{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:54:12Z","timestamp":1769118852791,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540898528","type":"print"},{"value":"9783540898535","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89853-5_43","type":"book-chapter","created":{"date-parts":[[2008,11,12]],"date-time":"2008-11-12T12:07:17Z","timestamp":1226491637000},"page":"400-411","source":"Crossref","is-referenced-by-count":10,"title":["Detecting Trojans Using Data Mining Techniques"],"prefix":"10.1007","author":[{"given":"Muazzam","family":"Siddiqui","sequence":"first","affiliation":[]},{"given":"Morgan C.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Joohan","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Download.com, http:\/\/www.download.com\/"},{"key":"43_CR2","unstructured":"The r project for statistical computing, http:\/\/www.r-project.org\/"},{"key":"43_CR3","unstructured":"Generic Unpacker Win32, http:\/\/www.exetools.com\/unpackers.htm"},{"key":"43_CR4","unstructured":"IDA Pro Disassembler, http:\/\/www.datarescue.com\/idabase\/index.htm"},{"key":"43_CR5","unstructured":"PEiD, http:\/\/peid.has.it\/"},{"key":"43_CR6","unstructured":"UPX the Ultimate Packer for eXecutables, http:\/\/www.exeinfo.go.pl\/"},{"key":"43_CR7","unstructured":"VMUnpacker, http:\/\/dswlab.com\/d3.html"},{"key":"43_CR8","unstructured":"VX Heavens, http:\/\/vx.netlux.org"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - (COMPSAC 2004), vol.\u00a02, pp. 41\u201342 (2004)","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"43_CR10","unstructured":"Arnold, W., Tesauro, G.: Automatically generated win32 heuristic virus detection. In: Virus Bulletin Conference, pp. 123\u2013132 (2000)"},{"issue":"2","key":"43_CR11","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Machine Learning\u00a024(2), 123\u2013140 (1996)","journal-title":"Machine Learning"},{"issue":"1","key":"43_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine Learning\u00a045(1), 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"43_CR13","unstructured":"Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (1985)"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2004)","DOI":"10.1145\/1014052.1014105"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Rabek, J.C., Khazan, R.I., Lewandowski, S.M., Cunningham, R.K.: Detection of injected, dynamically generated, and obfuscated malicious code. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 76\u201382 (2003)","DOI":"10.1145\/948187.948201"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 38\u201349 (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"43_CR17","unstructured":"Siddiqui, M., Wang, M.C., Lee, J.: Data mining methods for malware detection using instruction sequences. In: Proceedings of Artificial Intelligence and Applications, AIA 2008. ACTA Press (2008)"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables. In: 20th Annual Computer Security Applications Conference, pp. 326\u2013334 (2004)","DOI":"10.1109\/CSAC.2004.37"},{"key":"43_CR19","unstructured":"Symantec. Understanding heuristics: Symantec\u2019s bloodhound technology. Technical report, Symantec Corporation (1997)"},{"key":"43_CR20","volume-title":"The Art of Computer Virus Research and Defense","author":"P. Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey (2005)"},{"key":"43_CR21","volume-title":"Statisitcal Pattern Recognition","author":"A. Webb","year":"2005","unstructured":"Webb, A.: Statisitcal Pattern Recognition. Wiley, Chichester (2005)"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Weber, M., Schmid, M., Schatz, M., Geyer, D.: A toolkit for detecting and analyzing malicious software. In: Proceedings of the 18th Annual Computer Security Applications Conference, p. 423 (2002)","DOI":"10.1109\/CSAC.2002.1176314"},{"key":"43_CR23","unstructured":"Williams, M.: Anti-trojan and trojan detection with in-kernel digital signature testing of executables. Technical report, NetXSecure NZ Limited (2002)"},{"key":"43_CR24","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1145\/1281192.1281308","volume-title":"KDD 2007: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining","author":"Y. Ye","year":"2007","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: Imds: intelligent malware detection system. In: KDD 2007: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1043\u20131047. ACM Press, New York (2007)"}],"container-title":["Communications in Computer and Information Science","Wireless Networks, Information Processing and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89853-5_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T01:08:38Z","timestamp":1684631318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89853-5_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540898528","9783540898535"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89853-5_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}