{"created":"2021-03-01T07:24:47.261983+00:00","id":45020,"links":{},"metadata":{"_buckets":{"deposit":"3b2f3337-0987-4ac3-8666-f0df8028b56b"},"_deposit":{"created_by":188,"id":"45020","owners":[188],"pid":{"revision_id":0,"type":"depid","value":"45020"},"status":"published"},"_oai":{"id":"oai:tsukuba.repo.nii.ac.jp:00045020","sets":["152:6319","3:62:5592:1847"]},"author_link":["180856","181031"],"item_1644910766877":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_5_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2017-02","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"233","bibliographicPageStart":"229","bibliographicVolumeNumber":"25","bibliographic_titles":[{"bibliographic_title":"Journal of information processing","bibliographic_titleLang":"en"}]}]},"item_5_publisher_27":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"},{"subitem_publisher":"Information Processing Society of Japan","subitem_publisher_language":"en"}]},"item_5_relation_11":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.2197/ipsjjip.25.229","subitem_relation_type_select":"DOI"}}]},"item_5_rights_12":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"©2017 Information Processing Society of Japan","subitem_rights_language":"en"},{"subitem_rights":"Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof.","subitem_rights_language":"en"}]},"item_5_source_id_7":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0387-6101","subitem_source_identifier_type":"PISSN"}]},"item_5_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00700121","subitem_source_identifier_type":"NCID"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Okumura, Takahiro","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大山, 恵弘","creatorNameLang":"ja"},{"creatorName":"オオヤマ, ヨシヒロ","creatorNameLang":"ja-Kana"},{"creatorName":"OYAMA, Yoshihiro","creatorNameLang":"en"}],"nameIdentifiers":[{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2018-01-25"}],"displaytype":"detail","filename":"JIP_25-229.pdf","filesize":[{"value":"442.2 kB"}],"format":"application/pdf","mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://tsukuba.repo.nii.ac.jp/record/45020/files/JIP_25-229.pdf"},"version_id":"69e9ba1d-6f3f-46d2-a5bb-2e4cb8c97788"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Grammar Compression of Call Traces in Dynamic Malware Analysis","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Grammar Compression of Call Traces in Dynamic Malware Analysis","subitem_title_language":"en"}]},"item_type_id":"5","owner":"188","path":["6319","1847"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-01-25"},"publish_date":"2018-01-25","publish_status":"0","recid":"45020","relation_version_is_last":true,"title":["Grammar Compression of Call Traces in Dynamic Malware Analysis"],"weko_creator_id":"188","weko_shared_id":-1},"updated":"2024-02-06T02:40:36.364139+00:00"}