{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:21:05Z","timestamp":1740100865321,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/vtc2022-spring54318.2022.9860934","type":"proceedings-article","created":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T19:39:23Z","timestamp":1661456363000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Automated Data Format Identification and Processing for Security Analysis"],"prefix":"10.1109","author":[{"given":"Timothy","family":"Bernard","sequence":"first","affiliation":[{"name":"Embry-Riddle Aeronautical University,Department of Mathematics,Daytona Beach,FL,32114"}]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[{"name":"Embry-Riddle Aeronautical University,Department of Electrical Engineering and Computer Science,Daytona Beach,FL,32114"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Threat modeling as a basis for security requirements","volume":"2005","author":"myagmar","year":"2005","journal-title":"Symposium on Requirements Engineering for Information Security (SREIS)"},{"journal-title":"Threat Modeling Designing for Security","year":"2014","author":"shostack","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232209"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine learning and deep learning methods for cybersecurity","volume":"6","author":"xin","year":"2018","journal-title":"IEEE Access"},{"key":"ref15","first-page":"14","article-title":"Machine learning classifiers to detect malicious websites","volume":"1950","author":"urcuqui","year":"2017","journal-title":"CEUR Workshop Proceedings"},{"journal-title":"Classification of malicious web servers","year":"2019","author":"bernard","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334558"},{"key":"ref18","first-page":"42","article-title":"Genetic programming and Knearest neighbour classifier based intrusion detection model","author":"malhotra","year":"2017","journal-title":"2017 7th International Conference on Cloud Computing Data Science Engineering - Confluence (ICCCDSE)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3018677"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2012.6215346"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECE.2017.8526232"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-00906-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.176"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090604"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322600"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09685-9"},{"key":"ref1","article-title":"Hidost: a static machine-learning-based detector of malicious files","volume":"22","author":"\u0161rndi?","year":"2016","journal-title":"EURASIP Journal on Information Security 2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3099028"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2650204"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2529723"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/9781119226079"}],"event":{"name":"2022 IEEE 95th Vehicular Technology Conference (VTC2022-Spring)","start":{"date-parts":[[2022,6,19]]},"location":"Helsinki, Finland","end":{"date-parts":[[2022,6,22]]}},"container-title":["2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9860273\/9860350\/09860934.pdf?arnumber=9860934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T20:22:21Z","timestamp":1663618941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9860934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/vtc2022-spring54318.2022.9860934","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}