{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:05:38Z","timestamp":1772301938043,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.23919\/wac50355.2021.9559449","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:32:30Z","timestamp":1633908750000},"page":"21-25","source":"Crossref","is-referenced-by-count":22,"title":["An Assistive Tool For Fileless Malware Detection"],"prefix":"10.23919","author":[{"given":"Pramod","family":"Borana","sequence":"first","affiliation":[]},{"given":"Vikas","family":"Sihag","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Choudhary","sequence":"additional","affiliation":[]},{"given":"Manu","family":"Vardhan","sequence":"additional","affiliation":[]},{"given":"Pradeep","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The evolution to fileless malware","author":"patten","year":"0"},{"key":"ref11","article-title":"The tao of .net and powershell malware analysis","author":"pontiroli","year":"2015","journal-title":"Virus Bulletin Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34339-2_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSITSS.2018.8768769"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301176"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100365"},{"key":"ref16","first-page":"34","article-title":"De-lady: Deep learning based android malware detection using dynamic features","volume":"11","author":"sihag","year":"2021","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.8.4-2.6827"},{"key":"ref18","article-title":"Rise of fileless malware","author":"smelcer","year":"2017","journal-title":"Ph D Dissertation"},{"key":"ref19","first-page":"31","article-title":"Signature scheme from trapdoor functions","volume":"9","author":"wang","year":"2019","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref4","first-page":"14","article-title":"Secure and usable bio-passwords based on confidence interval","volume":"7","author":"kim","year":"2017","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref3","article-title":"Scheduling priorities - windows applications","year":"2018","journal-title":"Microsoft com"},{"key":"ref6","article-title":"Fileless cyberattacks: Analysis and classification","author":"lee","year":"2020","journal-title":"ETRI Journal"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0043-x","article-title":"An emerging threat fileless malware: a survey and research challenges","volume":"3","author":"kumar","year":"2020","journal-title":"Cybersecurity"},{"key":"ref8","first-page":"1","article-title":"D-bridemaid: A distributed framework for collaborative and dynamic analysis of android malware","volume":"11","author":"marra","year":"2020","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(17)30037-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1450\/1\/012075"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326083"},{"key":"ref9","first-page":"63","article-title":"Research on note-taking apps with security features","volume":"11","author":"park","year":"2020","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA)"}],"event":{"name":"2021 World Automation Congress (WAC)","location":"Taipei, Taiwan","start":{"date-parts":[[2021,8,1]]},"end":{"date-parts":[[2021,8,5]]}},"container-title":["2021 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9559429\/9559420\/09559449.pdf?arnumber=9559449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:10:41Z","timestamp":1639429841000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.23919\/wac50355.2021.9559449","relation":{},"subject":[],"published":{"date-parts":[[2021,8,1]]}}}