{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T05:00:32Z","timestamp":1744434032213},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/tale48000.2019.9225899","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T19:58:51Z","timestamp":1602791931000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Malware Detection using Hybrid Autoencoder Approach for Better Security in Educational Institutions"],"prefix":"10.1109","author":[{"given":"Irvan","family":"Santoso","sequence":"first","affiliation":[]},{"given":"Yaya","family":"Heryadi","sequence":"additional","affiliation":[]},{"given":"Harco Leslie Hendric Spits","family":"Warnars","sequence":"additional","affiliation":[]},{"given":"Lili Ayu","family":"Wulandhari","sequence":"additional","affiliation":[]},{"family":"Lukas","sequence":"additional","affiliation":[]},{"given":"Edi","family":"Abdurachman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.30645\/ijistech.v1i1.6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.11.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4467\/20838476SI.16.004.6185"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"ref31","article-title":"A Multifamily Android Malware Detection Using Deep Autoencoder Based Feature Extraction","author":"john","year":"2017","journal-title":"Ninth International Conference on Advanced Computing (ICoAC)"},{"key":"ref30","first-page":"61","article-title":"DL4MD: A deep learning framework for intelligent malware detection","author":"hardy","year":"2016","journal-title":"Proc International Conference on Data Mining"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.96.022140"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0093766"},{"key":"ref35","article-title":"Activation functions: Comparison of trends in practice and research for deep learning","author":"nwankpa","year":"2018","journal-title":"arXiv preprint arXiv 1811 03378"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462507"},{"journal-title":"Rethinking Education in the Age of Technology The Digital Revolution and Schooling in America","year":"2018","author":"collins","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2807412"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5171\/2016.329374"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317914"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897860"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0244-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805301"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00067"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31863-9_11"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2016.7423298"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0010-y"},{"journal-title":"IBM","article-title":"2017 Cost of Data Breach Study: Global Overview","year":"2017","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.027"},{"journal-title":"Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software","year":"2012","author":"sikorski","key":"ref3"},{"journal-title":"2019 State of Malware","article-title":"2019 State of Malware","year":"2019","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6385-5_23"},{"journal-title":"AV","article-title":"Malware","year":"2019","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCF.2016.7740434"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2016.7888735"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2016.7746083"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.19101\/IJACR.2016.623006"},{"journal-title":"Malware and its Impact in Educational Institutions","article-title":"Proactive Cyber Security. Detect & Respond-Faster-with Infocyte HUNT","year":"2017","key":"ref46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.022"},{"journal-title":"Neural Network Programming with TensorFlow","year":"2017","author":"ghotra","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2014.10.027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2526689"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2717439"},{"key":"ref41","first-page":"234","article-title":"U-Net: Convolutional Networks for Biomedical Image Segmentation","author":"ronneberger","year":"2015","journal-title":"Lecture Notes in Computer Science Medical Image Computing and Computer-Assisted Intervention &#x2013; MICCAI 2015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkv468"},{"journal-title":"theZoo - A Live Malware Repository","article-title":"theZoo - A Live Malware Repository","year":"2019","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742726"},{"journal-title":"samples virussign com - \/samples\/","article-title":"Virus Samples","year":"2019","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.01.032"}],"event":{"name":"2019 IEEE International Conference on Engineering, Technology and Education (TALE)","start":{"date-parts":[[2019,12,10]]},"location":"Yogyakarta, Indonesia","end":{"date-parts":[[2019,12,13]]}},"container-title":["2019 IEEE International Conference on Engineering, Technology and Education (TALE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9220968\/9225848\/09225899.pdf?arnumber=9225899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:46:38Z","timestamp":1658094398000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225899\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/tale48000.2019.9225899","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}