{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:46Z","timestamp":1740098986047,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319697802"},{"type":"electronic","value":"9783319697819"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69781-9_4","type":"book-chapter","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T07:13:18Z","timestamp":1510038798000},"page":"31-42","source":"Crossref","is-referenced-by-count":0,"title":["Deep Analysis and Utilization of Malware\u2019s Social Relation Network for Its Detection"],"prefix":"10.1007","author":[{"given":"Shifu","family":"Hou","sequence":"first","affiliation":[]},{"given":"Lingwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Lifei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,8]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178\u2013197. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74320-0_10","DOI":"10.1007\/978-3-540-74320-0_10"},{"key":"4_CR2","unstructured":"Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: NDSS 2009 (2009)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s11416-006-0012-2","volume":"2","author":"U Bayer","year":"2006","unstructured":"Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. J. Comput. Virol. 2(1), 67\u201377 (2006)","journal-title":"J. Comput. Virol."},{"issue":"1","key":"4_CR4","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s11416-006-0009-x","volume":"2","author":"P Beaucamps","year":"2006","unstructured":"Beaucamps, P., Filiol, E.: Malware pattern scanning schemes secure against black box analysis. J. Comput. Virol. 2(1), 35\u201350 (2006)","journal-title":"J. Comput. Virol."},{"issue":"1","key":"4_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11416-006-0029-6","volume":"3","author":"P Beaucamps","year":"2007","unstructured":"Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating programs towards a unified perspective of code protection. J. Comput. Virol. 3(1), 3\u201321 (2007)","journal-title":"J. Comput. Virol."},{"key":"4_CR6","series-title":"Information Science and Statistics","volume-title":"Pattern Recognition and Machine Learning","author":"C Bishop","year":"2006","unstructured":"Bishop, C.: Pattern Recognition and Machine Learning. Information Science and Statistics. Springer, New York (2006)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Chau, D.H., Nachenberg, C., Wilhelm, J., Wright, A., Faloutsos, C.: Polonium: tera-scale graph mining for malware detection. In: SIAM International Conference on Data Mining (SDM) (2011)","DOI":"10.1137\/1.9781611972818.12"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Chen, L., Hardy, W., Ye, Y., Li, T.: Analyzing file-to-file relation network in malware detection. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9418, pp. 415\u2013430. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26190-4_28","DOI":"10.1007\/978-3-319-26190-4_28"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Chen, L., Li, T., Abdulhayoglu, M., Ye, Y.: Intelligent malware detection based on file relation graphs. In: Proceedings of the 9th IEEE International Conference on Semantic Computing, pp. 85\u201392 (2015)","DOI":"10.1109\/ICOSC.2015.7050784"},{"key":"4_CR10","unstructured":"Clarkson, K.L.: Large-scale malware analysis, detection, and signature generation. Ph.D. dissertation, University of Michigan (2011)"},{"key":"4_CR11","unstructured":"CSI: 12th annual edition of the CSI computer crime and security survey. Technical report, Computer Security Institute (2007)"},{"issue":"1","key":"4_CR12","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11416-006-0026-9","volume":"3","author":"E Filiol","year":"2007","unstructured":"Filiol, E., Jacob, G., Liard, M.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comput. Virol. 3(1), 27\u201337 (2007)","journal-title":"J. Comput. Virol."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Jung, W., Kim, S., Choi, S.: Poster: deep learning for zero-day flash malware detection. In: S&P 2015 (2015)","DOI":"10.1145\/2809695.2817880"},{"key":"4_CR14","unstructured":"2013\u20132014 Internet security report in China (2014). http:\/\/www.ijinshan.com\/news\/2014011401.shtml"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: KDD 2004, pp. 470\u2013478 (2004)","DOI":"10.1145\/1014052.1014105"},{"key":"4_CR16","doi-asserted-by":"crossref","first-page":"205","DOI":"10.14257\/ijsia.2015.9.5.21","volume":"9","author":"Y Li","year":"2015","unstructured":"Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. IJSIA 9, 205\u2013216 (2015)","journal-title":"IJSIA"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"McGlohon, M., Bay, S., Anderle, M.G., Steier, D.M., Faloutsos, C.: Snare: a link analytic system for graph labeling and risk detection. In: KDD 2009 (2009)","DOI":"10.1145\/1557019.1557155"},{"issue":"1","key":"4_CR18","first-page":"2799","volume":"14","author":"N Noorshams","year":"2013","unstructured":"Noorshams, N., Wainwright, M.J.: Belief propagation for continuous state spaces: stochastic message-passing with quantitative guarantees. J. Mach. Learn. Res. 14(1), 2799\u20132835 (2013)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR19","unstructured":"Pearl, J.: Reverend bayes on inference engines: a distributed hierarchical approach. In: Proceedings of the Second National Conference on Artificial Intelligence, pp. 133\u2013136 (1982)"},{"issue":"3","key":"4_CR20","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11416-006-0027-8","volume":"2","author":"DKS Reddy","year":"2006","unstructured":"Reddy, D.K.S., Pujari, A.K.: N-gram analysis for computer virus detection. J. Comput. Virol. 2(3), 231\u2013239 (2006)","journal-title":"J. Comput. Virol."},{"key":"4_CR21","first-page":"17","volume":"84","author":"S Shah","year":"2013","unstructured":"Shah, S., Jani, H., Shetty, S., Bhowmick, K.: Virus detection using artificial neural networks. Int. J. Comput. Appl. 84, 17\u201323 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Tamersoy, A., Roundy, K., Chau, D.H.: Guilt by association: large scale malware detection by mining file-relation graphs. In: KDD 2014 (2014)","DOI":"10.1145\/2623330.2623342"},{"key":"4_CR23","unstructured":"Zeus: a persistent criminal enterprise (2010). http:\/\/www.trendmicro.com\/cloudcontent\/us\/pdfs\/security-intelligence\/white-papers\/wpzeuspersistent-criminal-enterprise.pdf"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Venzhega, A., Zhinalieva, P., Suboch, N.: Graph-based malware distributors detection. In: WWW 2013 (2013)","DOI":"10.1145\/2487788.2488136"},{"key":"4_CR25","unstructured":"Wang, J., Deng, P., Fan, Y., Jaw, L., Liu, Y.: Virus detection using data mining techniques. In: ICDM (2003)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, T., Chen, Y., Jiang, Q.: Automatic malware categorization using cluster ensemble. In: KDD 2010, pp. 95\u2013104 (2010)","DOI":"10.1145\/1835804.1835820"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, T., Zhu, S., Zhuang, W., Tas, E., Gupta, U., Abdulhayoglu, M.: Combining file content and file relations for cloud based malware detection. In: KDD 2011, pp. 222\u2013230 (2011)","DOI":"10.1145\/2020408.2020448"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, T., Jiang, Q., Han, Z., Wan, L.: Intelligent file scoring system for malware detection from the gray list. In: KDD 2009 (2009)","DOI":"10.1145\/1557019.1557167"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Ye, D.: IMDS: intelligent malware detection system. In: KDD 2007, pp. 1043\u20131047 (2007)","DOI":"10.1145\/1281192.1281308"},{"key":"4_CR30","unstructured":"Yedidia, J.S., Freeman, W.T., Weiss, Y.: Understanding belief propagation and its generalizations. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2003)"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69781-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T15:09:55Z","timestamp":1570288195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69781-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319697802","9783319697819"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69781-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}