection"],"prefix":"10.1109","author":[{"given":"Jack W.","family":"Stokes","sequence":"first","affiliation":[]},{"given":"Rakshit","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Geoff","family":"McDonald","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Hausknecht","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","author":"raff","year":"2017","journal-title":"Malware detection by eating a whole exe"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"ref11","first-page":"137","article-title":"Deep learning for classification of malware system call sequences","author":"kolosnjaji","year":"2016","journal-title":"Australasian Joint Conference on Artificial Intelligence"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1441"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196511"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599785"},{"key":"ref16","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume":"9","author":"glorot","year":"2010","journal-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics ser Proceedings of Machine Learning Research"},{"key":"ref17","author":"lecun","year":"1995","journal-title":"Convolutional Networks for Images Speech and Time Series"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.1.1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref4","first-page":"55","author":"gandotra","year":"2014","journal-title":"Malware analysis and classification A survey"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11751632_62"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435364"},{"key":"ref6","first-page":"70","article-title":"Malicious JavaScript Detection using Statistical Language Model","author":"shah","year":"2016","journal-title":"Master's Projects"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076785"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666657"},{"key":"ref2","article-title":"Zozzle: Fast and precise in-browser javascript malware detection","author":"curtsinger","year":"2011","journal-title":"Proceedings of USENIX Security"},{"key":"ref9","article-title":"A structural and content-based approach for a precise and robust detection of malicious pdf files","author":"maiorca","year":"2015","journal-title":"Proceedings of the International Conference on Information System Security (ICISS"},{"key":"ref1","year":"0","journal-title":"JavaScript"},{"key":"ref20","article-title":"A convolutional encoder model for neural machine translation","volume":"abs 1611 2344","author":"gehring","year":"2016","journal-title":"CoRR"},{"key":"ref22","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref21","article-title":"Convolutional sequence to sequence learning","volume":"abs 1705 3122","author":"gehring","year":"2017","journal-title":"CoRR"},{"key":"ref24","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref23","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"abadi","year":"2015","journal-title":"software available from tensorflow org"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1441"}],"event":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","location":"Norfolk, VA, USA","start":{"date-parts":[[2019,11,12]]},"end":{"date-parts":[[2019,11,14]]}},"container-title":["MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8993674\/9020712\/09020870.pdf?arnumber=9020870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:47:46Z","timestamp":1658094466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9020870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/milcom47813.2019.9020870","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}