{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:04:55Z","timestamp":1725998695451},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030036577"},{"type":"electronic","value":"9783030036584"}],"license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-03658-4_25","type":"book-chapter","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T02:02:19Z","timestamp":1540951339000},"page":"208-215","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Rough Set Analysis for Malicious Web Campaigns Identification"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Kruczkowski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miros\u0142aw","family":"Miciak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,11,1]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Bazan, J., Szczuka, M., Wojna, A., Wojnarski, A.: On evolution of rough set exploration system. In: Lecture Notes in Articial Intelligence, pp. 592\u2013601 (2004)","DOI":"10.1007\/978-3-540-25929-9_73"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/3-540-45813-1_52","volume-title":"Rough Sets and Current Trends in Computing","author":"Jan G. Bazan","year":"2002","unstructured":"Bazan, J., Szczuka, M., Wr\u00f3blewski, J.: A new version of rough set exploration system. In: Lecture Notes in Articial Intelligence, pp. 397\u2013404 (2002)"},{"key":"25_CR3","first-page":"56","volume":"5","author":"E Gandotra","year":"2014","unstructured":"Gandotra, E.: Malware analysis and classification: a survey. J. Inf. Secur. 5, 56\u201364 (2014)","journal-title":"J. Inf. Secur."},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35\u201347 (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Hajmasan, G., Mondoc, A., Cret, C.: Dynamic behaviour evaluation for malware detection. In: 2017 5th International Symposium on Digital Forensic and Security (ISDFS) (2017)","DOI":"10.1109\/ISDFS.2017.7916495"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Kasprzyk, R., Najgebauer, A., Pierzcha\u0142a, D.: Modelling and simulation of an infection disease in social networks. In: Computational Collective Intelligence. Technologies and Applications, vol. 1, pp. 388\u2013398. Springer (2011)","DOI":"10.1007\/978-3-642-23935-9_38"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Kruczkowski, M., Niewiadomska-Szynkiewicz, E.: Support vector machine for malware analysis and classification. In: Proceedings of the IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 1\u20136 (2014)","DOI":"10.1109\/WI-IAT.2014.127"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Kruczkowski, M., Niewiadomska-Szynkiewicz, E., Kozakiewicz, A.: Cross-layer analysis of malware datasets for malicious campaign identification. In: Proceedings of the International Conference on Military Communications and Information Systems (2015)","DOI":"10.1109\/ICMCIS.2015.7158682"},{"key":"25_CR9","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-319-15705-4_19","volume-title":"Intelligent Information and Database Systems","author":"Micha\u0142 Kruczkowski","year":"2015","unstructured":"Kruczkowski, M., Niewiadomska-Szynkiewicz, E., Kozakiewicz A.: FP-tree and SVM for malicious web campaign detection. In: Proceedings of the 7th Asian Conference on ACIIDS 2015. Part II. Lecture Notes in Computer Science, Bali, Indonesia, 23\u201325 March 2015, vol. 9012, pp. 193\u2013201 (2015)"},{"key":"25_CR10","unstructured":"NASK: n6 platform (2014). http:\/\/www.cert.pl\/news\/tag\/n6"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"de Oliveira, I.L., Ricardo, A., Gregio, A., Cansian, A.: A malware detection system inspired on the human immune system. In: LNCS. vol. 7336, pp. 286\u2013301. Springer (2012)","DOI":"10.1007\/978-3-642-31128-4_21"},{"issue":"5","key":"25_CR12","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Zdzis?aw Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough sets. Int. J. Parallel Program. 341\u2013356 (1982)","journal-title":"International Journal of Computer & Information Sciences"},{"key":"25_CR13","unstructured":"Pawlak, Z.: Information systems - theoretical foundations (1983)"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Rahman, M., Rahman, M., Carbunar, B., Chau, D.H.: Search rank fraud and malware detection in google play. IEEE Trans. Knowl. Data Eng. (2017)","DOI":"10.1137\/1.9781611974348.12"},{"key":"25_CR15","unstructured":"Salamo, M., Golobardes, E.: Global, local and mixed rough sets case base maintenance techniques. In: Recent Advances in Artificial Intelligence Research and Development, pp. 217\u2013234 (2004)"},{"issue":"1","key":"25_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0169-7439(98)00200-7","volume":"47","author":"B Walczak","year":"1999","unstructured":"Walczak, B., Massart, D.: Rough sets theory. Gemoemet. Intell. Lab. Syst. 47(1), 1\u201316 (1999)","journal-title":"Gemoemet. Intell. Lab. Syst."},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Yuan, X.: Deep learning-based real-time malware detection with multi-stage analysis. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP) (2017)","DOI":"10.1109\/SMARTCOMP.2017.7946997"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing and Communications Challenges 10"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03658-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T15:40:38Z","timestamp":1694014838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03658-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,1]]},"ISBN":["9783030036577","9783030036584"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03658-4_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,11,1]]},"assertion":[{"value":"IP&C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Processing and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icipc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ipc-conference.utp.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}