{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:36:44Z","timestamp":1743154604754,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031505799"},{"type":"electronic","value":"9783031505805"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50580-5_6","type":"book-chapter","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:02:40Z","timestamp":1708412560000},"page":"64-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Collaboration of Intelligent Systems to Improve Information Security"],"prefix":"10.1007","author":[{"given":"Lili","family":"Diao","sequence":"first","affiliation":[]},{"given":"Honglan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Santos, I., Penya, Y.K., Devesa, J., Garcia, P.G.: N-grams-based file signatures for malware detection. In: ICEIS 2009 - Proceedings of the 11th International Conference on Enterprise Information Systems, Volume AIDSS, Milan, Italy, pp. 317\u2013320 (2009)","DOI":"10.5220\/0001863603170320"},{"key":"6_CR2","unstructured":"Konstantinou, E.: Metamorphic virus: analysis and detection. In: Technical Report RHUL-MA-2008-2, Search Security Award M.Sc. thesis, 93 p. (2008)"},{"key":"6_CR3","first-page":"2669","volume":"6","author":"PK Chan","year":"2006","unstructured":"Chan, P.K., Lippmann, R.: Machine learning for computer security. J. Mach. Learn. Res. 6, 2669\u20132672 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"6_CR4","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006). Special Issue on Machine Learning in Computer Security"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: intelligent malware detection system. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1043\u20131047 (2007)","DOI":"10.1145\/1281192.1281308"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Chouchane, M.R., Walenstein, A., Lakhotia, A.: Using Markov chains to filter machine-morphed variants of malicious programs. In: Malicious and Unwanted Software, 2008. Proceedings of the 3rd International Conference on MALWARE, pp. 77\u201384 (2008)","DOI":"10.1109\/MALWARE.2008.4690861"},{"key":"6_CR7","unstructured":"Santamarta, R.: Generic detection and classification of polymorphic malware using neural pattern recognition (2006). https:\/\/www.semanticscholar.org\/paper\/GENERIC-DETECTION-AND-CLASSIFICATION-OF-POLYMORPHIC-Santamarta\/5cda37f3fe61f1fa156752be27fdb7cc40983e84"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Yoo, I.: Visualizing windows executable viruses using self-organizing maps. In: VizSEC\/DMSEC 2004: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 82\u201389. ACM (2004)","DOI":"10.1145\/1029208.1029222"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Baldwin, J., Dehghantanha, A.: Leveraging support vector machine for opcode density based detection of crypto-ransomware. In: Dehghantanha, A., Conti, M., Dargahi, T. (eds.) Cyber Threat Intelligence. AIS, vol. 70, pp. 107\u2013136. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73951-9_6","DOI":"10.1007\/978-3-319-73951-9_6"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Bhatt, A.J., Gupta, C., Mittal, S.: iABC-AL: active learning-based privacy leaks threat detection for iOS applications. J. King Saud Univ. Comput. Inf. Sci. 33(701), 769\u2013786 (2021)","DOI":"10.1016\/j.jksuci.2018.05.008"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: Classification of ransomware families with machine learning based on N-gram of opcodes. Future Gener. Comput. Syst. 90, 211\u2013221 (2019)","DOI":"10.1016\/j.future.2018.07.052"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Riasat, R., et al.: Onamd: an online android malware detection approach. In: 2018 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 1, pp. 190\u2013196. IEEE (2018)","DOI":"10.1109\/ICMLC.2018.8526997"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Arora, A., et al.: Poster: hybrid android malware detection by combining supervised and unsupervised learning. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 798\u2013800. ACM (2018)","DOI":"10.1145\/3241539.3267768"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Singh, A., Bist, A.S.: OSX malware detection: challenges and solutions. J. Inf. Optim. Sci. 41(2), 379\u2013385 (2020)","DOI":"10.1080\/02522667.2020.1723942"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Gharghasheh, S.E., Hadayeghparast, S.: Mac OS X malware detection with supervised machine learning algorithms. In: Choo, K.K.R., Dehghantanha, A. (eds.) Handbook of Big Data Analytics and Forensics, pp. 193\u2013208. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-74753-4_13","DOI":"10.1007\/978-3-030-74753-4_13"},{"key":"6_CR16","unstructured":"Tech-zealots.com. https:\/\/tech-zealots.com\/malware-analysis\/pe-portable-executable-structure-malware-analysis-part-2\/. Accessed 26 May 2023"},{"key":"6_CR17","unstructured":"Wiki. https:\/\/wiki.osdev.org\/PE. Accessed 01 Feb 2023"},{"key":"6_CR18","unstructured":"Nielsen, D.: Tree boosting with XGBoost why does XGBoost win \u201cevery\u201d machine learning competition? Master\u2019s thesis, NTNU (2016)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Multimedia Technology and Enhanced Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50580-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:29:22Z","timestamp":1708414162000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50580-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031505799","9783031505805"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50580-5_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICMTEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Technology and Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leicester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmtel2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icmtel.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}