{"labels":{"en":"MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 3652"},"claims":{"P31":"Q13442814","P1433":"Q125017480","P1476":{"text":"MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-3652/paper8.pdf","P50":[{"value":"Q130808166","qualifiers":{"P1545":"2"}},{"value":"Q131019687","qualifiers":{"P1545":"4"}}],"P2093":[{"value":"Robert J. Joyce","qualifiers":{"P1545":"1"}},{"value":"James Holt","qualifiers":{"P1545":"3"}}]}}