{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:54:03Z","timestamp":1725512043771},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717003"},{"type":"electronic","value":"9783540717010"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71701-0_22","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T11:31:38Z","timestamp":1182339098000},"page":"205-216","source":"Crossref","is-referenced-by-count":10,"title":["Feature Based Techniques for Auto-Detection of Novel Email Worms"],"prefix":"10.1007","author":[{"given":"Mohammad M.","family":"Masud","sequence":"first","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Martin, S., et al.: A Two-Layer Approach for Novel Email Worm Detection. Submitted to USENIX SRUTI (Steps on Reducing Unwanted Traffic on the Internet) (2005)"},{"key":"22_CR2","unstructured":"WEKA: Data Mining Software in Java. \n                    \n                      http:\/\/www.cs.waikato.ac.nz\/~ml\/weka\/"},{"key":"22_CR3","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"22_CR4","unstructured":"Golbeck, J., Hendler, J.: Reputation network analysis for email filtering. In: CEAS (2004)"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"35101","DOI":"10.1103\/PhysRevE.66.035101","volume":"66","author":"M.E.J. Newman","year":"2002","unstructured":"Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Physical Review E\u00a066, 35101 (2002)","journal-title":"Physical Review E"},{"key":"22_CR6","unstructured":"Symantec Corporation. W32.Beagle.BG. Online (2005), http:\/\/www.sarc.com\/avcenter\/venc\/data\/w32.beagle.bg@mm.html"},{"key":"22_CR7","unstructured":"Schultz, M., Eskin, E., Zadok, E.: MEF: Malicious email filter, a UNIX mail filter that detects malicious windows executables. In: USENIX Annual Technical Conference - FREENIX Track (June 2001)"},{"key":"22_CR8","unstructured":"Singh, S., et al.: The EarlyBird System for Real-time Detection of Unknown Worms. Technical report - cs2003-0761, UCSD (2003)"},{"key":"22_CR9","unstructured":"Kim, H.-A., Karp, B.: Autograph: Toward Automated, Distributed Worm Signature Detection. In: Proceedings of the 13th Usenix Security Symposium (Security 2004), San Diego, CA (August 2004)"},{"key":"22_CR10","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"J. Newsome","year":"2005","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: Automatically Generating Signatures for Polymorphic Worms. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2005, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"22_CR11","unstructured":"Honeypot. \n                    \n                      http:\/\/www.honeypots.net\/"},{"key":"22_CR12","volume-title":"Proceedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005)","author":"S. Martin","year":"2005","unstructured":"Martin, S., et al.: Analyzing Behavioral Features for Email Classification. In: Proceedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005), Stanford University, July 21-22, 2005, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security Practice and Experience","author":"S. Sidiroglou","year":"2005","unstructured":"Sidiroglou, S., et al.: An Email Worm Vaccine Architecture. In: Deng, R.H., et al. (eds.) ISPEC 2005. LNCS, vol.\u00a03439, Springer, Heidelberg (2005)"},{"key":"22_CR14","volume-title":"Machine Learning","author":"T. Mitchell","year":"1997","unstructured":"Mitchell, T.: Machine Learning. McGraw-Hill, New York (1997)"},{"key":"22_CR15","first-page":"338","volume-title":"Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence","author":"G.H. John","year":"1995","unstructured":"John, G.H., Langley, P.: Estimating Continuous Distributions in Bayesian Classifiers. In: Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338\u2013345. Morgan Kaufmann, San Mateo (1995)"},{"key":"22_CR16","first-page":"144","volume-title":"5th Annual ACM Workshop on COLT","author":"B.E. Boser","year":"1992","unstructured":"Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Haussler, D. (ed.) 5th Annual ACM Workshop on COLT, Pittsburgh, PA, pp. 144\u2013152. ACM Press, New York (1992)"},{"key":"22_CR17","unstructured":"A library for Support Vector Machine: \n                    \n                      http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71701-0_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:25:15Z","timestamp":1605745515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71701-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717003","9783540717010"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71701-0_22","relation":{},"subject":[]}}