{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:23:42Z","timestamp":1772583822563,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["1490017"],"award-info":[{"award-number":["1490017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243811","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"592-605","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":119,"title":["Tiresias"],"prefix":"10.1145","author":[{"given":"Yun","family":"Shen","sequence":"first","affiliation":[{"name":"Symantec, Reading, United Kingdom"}]},{"given":"Enrico","family":"Mariconti","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Pierre Antoine","family":"Vervier","sequence":"additional","affiliation":[{"name":"Symantec, Sophia Antipolis, France"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, Boston, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134022"},{"key":"e_1_3_2_2_2_1","volume-title":"Lai","author":"Brown Peter F.","year":"1992"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"e_1_3_2_2_4_1","volume-title":"Neural Nets Can Learn Function Type Signatures From Binaries. In USENIX Security Symposium.","author":"Chua Zheng Leong","year":"2017"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.48"},{"key":"e_1_3_2_2_7_1","volume-title":"USENIX Security Symposium.","author":"Gu Guofei","year":"2007"},{"key":"e_1_3_2_2_8_1","unstructured":"Michiel Hermans and Benjamin Schrauwen. 2013. Training and analysing deep recurrent neural networks. In NIPS.   Michiel Hermans and Benjamin Schrauwen. 2013. Training and analysing deep recurrent neural networks. In NIPS."},{"key":"e_1_3_2_2_9_1","volume-title":"Detecting Credential Spearphishing in Enterprise Settings. In USENIX Security Symposium.","author":"Ho Grant","year":"2017"},{"key":"e_1_3_2_2_10_1","unstructured":"Lukasz Kaiser Ofir Nachum Aurko Roy and Samy Bengio. 2017. Learning to Remember Rare Events. In ICLR.  Lukasz Kaiser Ofir Nachum Aurko Roy and Samy Bengio. 2017. Learning to Remember Rare Events. In ICLR."},{"key":"e_1_3_2_2_11_1","unstructured":"Kamvar Kamvar Sepandar Sepandar Klein Klein Dan Dan Manning Manning and Christopher Christopher. 2003. Spectral learning. In IJCAI.   Kamvar Kamvar Sepandar Sepandar Klein Klein Dan Dan Manning Manning and Christopher Christopher. 2003. Spectral learning. In IJCAI."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Yoon Kim Yacine Jernite David Sontag and Alexander M Rush. 2016. Character-Aware Neural Language Models.. In AAAI.   Yoon Kim Yacine Jernite David Sontag and Alexander M Rush. 2016. Character-Aware Neural Language Models.. In AAAI.","DOI":"10.1609\/aaai.v30i1.10362"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Junseok Kwon and Kyoung Mu Lee. 2012. A unified framework for event summarization and rare event detection. In CVPR.  Junseok Kwon and Kyoung Mu Lee. 2012. A unified framework for event summarization and rare event detection. In CVPR.","DOI":"10.1109\/CVPR.2012.6247810"},{"key":"e_1_3_2_2_17_1","volume-title":"USENIX Security Symposium.","author":"Blond Stevens Le","year":"2014"},{"key":"e_1_3_2_2_18_1","volume-title":"USENIX Security Symposium.","author":"Liu Yang","year":"2015"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2713579.2713582"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_2_21_1","volume-title":"USENIX Security Symposium.","author":"Melicher William","year":"2016"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_2_23_1","volume-title":"Markov chains. Number 2","author":"Norris James R"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","volume-title":"Malware classification with recurrent networks","author":"Pascanu Razvan","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"e_1_3_2_2_25_1","volume-title":"USENIX Security Symposium.","author":"Provos Niels","year":"2003"},{"key":"e_1_3_2_2_26_1","volume-title":"Browser: Analysis of Web-based Malware. HotBots.","author":"Provos Niels","year":"2007"},{"key":"e_1_3_2_2_27_1","volume-title":"Recurrent memory array structures. arXiv preprint arXiv:1607.03085","author":"Rocki Kamil","year":"2016"},{"key":"e_1_3_2_2_28_1","volume-title":"USENIX Security Symposium. 1041--1056","author":"Sabottke Carl","year":"2015"},{"key":"e_1_3_2_2_29_1","volume-title":"Recognizing Functions in Binaries with Neural Networks. In USENIX Security Symposium.","author":"Richard Shin Eui Chul","year":"2015"},{"key":"e_1_3_2_2_30_1","volume-title":"USENIX Security Symposium. 625--640","author":"Soska Kyle","year":"2014"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134604"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_5"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_2_35_1","unstructured":"Gary M Weiss and Haym Hirsh. 1998. Learning to Predict Rare Events in Event Sequences.. In KDD.   Gary M Weiss and Haym Hirsh. 1998. Learning to Predict Rare Events in Event Sequences.. In KDD."},{"key":"e_1_3_2_2_36_1","unstructured":"Jianxin Wu James M Rehg and Matthew D Mullin. 2004. Learning a rare event detection cascade by direct feature selection. In NIPS.   Jianxin Wu James M Rehg and Matthew D Mullin. 2004. Learning a rare event detection cascade by direct feature selection. In NIPS."},{"key":"e_1_3_2_2_37_1","unstructured":"Saizheng Zhang Yuhuai Wu Tong Che Zhouhan Lin Roland Memisevic Ruslan R Salakhutdinov and Yoshua Bengio. 2016. Architectural complexity measures of recurrent neural networks. In NIPS.   Saizheng Zhang Yuhuai Wu Tong Che Zhouhan Lin Roland Memisevic Ruslan R Salakhutdinov and Yoshua Bengio. 2016. Architectural complexity measures of recurrent neural networks. In NIPS."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:19Z","timestamp":1750212499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243811"}},"subtitle":["Predicting Security Events Through Deep Learning"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":37,"alternative-id":["10.1145\/3243734.3243811","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243811","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}