{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:56:38Z","timestamp":1768521398808,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003711","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647806","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-9","source":"Crossref","is-referenced-by-count":11,"title":["IoT Malware Detection Using Function-Call-Graph Embedding"],"prefix":"10.1109","author":[{"given":"Chia-Yi","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tao","family":"Ban","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shin-Ming","family":"Cheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3379530"},{"key":"ref31","article-title":"Umap: Uniform manifold approximation and projection for dimension reduction","author":"mcinnes","year":"2018","journal-title":"arXiv preprint arXiv 1802 03426"},{"key":"ref30","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978335"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00475-6"},{"key":"ref12","first-page":"279","article-title":"Android malware detection using function call graph with graph convolutional networks","author":"vinayaka","year":"2021","journal-title":"Proc ICSCCC 2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538636"},{"key":"ref14","first-page":"1093","article-title":"Understanding the Mirai botnet","author":"antonakakis","year":"2017","journal-title":"Proc USENIX 2017"},{"key":"ref15","article-title":"Analyzing a backdoor\/bot for the mips platform","author":"bohio","year":"2015","journal-title":"Analysis of a MIPS Malware\/SANS Institute InfoSec Reading Room"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113581"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101760"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.12.001"},{"key":"ref28","year":"0","journal-title":"New Support Vector Machines"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00106"},{"key":"ref27","year":"0","journal-title":"Random Forests"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3014384"},{"key":"ref6","article-title":"graph2vec: Learning distributed representations of graphs","author":"narayanan","year":"2017","journal-title":"arXiv preprint arXiv 1707 05373"},{"key":"ref29","year":"0","journal-title":"Multilayer Perceptron"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE48956.2021.9352145"},{"key":"ref8","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"International Conference on Machine Learning"},{"key":"ref7","article-title":"Weisfeiler-lehman graph kernels","volume":"12","author":"shervashidze","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0244-0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/app11125713"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2925929"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6804290"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS50894.2020.00033"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3442041"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3264746.3264775"},{"key":"ref26","year":"0","journal-title":"Call graph"},{"key":"ref25","author":"team","year":"2017","journal-title":"Radare2 github repository"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","location":"Auckland, New Zealand","start":{"date-parts":[[2021,12,13]]},"end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647806.pdf?arnumber=9647806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:51Z","timestamp":1652201991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647806","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}