{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T21:40:10Z","timestamp":1746308410079,"version":"3.40.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083889"},{"type":"electronic","value":"9783319083896"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08389-6_9","type":"book-chapter","created":{"date-parts":[[2014,7,17]],"date-time":"2014-07-17T10:43:39Z","timestamp":1405593819000},"page":"93-103","source":"Crossref","is-referenced-by-count":13,"title":["Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection"],"prefix":"10.1007","author":[{"given":"R\u0103zvan","family":"Benchea","sequence":"first","affiliation":[]},{"given":"Drago\u015f Teodor","family":"Gavrilu\u0163","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"www.av-test.org: http:\/\/www.av-test.org\/en\/statistics\/malware\/"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Gavrilut, D., Benchea, R., Vatamanu, C.: Optimized zero false positives perceptron training for malware detection. In: SYNASC, pp. 247\u2013253. IEEE Computer Society (2012)","DOI":"10.1109\/SYNASC.2012.34"},{"key":"9_CR3","series-title":"STUDFUZZ","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-540-35488-8_13","volume-title":"Feature Extraction","author":"Y.W. Chen","year":"2006","unstructured":"Chen, Y.W., Lin, C.-J.: Combining SVMs with various feature selection strategies. In: Guyon, I., Nikravesh, M., Gunn, S., Zadeh, L.A. (eds.) Feature Extraction. STUDFUZZ, vol.\u00a0207, pp. 315\u2013324. Springer, Heidelberg (2006)"},{"key":"9_CR4","first-page":"194","volume":"1","author":"S. Paul","year":"1986","unstructured":"Paul, S.: Information processing in dynamical systems: Foundations of harmony theory. Parallel Distributed Processing: Explorations in the Microstructure of Cognition\u00a01, 194\u2013281 (1986)","journal-title":"Parallel Distributed Processing: Explorations in the Microstructure of Cognition"},{"key":"9_CR5","unstructured":"Idika, N., Mathur, A.P.: A survey on malware detection techniques. PhD thesis. Purdue University (February 2007)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: IEEE Symposium on Security and Privacy, pp. 38\u201349. IEEE Computer Society (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: COMPSAC Workshops, pp. 41\u201342. IEEE Computer Society (2004)","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"9_CR8","first-page":"2721","volume":"6","author":"J.Z. Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research\u00a06, 2721\u20132744 (2006)","journal-title":"Journal of Machine Learning Research"},{"issue":"6","key":"9_CR9","doi-asserted-by":"publisher","first-page":"3156","DOI":"10.1016\/j.csda.2006.09.005","volume":"51","author":"D.M. Cai","year":"2007","unstructured":"Cai, D.M., Gokhale, M., Theiler, J.: Comparison of feature selection and classification algorithms in identifying malicious executables. Computational Statistics & Data Analysis\u00a051(6), 3156\u20133172 (2007)","journal-title":"Computational Statistics & Data Analysis"},{"key":"9_CR10","unstructured":"Siddiqui, M.A.: Data mining methods for malware detection (2008)"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2190-8532-1-1","volume":"1","author":"A. Shabtai","year":"2012","unstructured":"Shabtai, A., Moskovitch, R., Feher, C., Dolev, S., Elovici, Y.: Detecting unknown malicious code by applying classification techniques on opcode patterns. Security Informatics\u00a01(1), 1\u201322 (2012)","journal-title":"Security Informatics"},{"key":"9_CR12","unstructured":"Hung, T.C., Lam, D.X.: A feature extraction method and recognition algorithm for detection unknown worm and variations based on static features (2011)"},{"key":"9_CR13","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/11539506_78","volume-title":"Fuzzy Systems and Knowledge Discovery","author":"B. Zhang","year":"2005","unstructured":"Zhang, B., Yin, J., Hao, J.: Using fuzzy pattern recognition to detect unknown malicious executables code. In: Wang, L., Jin, Y. (eds.) FSKD 2005, Part I. LNCS (LNAI), vol.\u00a03613, pp. 629\u2013634. Springer, Heidelberg (2005)"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s11416-008-0108-y","volume":"5","author":"Y. Ye","year":"2009","unstructured":"Ye, Y., Chen, L., Wang, D., Li, T., Jiang, Q., Zhao, M.: Sbmds: an interpretable string based malware detection system using svm ensemble with bagging. Journal in Computer Virology\u00a05(4), 283\u2013293 (2009)","journal-title":"Journal in Computer Virology"},{"issue":"5","key":"9_CR15","doi-asserted-by":"publisher","first-page":"405","DOI":"10.4304\/jcp.4.5.405-414","volume":"4","author":"J. Dai","year":"2009","unstructured":"Dai, J., Guha, R.K., Lee, J.: Efficient virus detection using dynamic instruction sequences. JCP\u00a04(5), 405\u2013414 (2009)","journal-title":"JCP"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Baldangombo, U., Jambaljav, N., Horng, S.J.: A static malware detection system using data mining methods. CoRR abs\/1308.2831 (2013)","DOI":"10.5121\/ijaia.2013.4411"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Dahl, G.E., Stokes, J.W., Deng, L., Yu, D.: Large-scale malware classification using random projections and neural networks. In: ICASSP, pp. 3422\u20133426. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Lee, H., Grosse, R.B., Ranganath, R., Ng, A.Y.: Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations. In: Danyluk, A.P., Bottou, L., Littman, M.L. (eds.) ICML. ACM International Conference Proceeding Series, vol.\u00a0382, p. 77. ACM (2009)","DOI":"10.1145\/1553374.1553453"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-15567-3_11","volume-title":"Computer Vision \u2013 ECCV 2010","author":"G.W. Taylor","year":"2010","unstructured":"Taylor, G.W., Fergus, R., LeCun, Y., Bregler, C.: Convolutional learning of spatio-temporal features. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010, Part VI. LNCS, vol.\u00a06316, pp. 140\u2013153. Springer, Heidelberg (2010)"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TASL.2011.2109382","volume":"20","author":"A. Rahman Mohamed","year":"2012","unstructured":"Rahman Mohamed, A., Dahl, G.E., Hinton, G.E.: Acoustic modeling using deep belief networks. IEEE Transactions on Audio, Speech & Language Processing\u00a020(1), 14\u201322 (2012)","journal-title":"IEEE Transactions on Audio, Speech & Language Processing"},{"issue":"4","key":"9_CR21","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11416-012-0164-1","volume":"8","author":"M. Cimpoesu","year":"2012","unstructured":"Cimpoesu, M., Gavrilut, D., Popescu, A.: The proactivity of perceptron derived algorithms in malware detection. Journal in Computer Virology\u00a08(4), 133\u2013140 (2012)","journal-title":"Journal in Computer Virology"},{"issue":"8","key":"9_CR22","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1162\/089976602760128018","volume":"14","author":"G.E. Hinton","year":"2002","unstructured":"Hinton, G.E.: Training products of experts by minimizing contrastive divergence. Neural Computation\u00a014(8), 1771\u20131800 (2002)","journal-title":"Neural Computation"},{"key":"9_CR23","unstructured":"Khronos group, http:\/\/www.khronos.org\/opencl\/"},{"key":"9_CR24","unstructured":"Thomas, D.: http:\/\/cas.ee.ic.ac.uk\/people\/dt10\/research\/rngs-gpu-mwc64x.html"}],"container-title":["Lecture Notes in Computer Science","Graph-Based Representation and Reasoning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08389-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T21:07:03Z","timestamp":1746306423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08389-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083889","9783319083896"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08389-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}