{"labels":{"en":"A Note on Methods for Explainable Malware Analysis"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 4176"},"claims":{"P31":"Q13442814","P1433":null,"P1476":{"text":"A Note on Methods for Explainable Malware Analysis","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-4176/shields-3.pdf","P50":[],"P2093":[{"value":"Martin Homola","qualifiers":{"P1545":"1"}},{"value":"Peter Anthony","qualifiers":{"P1545":"2"}},{"value":"Iveta Bečková","qualifiers":{"P1545":"3"}},{"value":"Ján Kľuka","qualifiers":{"P1545":"4"}},{"value":"Ján Mojžiš","qualifiers":{"P1545":"5"}},{"value":"Peter Švec","qualifiers":{"P1545":"6"}},{"value":"Štefan Balogh","qualifiers":{"P1545":"7"}},{"value":"Franco Alberto Cardillo","qualifiers":{"P1545":"8"}},{"value":"Franca Debole","qualifiers":{"P1545":"9"}},{"value":"Umberto Straccia","qualifiers":{"P1545":"10"}},{"value":"Martin Kenyeres","qualifiers":{"P1545":"11"}},{"value":"Francesco Giannini","qualifiers":{"P1545":"12"}},{"value":"Michelangelo Diligenti","qualifiers":{"P1545":"13"}},{"value":"Marco Gori","qualifiers":{"P1545":"14"}},{"value":"Tomáš Bisták","qualifiers":{"P1545":"15"}},{"value":"Daniel Trizna","qualifiers":{"P1545":"16"}},{"value":"Zekeri Adams","qualifiers":{"P1545":"17"}}]}}