{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:09Z","timestamp":1755780009167,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T00:00:00Z","timestamp":1700784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,24]]},"DOI":"10.1145\/3656766.3656793","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T18:34:34Z","timestamp":1717266874000},"page":"151-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Application Security Requirements Analysis Method Based on Knowledge Graph"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2574-7875","authenticated-orcid":false,"given":"Chengtao","family":"Wang","sequence":"first","affiliation":[{"name":"Wuhan Windoor Information &amp;Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8322-2486","authenticated-orcid":false,"given":"Fei","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan Windoor Information &amp;Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4223-619X","authenticated-orcid":false,"given":"Xinjian","family":"Li","sequence":"additional","affiliation":[{"name":"China Tobacco Hubei Industrial LLC, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0604-3188","authenticated-orcid":false,"given":"Xiaohu","family":"Chen","sequence":"additional","affiliation":[{"name":"China Tobacco Hubei Industrial LLC, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"669","volume":"44","author":"Tiantian JI","year":"2021","unstructured":"JI Tiantian, FANG Binxing, CUI Xiang, Research Progress of Deep Learning Enabled Attack and Defense of Malicious Code[J]. Chinese Journal of Computers, 2021, 44(4):669-695.","journal-title":"Chinese Journal of Computers"},{"volume-title":"Research on Visualization Method of Malware Opcode[EB\/OL]","author":"Zhuojun REN","key":"e_1_3_2_1_2_1","unstructured":"REN Zhuojun, CHEN Guang, LU Wenke. Research on Visualization Method of Malware Opcode[EB\/OL]. http:\/\/kns.cnki.net\/kcms\/detail\/11.2127.TP.20201126.0907.002.html, 2021, 06-20."},{"key":"e_1_3_2_1_3_1","first-page":"558","volume-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Tong HE","year":"2019","unstructured":"HE Tong, ZHANG Zhi, ZHANG Hang, Bag of Tricks for Image Classification with Convolutional Neural Networks [C]\/\/IEEE. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 15-20, 2019, Long Beach, CA, USA. New York: IEEE, 2019: 558-567."},{"issue":"12","key":"e_1_3_2_1_4_1","first-page":"72","volume":"20","author":"Yang TAN","year":"2020","unstructured":"TAN Yang, LIU Jiayong, ZHANG Lei. Malware Family Classification of Deep Self Encoder Based on Mixed Features[J]. Information Network Security, 2020, 20(12):72-82.","journal-title":"Information Network Security"},{"key":"e_1_3_2_1_5_1","volume-title":"Visualization and Automatic Classification of Malicious Code with Enhanced Information Density [J]","author":"Yashu LIU","year":"2019","unstructured":"LIU Yashu, WANG Zhihai, HOU Yueran, Visualization and Automatic Classification of Malicious Code with Enhanced Information Density [J]. Journal of Tsinghua University (Natural Science Edition), 2019, 59(1):9-14."},{"issue":"4","key":"e_1_3_2_1_6_1","first-page":"162","volume":"46","author":"Yaqin ZENG","year":"2020","unstructured":"ZENG Yaqin, ZHANG Linlin, ZHANG Ruonan, Classification Model of Malware Family Based on Mobile Net[J]. Computer Engineering, 2020, 46(4):162-168.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_1_7_1","volume-title":"Selecting Features to Classify Malware [EB\/OL]. https:\/\/2012.infosecsouthwest.com\/files\/speaker_materials\/ISSW2012_Selecting_Features_to_Classify_Malware.pdf","author":"RAMAN","year":"2021","unstructured":"RAMAN K. Selecting Features to Classify Malware [EB\/OL]. https:\/\/2012.infosecsouthwest.com\/files\/speaker_materials\/ISSW2012_Selecting_Features_to_Classify_Malware.pdf, 2021, 06-01."},{"key":"e_1_3_2_1_8_1","first-page":"40","volume-title":"2018 20th International Conference on Advanced Communication Technology (ICACT)","author":"KIM C H, KABANGA E K, KANG S","year":"2018","unstructured":"KIM C H, KABANGA E K, KANG S J. Classifying Malware Using Convolutional Gated Neural Network [C]\/\/ICACT. 2018 20th International Conference on Advanced Communication Technology (ICACT), February 11-14, 2018, Chuncheon, Korea (South). New York: IEEE, 2018: 40-44."},{"issue":"10","key":"e_1_3_2_1_9_1","first-page":"155270","volume":"7","author":"Xin MA","year":"2019","unstructured":"MA Xin, GUO Shize, LI Haiying, How to Make Attention Mechanisms More Practical in Malware Classification[J]. IEEE Access, 2019, 7(10):155270-155280.","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2884928"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"e_1_3_2_1_13_1","first-page":"533","volume-title":"2018 26th European Signal Processing Conference (EUSIPCO)","author":"Adversarial Malware Binaries KOLOSNJAJI B, DEMONTIS A, BIGGIO B","year":"2018","unstructured":"KOLOSNJAJI B, DEMONTIS A, BIGGIO B, Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables [C]\/\/IEEE. 2018 26th European Signal Processing Conference (EUSIPCO), September 3-7, 2018, Rome, Italy. Italy: IEEE, 2018: 533-537."},{"key":"e_1_3_2_1_14_1","volume-title":"ZHAO Zhe","author":"Weijie LIU","year":"2021","unstructured":"LIU Weijie, ZHOU Peng, ZHAO Zhe, K-bert: Enabling Language Representation with Knowledge Graph[EB\/OL]. https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/5681, 2021, 06-01."},{"key":"e_1_3_2_1_15_1","volume-title":"N-gram Opcode Analysis for Android Malware Detection [EB\/OL]. https:\/\/arxiv.org\/abs\/1612.01445","author":"KANG B J, YERIMA S Y, SEZER","year":"2021","unstructured":"KANG B J, YERIMA S Y, SEZER S, N-gram Opcode Analysis for Android Malware Detection [EB\/OL]. https:\/\/arxiv.org\/abs\/1612.01445, 2021, 06-01."}],"event":{"name":"ICBAR 2023: 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management","acronym":"ICBAR 2023","location":"Chengdu China"},"container-title":["Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656793","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656766.3656793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:12:12Z","timestamp":1755778332000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,24]]},"references-count":15,"alternative-id":["10.1145\/3656766.3656793","10.1145\/3656766"],"URL":"https:\/\/doi.org\/10.1145\/3656766.3656793","relation":{},"subject":[],"published":{"date-parts":[[2023,11,24]]},"assertion":[{"value":"2024-06-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}