{"created":"2021-03-01T07:29:21.236719+00:00","id":49173,"links":{},"metadata":{"_buckets":{"deposit":"b10ca1a4-3609-40aa-afa0-f9f299ddd03e"},"_deposit":{"created_by":188,"id":"49173","owners":[188],"pid":{"revision_id":0,"type":"depid","value":"49173"},"status":"published"},"_oai":{"id":"oai:tsukuba.repo.nii.ac.jp:00049173","sets":["152:6319","3:62:5592:1847"]},"author_link":["181031"],"item_1644910766877":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_5_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"476","bibliographicPageStart":"461","bibliographicVolumeNumber":"26","bibliographic_titles":[{"bibliographic_title":"Journal of information processing","bibliographic_titleLang":"en"}]}]},"item_5_publisher_27":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"},{"subitem_publisher":"Information Processing Society of Japan","subitem_publisher_language":"en"}]},"item_5_relation_11":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.2197/ipsjjip.26.461","subitem_relation_type_select":"DOI"}}]},"item_5_rights_12":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"©2018 Information Processing Society of Japan","subitem_rights_language":"en"},{"subitem_rights":"Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof.","subitem_rights_language":"en"}]},"item_5_source_id_7":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0387-6101","subitem_source_identifier_type":"PISSN"}]},"item_5_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00700121","subitem_source_identifier_type":"NCID"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"大山, 恵弘","creatorNameLang":"ja"},{"creatorName":"オオヤマ, ヨシヒロ","creatorNameLang":"ja-Kana"},{"creatorName":"OYAMA, Yoshihiro","creatorNameLang":"en"}],"nameIdentifiers":[{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-02-19"}],"displaytype":"detail","filename":"JIP_26-461.pdf","filesize":[{"value":"738.5 kB"}],"format":"application/pdf","mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://tsukuba.repo.nii.ac.jp/record/49173/files/JIP_26-461.pdf"},"version_id":"aa715ebe-ed6d-4f2f-a0a7-db84e0f5a597"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Investigation of the Diverse Sleep Behavior of Malware","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Investigation of the Diverse Sleep Behavior of Malware","subitem_title_language":"en"}]},"item_type_id":"5","owner":"188","path":["6319","1847"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2019-02-19"},"publish_date":"2019-02-19","publish_status":"0","recid":"49173","relation_version_is_last":true,"title":["Investigation of the Diverse Sleep Behavior of Malware"],"weko_creator_id":"188","weko_shared_id":-1},"updated":"2024-02-06T02:40:54.109539+00:00"}