{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-3652/paper8.html","spt.description":null,"spt.id":"Vol-3652/paper8","spt.wikidataid":null,"spt.title":"MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers","spt.pdfUrl":"https://ceur-ws.org/Vol-3652/paper8.pdf","spt.volume":{"number":3652,"acronym":"CAMLIS 2023","wikidataid":"Q125017480","title":"Proceedings of the Conference on Applied Machine Learning in Information Security","description":"Proceedings of CAMLIS 2023 workshop","url":"http://ceur-ws.org/Vol-3652/","date":"2024-03-18","dblp":null,"k10plus":null,"urn":"urn:nbn:de:0074-3652-0"},"spt.session":null,"cvb.id":"Vol-3652/paper8","cvb.title":"MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"Robert J. Joyce,Edward Raff,Charles Nicholas,James Holt","cvb.vol_number":"3652","cvb.pdf_name":"paper8.pdf","cvb.pages":"105-121","cvb.fail":null,"dblp.dblp_publication_id":"https://dblp.org/rec/conf/camlis/JoyceRNH23","dblp.dblp_proceeding_id":"https://dblp.org/rec/conf/camlis/2023","dblp.volume_number":3652,"dblp.title":"MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers.","dblp.authors":[{"dblp_author_id":"https://dblp.org/pid/204/3369","label":"Edward Raff","wikidata_id":"Q130808166","orcid_id":"0000-0002-9900-1972","gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/299/8450","label":"Robert J. Joyce","wikidata_id":null,"orcid_id":null,"gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/93/1248","label":"James Holt","wikidata_id":null,"orcid_id":null,"gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/n/CharlesKNicholas","label":"Charles K. Nicholas","wikidata_id":"Q131019687","orcid_id":"0000-0001-9494-7139","gnd_id":null}],"dblp.pdf_id":"Vol-3652/paper8"}