{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:22:54Z","timestamp":1774369374722,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319406664","type":"print"},{"value":"9783319406671","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40667-1_7","type":"book-chapter","created":{"date-parts":[[2016,6,11]],"date-time":"2016-06-11T11:19:03Z","timestamp":1465643943000},"page":"122-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Reviewer Integration and Performance Measurement for Malware Detection"],"prefix":"10.1007","author":[{"given":"Brad","family":"Miller","sequence":"first","affiliation":[]},{"given":"Alex","family":"Kantchelian","sequence":"additional","affiliation":[]},{"given":"Michael Carl","family":"Tschantz","sequence":"additional","affiliation":[]},{"given":"Sadia","family":"Afroz","sequence":"additional","affiliation":[]},{"given":"Rekha","family":"Bachwani","sequence":"additional","affiliation":[]},{"given":"Riyaz","family":"Faizullabhoy","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Vaishaal","family":"Shankar","sequence":"additional","affiliation":[]},{"given":"Tony","family":"Wu","sequence":"additional","affiliation":[]},{"given":"George","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"Anthony D.","family":"Joseph","sequence":"additional","affiliation":[]},{"given":"J. D.","family":"Tygar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,12]]},"reference":[{"key":"7_CR1","unstructured":"ClamAV PUA, 14 November 2014. http:\/\/www.clamav.net\/doc\/pua.html"},{"key":"7_CR2","unstructured":"PEiD, 14 November 2014. http:\/\/woodmann.com\/BobSoft\/Pages\/Programs\/PEiD"},{"key":"7_CR3","unstructured":"The Cuckoo Sandbox, 14 November 2014. http:\/\/www.cuckoosandbox.org"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: WWW (2011)","DOI":"10.1145\/1963405.1963436"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: Mast: triage for market-scale mobile malware analysis. In: ACM WiSec (2013)","DOI":"10.1145\/2462096.2462100"},{"key":"7_CR7","volume-title":"Semi-Supervised Learning","author":"O Chapelle","year":"2010","unstructured":"Chapelle, O., Schlkopf, B., Zien, A.: Semi-Supervised Learning. The MIT Press, Cambridge (2010)"},{"key":"7_CR8","unstructured":"Curtsinger, C., Livshits, B., Zorn, B., Seifert, C.: Zozzle: fast and precise in-browser javascript malware detection. In: Usenix Security (2011)"},{"key":"7_CR9","unstructured":"Damballa: State of Infections Report: Q4 2014. Technical report, Damballa (2015)"},{"key":"7_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2001","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. Springer, New York (2001)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kantchelian, A., Afroz, S., Huang, L., Islam, A.C., Miller, B., Tschantz, M.C., Greenstadt, R., Joseph, A.D., Tygar, J.D.: Approaches to adversarial drift. In: ACM AISec (2013)","DOI":"10.1145\/2517312.2517320"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Karanth, S., Laxman, S., Naldurg, P., Venkatesan, R., Lambert, J., Shin, J.: ZDVUE: prioritization of javascript attacks to discover new vulnerabilities. In: ACM AISec (2011)","DOI":"10.1145\/2046684.2046690"},{"key":"7_CR13","first-page":"2721","volume":"7","author":"JZ Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"7_CR14","unstructured":"McAfee Labs: McAfee Labs Threats Report, August 2014"},{"key":"7_CR15","unstructured":"Miller, B.: Scalable Platform for Malicious Content Detection Integrating Machine Learning and Manual Review. Ph.D. thesis, UC Berkeley (2015)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Nissim, N., Cohen, A., Moskovitch, R., Shabtai, A., Edry, M., Bar-Ad, O., Elovici, Y.: ALPD: active learning framework for enhancing the detection of malicious pdf files. In: IEEE JISIC, September 2014","DOI":"10.1109\/JISIC.2014.23"},{"issue":"13","key":"7_CR17","doi-asserted-by":"publisher","first-page":"5843","DOI":"10.1016\/j.eswa.2014.02.053","volume":"41","author":"N Nissim","year":"2014","unstructured":"Nissim, N., Moskovitch, R., Rokach, L., Elovici, Y.: Novel active learning methods for enhanced pc malware detection in windows os. J. Expert Syst. Appl. 41(13), 5843\u20135857 (2014)","journal-title":"J. Expert Syst. Appl."},{"key":"7_CR18","unstructured":"Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI (2010)"},{"key":"7_CR19","unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All your iframes point to us. In: USENIX Security (2008)"},{"key":"7_CR20","unstructured":"Rajab, M.A., Ballard, L., Lutz, N., Mavrommatis, P., Provos, N.: CAMP: content-agnostic malware protection. In: NDSS (2013)"},{"key":"7_CR21","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: IEEE S&P (2001)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Schwenk, G., Bikadorov, A., Krueger, T., Rieck, K.: Autonomous learning for detection of javascript attacks: vision or reality? In: ACM AISec (2012)","DOI":"10.1145\/2381896.2381911"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Sculley, D., Otey, M.E., Pohl, M., Spitznagel, B., Hainsworth, J., Zhou, Y.: Detecting adversarial advertisements in the wild. In: KDD (2011)","DOI":"10.1145\/2020408.2020455"},{"key":"7_CR24","unstructured":"Settles, B.: Active learning literature survey. Computer Sciences Technical report 1648, University of Wisconsin-Madison (2009)"},{"key":"7_CR25","unstructured":"\u0160rndic, N., Laskov, P.: Detection of malicious PDF files based on hierarchical document structure. In: NDSS (2013)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Shady paths: leveraging surfing crowds to detect malicious web pages. In: ACM CCS (2013)","DOI":"10.1145\/2508859.2516682"},{"key":"7_CR27","unstructured":"VirusTotal. https:\/\/www.virustotal.com\/. Accessed 30 Jul 2014"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40667-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:24:52Z","timestamp":1710325492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-40667-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319406664","9783319406671"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40667-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"12 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}