{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T21:10:00Z","timestamp":1755983400772,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T00:00:00Z","timestamp":1723680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,15]]},"DOI":"10.1145\/3685323.3685327","type":"proceedings-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T18:58:31Z","timestamp":1723575511000},"page":"26-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Malware Detection Integrating Cloud and Fog Computing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6956-3461","authenticated-orcid":false,"given":"Carlos H.","family":"Paiva","sequence":"first","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7762-5477","authenticated-orcid":false,"given":"Mateus F.","family":"Nascimento","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0016-0116","authenticated-orcid":false,"given":"Renan L.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7922-0695","authenticated-orcid":false,"given":"Rafael L.","family":"Gomes","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]}],"member":"320","published-online":{"date-parts":[[2024,8,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103409"},{"key":"e_1_3_2_1_2_1","volume-title":"Malware Analysis and Multi-label Category Detection Issues: Ensemble-based Approaches. In 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA). IEEE, 164\u2013169","author":"Alsmadi Izzat","year":"2022","unstructured":"Izzat Alsmadi, Bilal Al-Ahmad, and Mohammad Alsmadi. 2022. Malware Analysis and Multi-label Category Detection Issues: Ensemble-based Approaches. In 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA). IEEE, 164\u2013169."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Tristan Carrier. 2021. Detecting Obfuscated Malware Using Memory Feature Engineering. (2021).","DOI":"10.5220\/0010908200003120"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.01.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym15030677"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3328351"},{"key":"e_1_3_2_1_7_1","volume-title":"Malware Detection Based on API Calls Frequency. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 400\u2013404","author":"Garg Vidhi","year":"2019","unstructured":"Vidhi Garg and Rajesh\u00a0Kumar Yadav. 2019. Malware Detection Based on API Calls Frequency. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 400\u2013404."},{"volume-title":"Deep Learning","author":"Goodfellow Ian","key":"e_1_3_2_1_8_1","unstructured":"Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. The MIT Press."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369449"},{"volume-title":"Exploring the Effectiveness and Efficiency of LightGBM Algorithm for Windows Malware Detection. In 2022 5th Information Technology for Education and Development (ITED)","author":"Onoja Monday","key":"e_1_3_2_1_10_1","unstructured":"Monday Onoja, Abayomi Jegede, Jesse Mazadu, Gilbert Aimufua, Ayodele Oyedele, and Kolawole Olibodum. 2022. Exploring the Effectiveness and Efficiency of LightGBM Algorithm for Windows Malware Detection. In 2022 5th Information Technology for Education and Development (ITED). IEEE, 1\u20136."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154276"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3349701"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154280"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569902.3570171"}],"event":{"name":"LANC 2024: 2024 Latin America Networking Conference","acronym":"LANC 2024","location":"Bahia Blanca Argentina"},"container-title":["Proceedings of the 2024 Latin America Networking Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685323.3685327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3685323.3685327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:32:11Z","timestamp":1755981131000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685323.3685327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,15]]},"references-count":14,"alternative-id":["10.1145\/3685323.3685327","10.1145\/3685323"],"URL":"https:\/\/doi.org\/10.1145\/3685323.3685327","relation":{},"subject":[],"published":{"date-parts":[[2024,8,15]]},"assertion":[{"value":"2024-08-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}