{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:41:00Z","timestamp":1725892860484},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540362975"},{"type":"electronic","value":"9783540362999"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11795131_83","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T15:48:02Z","timestamp":1159285682000},"page":"574-579","source":"Crossref","is-referenced-by-count":2,"title":["Using RS and SVM to Detect New Malicious Executable Codes"],"prefix":"10.1007","author":[{"given":"Boyun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Jinbo","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"83_CR1","unstructured":"Wildlist Organization Home Page: \n                    \n                      http:\/\/www.wildlist.org"},{"key":"83_CR2","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/0167-4048(95)00012-W","volume":"14","author":"R. Lo","year":"1995","unstructured":"Lo, R., Levitt, K., Olsson, R.: MCF: A Malicious Code Filter. Computers and Security\u00a014, 541\u2013566 (1995)","journal-title":"Computers and Security"},{"key":"83_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/64.511768","volume":"8","author":"G. Tesauro","year":"1996","unstructured":"Tesauro, G., Kephart, J., Sorkin, G.: Neural networks for computer virus recognition. IEEE Expert\u00a08, 5\u20136 (1996)","journal-title":"IEEE Expert"},{"key":"83_CR4","doi-asserted-by":"crossref","unstructured":"Schultz, M., Eskin, E., Zadok, E., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Los Alamitos, pp. 38\u201349 (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"83_CR5","unstructured":"Vmware: \n                    \n                      http:\/\/www.vmware.com"},{"key":"83_CR6","volume-title":"Rough sets theoretical aspests of reasoning about data","author":"Z. Pawlak","year":"1991","unstructured":"Pawlak, Z.: Rough sets theoretical aspests of reasoning about data. Kluwer academic publishers, Boston (1991)"},{"key":"83_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, B., Yin, Y., Hao, J.: J.: Using Fuzzy Pattern Recognition to Detect Unknown Ma-licious Executables Code. In: Proceedings of the Second International Conference on Fuzzy Systems and Knowledge Discovery, Changsha, pp. 629\u2013634 (2005)","DOI":"10.1007\/11539506_78"},{"key":"83_CR8","first-page":"7","volume":"6","author":"B.Y. Zhang","year":"2005","unstructured":"Zhang, B.Y., Yin, J., Zhang, D., Hao, j.: Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm. Computer Engineering and Aplications\u00a06, 7\u201310 (2005)","journal-title":"Computer Engineering and Aplications"},{"key":"83_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11574798_8","volume-title":"Transactions on Rough Sets IV","author":"S. Rewat","year":"2005","unstructured":"Rewat, S., Gulati, V.P., Pujari, A.K.: A Fast Host-based IntrusionDetection Using Rough Set Theory. In: Peters, J.F., Skowron, A. (eds.) Transactions on Rough Sets IV. LNCS, vol.\u00a03700, pp. 144\u2013162. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11795131_83.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:24:21Z","timestamp":1619508261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11795131_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540362975","9783540362999"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11795131_83","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}