{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:21:29Z","timestamp":1758702089892,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_43","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"433-442","source":"Crossref","is-referenced-by-count":5,"title":["Evolutionary Cost-Sensitive Ensemble for Malware Detection"],"prefix":"10.1007","author":[{"given":"Bartosz","family":"Krawczyk","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Wo\u017aniak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"43_CR1","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1002\/sec.724","volume":"7","author":"F.H. Abbasi","year":"2014","unstructured":"Abbasi, F.H., Harris, R., Marsland, S., Moretti, G.: An exemplar-based learning approach for detection and classification of malicious network streams in honeynets. Security and Communication Networks\u00a07(2), 352\u2013364 (2014)","journal-title":"Security and Communication Networks"},{"issue":"8","key":"43_CR2","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1162\/089976699300016007","volume":"11","author":"E. Alpaydin","year":"1999","unstructured":"Alpaydin, E.: Combined 5 x 2 cv f test for comparing supervised classification learning algorithms. Neural Computation\u00a011(8), 1885\u20131892 (1999)","journal-title":"Neural Computation"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-13529-3_17","volume-title":"Rough Sets and Current Trends in Computing","author":"J. B\u0142aszczy\u0144ski","year":"2010","unstructured":"B\u0142aszczy\u0144ski, J., Deckert, M., Stefanowski, J., Wilk, S.: Integrating selective pre-processing of imbalanced data with ivotes ensemble. In: Szczuka, M., Kryszkiewicz, M., Ramanna, S., Jensen, R., Hu, Q. (eds.) RSCTC 2010. LNCS, vol.\u00a06086, pp. 148\u2013157. Springer, Heidelberg (2010)"},{"key":"43_CR4","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and regression trees. Chapman and Hall (1984)"},{"key":"43_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-39804-2_12","volume-title":"Knowledge Discovery in Databases: PKDD 2003","author":"N.V. Chawla","year":"2003","unstructured":"Chawla, N.V., Lazarevic, A., Hall, L.O., Bowyer, K.W.: Smoteboost: Improving prediction of the minority class in boosting. In: Lavra\u010d, N., Gamberger, D., Todorovski, L., Blockeel, H. (eds.) PKDD 2003. LNCS (LNAI), vol.\u00a02838, pp. 107\u2013119. Springer, Heidelberg (2003)"},{"issue":"8","key":"43_CR6","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T. Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to roc analysis. Pattern Recognition Letters\u00a027(8), 861\u2013874 (2006)","journal-title":"Pattern Recognition Letters"},{"key":"43_CR7","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"T.K. Ho","year":"1998","unstructured":"Ho, T.K.: The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell.\u00a020, 832\u2013844 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Krawczyk, B., Schaefer, G., Wo\u017aniak, M.: Breast thermogram analysis using a cost-sensitive multiple classifier system. In: Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI 2012), pp. 507\u2013510 (2012)","DOI":"10.1109\/BHI.2012.6211629"},{"key":"43_CR9","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1016\/j.asoc.2013.08.014","volume":"14","author":"B. Krawczyk","year":"2014","unstructured":"Krawczyk, B., Wo\u017aniak, M., Schaefer, G.: Cost-sensitive decision tree ensembles for effective imbalanced classification. Applied Soft Computing, Part C\u00a014, 554\u2013562 (2014)","journal-title":"Applied Soft Computing, Part C"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Ling, C.X., Yang, Q., Wang, J., Zhang, S.: Decision trees with minimal costs. In: Proceedings, Twenty-First International Conference on Machine Learning, ICML 2004, pp. 544\u2013551 (2004)","DOI":"10.1145\/1015330.1015369"},{"issue":"2","key":"43_CR11","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","volume":"39","author":"X. Liu","year":"2009","unstructured":"Liu, X., Wu, J., Zhou, Z.: Exploratory undersampling for class-imbalance learning. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics\u00a039(2), 539\u2013550 (2009)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics"},{"key":"43_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-28931-6_14","volume-title":"Hybrid Artificial Intelligent Systems","author":"K. Napierala","year":"2012","unstructured":"Napierala, K., Stefanowski, J.: Identification of different types of minority class examples in imbalanced data. In: Corchado, E., Sn\u00e1\u0161el, V., Abraham, A., Wo\u017aniak, M., Gra\u00f1a, M., Cho, S.-B. (eds.) HAIS 2012, Part II. LNCS, vol.\u00a07209, pp. 139\u2013150. Springer, Heidelberg (2012)"},{"key":"43_CR13","first-page":"231","volume":"6","author":"M. Nuenz","year":"1991","unstructured":"Nuenz, M.: The use of background knowledge in decision tree induction. Machine Learning\u00a06, 231\u2013250 (1991)","journal-title":"Machine Learning"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Ouellette, J., Pfeffer, A., Lakhotia, A.: Countering malware evolution using cloud-based learning, pp. 85\u201394 (2013)","DOI":"10.1109\/MALWARE.2013.6703689"},{"issue":"4","key":"43_CR15","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K. Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. Journal of Computer Security\u00a019(4), 639\u2013668 (2011)","journal-title":"Journal of Computer Security"},{"key":"43_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.cose.2013.12.006","volume":"42","author":"S. Schrittwieser","year":"2014","unstructured":"Schrittwieser, S., Katzenbeisser, S., Kieseberg, P., Huber, M., Leithner, M., Mulazzani, M., Weippl, E.: Covert computation - hiding code in code through compile-time obfuscation. Computers and Security\u00a042, 13\u201326 (2014)","journal-title":"Computers and Security"},{"issue":"2","key":"43_CR17","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TIFS.2013.2291066","volume":"9","author":"Z. Shan","year":"2014","unstructured":"Shan, Z., Wang, X.: Growing grapes in your computer to defend against malware. IEEE Transactions on Information Forensics and Security\u00a09(2), 196\u2013207 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"14","key":"43_CR18","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.1016\/j.patrec.2013.05.006","volume":"34","author":"S. Sheen","year":"2013","unstructured":"Sheen, S., Anitha, R., Sirisha, P.: Malware detection by pruning of parallel ensembles using harmony search. Pattern Recognition Letters\u00a034(14), 1679\u20131686 (2013)","journal-title":"Pattern Recognition Letters"},{"issue":"12","key":"43_CR19","doi-asserted-by":"publisher","first-page":"3358","DOI":"10.1016\/j.patcog.2007.04.009","volume":"40","author":"Y. Sun","year":"2007","unstructured":"Sun, Y., Kamel, M.S., Wong, A.K.C., Wang, Y.: Cost-sensitive boosting for classification of imbalanced data. Pattern Recognition\u00a040(12), 3358\u20133378 (2007)","journal-title":"Pattern Recognition"},{"issue":"4","key":"43_CR20","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1142\/S0218001409007326","volume":"23","author":"Y. Sun","year":"2009","unstructured":"Sun, Y., Wong, A.K.C., Kamel, M.S.: Classification of imbalanced data: A review. International Journal of Pattern Recognition and Artificial Intelligence\u00a023(4), 687\u2013719 (2009)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Wang, S., Yao, X.: Diversity analysis on imbalanced data sets by using ensemble models. In: 2009 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2009 - Proceedings, pp. 324\u2013331 (2009)","DOI":"10.1109\/CIDM.2009.4938667"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: Imds: Intelligent malware detection system, pp. 1043\u20131047 (2007)","DOI":"10.1145\/1281192.1281308"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:37:38Z","timestamp":1676867858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}