{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:54Z","timestamp":1750221294006,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,2]]},"DOI":"10.1145\/3206129.3239430","type":"proceedings-article","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T12:16:08Z","timestamp":1538396168000},"page":"102-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Trend of Malware Detection Using Deep Learning"],"prefix":"10.1145","author":[{"given":"Yoon-seon","family":"Lee","sequence":"first","affiliation":[{"name":"Hannam University, Daejeon, Republic of Korea, Hannam-ro, Daedeok-gu"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jae-ung","family":"Lee","sequence":"additional","affiliation":[{"name":"Hannam University, Daejeon, Republic of Korea, Hannam-ro, Daedeok-gu"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Woo-young","family":"Soh","sequence":"additional","affiliation":[{"name":"Hannam University, Daejeon, Republic of Korea, Hannam-ro, Daedeok-gu"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kaspersky lab korea. report 26 % of the fastest evolving security threat ransomware is targeted at companies http:\/\/news.kaspersky.co.kr\/news2017\/12n\/171201.htm  Kaspersky lab korea. report 26 % of the fastest evolving security threat ransomware is targeted at companies http:\/\/news.kaspersky.co.kr\/news2017\/12n\/171201.htm"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Michael Sikorski Andres Honig. 2012. Practical Malware analysis.  Michael Sikorski Andres Honig. 2012. Practical Malware analysis.","DOI":"10.1016\/S1353-4858(12)70109-5"},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"17","article-title":"Big Data and Information Security","volume":"10","author":"Chung Kyo-Il","year":"2012","unstructured":"Kyo-Il Chung , Han-na Park, Boo-Geum Jung , Jong-Soo Jang , Myung-Ae Chung . 2012 . Big Data and Information Security . Korea Institute of Information Technology Magazine , 10 ( 3 ), 17 -- 22 . Kyo-Il Chung, Han-na Park, Boo-Geum Jung, Jong-Soo Jang, Myung-Ae Chung. 2012. Big Data and Information Security. Korea Institute of Information Technology Magazine, 10(3), 17--22.","journal-title":"Korea Institute of Information Technology Magazine"},{"key":"e_1_3_2_1_4_1","unstructured":"Deep Learning from Scratch. 2016. O'Reilly Japan  Deep Learning from Scratch. 2016. O'Reilly Japan"},{"key":"e_1_3_2_1_5_1","volume-title":"Convolutional Neural Networks for Malware Classification","author":"Gibert Daniel","year":"2016","unstructured":"Daniel Gibert . Convolutional Neural Networks for Malware Classification . 2016 . Master Thesis, Universitat de Barcelona Daniel Gibert. Convolutional Neural Networks for Malware Classification. 2016. Master Thesis, Universitat de Barcelona"},{"key":"e_1_3_2_1_6_1","unstructured":"Jae Woon Park. 2016. Deep Learning Based Malware Detection Using API Features. Department of IT Convergence Information Security Graduate School of KonKuk Universi http:\/\/konkuk.dcollection.net\/public_resource\/pdf\/000002316768_20180522134444.pdf  Jae Woon Park. 2016. Deep Learning Based Malware Detection Using API Features. Department of IT Convergence Information Security Graduate School of KonKuk Universi http:\/\/konkuk.dcollection.net\/public_resource\/pdf\/000002316768_20180522134444.pdf"},{"issue":"5","key":"e_1_3_2_1_7_1","first-page":"1087","article-title":"Android Malware Analysis Technology Research Based on Naive Bayes","volume":"27","year":"2017","unstructured":"Jun-ho Hwang, Tae-jin Lee. 2017 . Android Malware Analysis Technology Research Based on Naive Bayes . Journal of the Korea Institute of Information Security & Cryptology , 27 ( 5 ), 1087 -- 1097 . Jun-ho Hwang, Tae-jin Lee. 2017. Android Malware Analysis Technology Research Based on Naive Bayes. Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1087--1097.","journal-title":"Journal of the Korea Institute of Information Security & Cryptology"},{"issue":"2","key":"e_1_3_2_1_8_1","first-page":"76","article-title":"Image-based Artificial Intelligence Deep Learning to Protect the Big Data from Malware","volume":"54","author":"Kim Hae Jung","year":"2017","unstructured":"Hae Jung Kim , Eun Jun Yoon . 2017 . Image-based Artificial Intelligence Deep Learning to Protect the Big Data from Malware . Journal of the Institute of Electronics and Information Engineers , 54 ( 2 ), 76 -- 82 .\" Hae Jung Kim, Eun Jun Yoon. 2017. Image-based Artificial Intelligence Deep Learning to Protect the Big Data from Malware. Journal of the Institute of Electronics and Information Engineers, 54(2), 76--82.\"","journal-title":"Journal of the Institute of Electronics and Information Engineers"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2016.26.1.197"},{"key":"e_1_3_2_1_10_1","unstructured":"Sungtaek OH Woong Go Junhyung Park. 2017. A Study on the Machine Learning Algorithm for Mobile Malware Detection.\" Korea Information Science Society 1111--1113.  Sungtaek OH Woong Go Junhyung Park. 2017. A Study on the Machine Learning Algorithm for Mobile Malware Detection.\" Korea Information Science Society 1111--1113."},{"volume-title":"Study on DNN Based Android Malware Detection Method for Mobile Environment","author":"Jin Hyun Yu.","key":"e_1_3_2_1_11_1","unstructured":"Jin Hyun Yu. 2017. Study on DNN Based Android Malware Detection Method for Mobile Environment . Department of Information Security Graduate School of Information Security Korea University Jin Hyun Yu. 2017. Study on DNN Based Android Malware Detection Method for Mobile Environment. Department of Information Security Graduate School of Information Security Korea University"}],"event":{"name":"ICEMT 2018: 2018 2nd International Conference on Education and Multimedia Technology","acronym":"ICEMT 2018","location":"Okinawa Japan"},"container-title":["Proceedings of the 2nd International Conference on Education and Multimedia Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206129.3239430","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3206129.3239430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:35Z","timestamp":1750212695000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206129.3239430"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,2]]},"references-count":11,"alternative-id":["10.1145\/3206129.3239430","10.1145\/3206129"],"URL":"https:\/\/doi.org\/10.1145\/3206129.3239430","relation":{},"subject":[],"published":{"date-parts":[[2018,7,2]]},"assertion":[{"value":"2018-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}