{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:45:25Z","timestamp":1773513925135,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447094","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Malware System Calls Detection Using Hybrid System"],"prefix":"10.1109","author":[{"given":"Yue","family":"Guan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Naser","family":"Ezzati-Jivan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167792"},{"key":"ref32","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"In Advances in Neural Information Processing Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2018.00035"},{"key":"ref30","author":"kim","year":"2016","journal-title":"LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems[J]"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3272"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4069"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3323933.3324085"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987568"},{"key":"ref10","first-page":"105","author":"staniford","year":"0","journal-title":"Practical automated detection of stealthy portscans Journal of Computer Security 10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1989.10488517"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44795-4_26"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.22"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254306"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.823851"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00026-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"ref28","author":"mat","year":"2014","journal-title":"Spatio-temporal outlier detection in streaming trajectory data"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/5.58337"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495972"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.09.055"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.1988.113412"},{"key":"ref7","first-page":"3448","article-title":"An overview of anomaly detection techniques","volume":"51","author":"patcha","year":"2007","journal-title":"Existing solutions and latest technological trends Comput Networks"},{"key":"ref2","first-page":"1","article-title":"Data mining approach for intrusion detection","author":"lee","year":"1998","journal-title":"In USENIX Security Symposium"},{"key":"ref9","article-title":"Requirements and Model for IDES---A Real-time Intrusion Detection System","author":"denning","year":"1985","journal-title":"Computer Science Laboratory SRI International"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref20","first-page":"123","article-title":"Using artificial anomalies to detect unknown and known network intrusions","author":"fan","year":"2001","journal-title":"proceedings of SIAM International Conference on Data Mining"},{"key":"ref22","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"The Proceedings of the 7th USENIX Security Symposium"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006624031083"},{"key":"ref24","first-page":"119","article-title":"A statistical method for profiling network traffic","author":"marchette","year":"1999","journal-title":"In Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring"},{"key":"ref23","author":"tan","year":"2005","journal-title":"Introduction to Data Mining"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,4,15]]},"end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447094.pdf?arnumber=9447094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:21Z","timestamp":1652197341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447094","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}