iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/FIT53504.2021.00053
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:30:35Z","timestamp":1725759035357},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/fit53504.2021.00053","type":"proceedings-article","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T20:46:26Z","timestamp":1644353186000},"page":"246-251","source":"Crossref","is-referenced-by-count":2,"title":["Malware Detection and Classification along with Trade-off Analysis for Number of Features, Feature Types, and Speed"],"prefix":"10.1109","author":[{"given":"Duaa","family":"Baig","sequence":"first","affiliation":[{"name":"Salim Habib University,Department of Computer Science,Karachi,Pakistan"}]},{"given":"Muhammad U.S.","family":"Khan","sequence":"additional","affiliation":[{"name":"COMSATS University Islamabad,Abbottabad Campus,Pakistan"}]},{"given":"Darren","family":"Dancey","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,UK"}]},{"given":"Assad","family":"Abbas","sequence":"additional","affiliation":[{"name":"COMSATS University Islamabad,Islamabad Campus,Pakistan"}]},{"given":"Mazhar","family":"Ali","sequence":"additional","affiliation":[{"name":"COMSATS University Islamabad,Abbottabad Campus,Pakistan"}]},{"given":"Raheel","family":"Nawaz","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,UK"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-013-0185-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v77.3558"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2016.7831719"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.12.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.222"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWS48432.2020.9292384"},{"journal-title":"Financial damage caused by reported cyber crimes in the US dollars","year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"journal-title":"arXiv preprint arXiv 1802 02172","article-title":"Leveraging Uncertainty for Effective Malware Mitigation","year":"2018","author":"sun","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"journal-title":"arXiv preprint arXiv 1710 09435","article-title":"Malware Detection by Eating a Whole EXE","year":"2017","author":"raff","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS4.2019.8903989"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176335"}],"event":{"name":"2021 International Conference on Frontiers of Information Technology (FIT)","start":{"date-parts":[[2021,12,13]]},"location":"Islamabad, Pakistan","end":{"date-parts":[[2021,12,14]]}},"container-title":["2021 International Conference on Frontiers of Information Technology (FIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9701367\/9701368\/09701433.pdf?arnumber=9701433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:38:12Z","timestamp":1655761092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9701433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/fit53504.2021.00053","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}