{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:34:14Z","timestamp":1759826054168,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T00:00:00Z","timestamp":1590105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5,22]]},"DOI":"10.1145\/3403746.3403914","type":"proceedings-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T19:06:07Z","timestamp":1593457567000},"page":"112-118","source":"Crossref","is-referenced-by-count":15,"title":["A System-call Behavior Language System for Malware Detection Using A Sensitivity-based LSTM Model"],"prefix":"10.1145","author":[{"given":"Wenqi","family":"Xie","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing Yuanxin Technology, Co. Ltd., Beijing, China"}]},{"given":"Shengwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Information Security Research Institute, Beijing Institute of Electronic Science and Technology, Beijing, China"}]},{"given":"Shihong","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jinwen","family":"Xi","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/System_call  https:\/\/en.wikipedia.org\/wiki\/System_call"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i21\/90273"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"volume-title":"Proceedings of the IEEE Symposium on Security & Privacy","author":"Sekar R","key":"e_1_3_2_1_4_1"},{"volume-title":"IEEE Computer Society","year":"2003","author":"Feng H H","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"PierreFran\u00e7ois Marteau. Sequence Covering for Efficient Host-Based Intrusion Detection[J]. 2017.  PierreFran\u00e7ois Marteau. Sequence Covering for Efficient Host-Based Intrusion Detection[J]. 2017."},{"key":"e_1_3_2_1_7_1","unstructured":"Chan W K. NtMalDetect: A Machine Learning Approach to Malware Detection Using Native API System-calls[J]. 2018.  Chan W K. NtMalDetect: A Machine Learning Approach to Malware Detection Using Native API System-calls[J]. 2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Graves A. Supervised Sequence Labelling with Recurrent Neural Networks[M]\/\/ Supervised sequence labelling with recurrent neural networks. 2012.  Graves A. Supervised Sequence Labelling with Recurrent Neural Networks[M]\/\/ Supervised sequence labelling with recurrent neural networks. 2012.","DOI":"10.1007\/978-3-642-24797-2"},{"volume-title":"EPFL","year":"2001","author":"Gers","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_1_12_1","unstructured":"Kim G Yi H Lee J etal LSTM-Based System-call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems[J]. 2016.  Kim G Yi H Lee J et al. LSTM-Based System-call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems[J]. 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Khandelwal U He H Qi P etal Sharp Nearby Fuzzy Far Away: How Neural Language Models Use Context[J]. 2018.  Khandelwal U He H Qi P et al. Sharp Nearby Fuzzy Far Away: How Neural Language Models Use Context[J]. 2018.","DOI":"10.18653\/v1\/P18-1027"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Glodek W Harang R. Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests[C]\/\/ Military Communications Conference. 2014.  Glodek W Harang R. Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests[C]\/\/ Military Communications Conference. 2014.","DOI":"10.1109\/MILCOM.2013.170"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Aafer Y Du W Yin H. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android[C]\/\/ International Conference on Security & Privacy in Communication Systems. 2013.  Aafer Y Du W Yin H. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android[C]\/\/ International Conference on Security & Privacy in Communication Systems. 2013.","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Burguera I Zurutuza U Nadjm-Tehrani S. Crowdroid: Behavior-Based Malware Detection System for Android[M]. 2011.  Burguera I Zurutuza U Nadjm-Tehrani S. Crowdroid: Behavior-Based Malware Detection System for Android[M]. 2011.","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Vidal JM Monge M A S Villalba Luis Javier Garc\u00eda. A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences[J]. Knowledge-Based Systems 2018:S0950705118301424.  Vidal JM Monge M A S Villalba Luis Javier Garc\u00eda. A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences[J]. Knowledge-Based Systems 2018:S0950705118301424.","DOI":"10.1016\/j.knosys.2018.03.018"},{"volume-title":"IEEE","year":"2015","author":"Lageman N","key":"e_1_3_2_1_18_1"},{"volume-title":"Computer Science","year":"2014","author":"Bahdanau D","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410560573"},{"key":"e_1_3_2_1_21_1","article-title":"A Semantic Approach to Host-based Intrusion Detection Systems Using Contiguous and Discontiguous System-call Patterns. Computers","author":"Creech J.","year":"2013","journal-title":"IEEE Transactions on, PP(99):11"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"e_1_3_2_1_23_1","unstructured":"G. Creech. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks 2014.  G. Creech. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks 2014."},{"key":"e_1_3_2_1_24_1","unstructured":"Dimja\u0161evi\u0107 Marko Atzeni Simone Ugrina Ivo & Rakamari\u0107 Zvonimir. (2016). Evaluation of Android Malware Detection Based on System-calls - Dataset [Data set]. Zenodo. http:\/\/doi.org\/10.5281\/zenodo.154737.  Dimja\u0161evi\u0107 Marko Atzeni Simone Ugrina Ivo & Rakamari\u0107 Zvonimir. (2016). Evaluation of Android Malware Detection Based on System-calls - Dataset [Data set]. Zenodo. http:\/\/doi.org\/10.5281\/zenodo.154737."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"}],"event":{"name":"CSSE 2020: 2020 3rd International Conference on Computer Science and Software Engineering","sponsor":["National Central University National Central University","NCCU National Chung Cheng University"],"location":"Beijing China","acronym":"CSSE 2020"},"container-title":["Proceedings of the 2020 3rd International Conference on Computer Science and Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3403746.3403914","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:22Z","timestamp":1750199902000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3403746.3403914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,22]]},"references-count":25,"alternative-id":["10.1145\/3403746.3403914","10.1145\/3403746"],"URL":"https:\/\/doi.org\/10.1145\/3403746.3403914","relation":{},"subject":[],"published":{"date-parts":[[2020,5,22]]}}}