{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:55:38Z","timestamp":1725569738121},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175336"},{"type":"electronic","value":"9783642175343"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17534-3_33","type":"book-chapter","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T08:51:22Z","timestamp":1289551882000},"page":"267-274","source":"Crossref","is-referenced-by-count":0,"title":["A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis"],"prefix":"10.1007","author":[{"given":"Tao","family":"Ban","sequence":"first","affiliation":[]},{"given":"Ruo","family":"Ando","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Applications of Data Mining in Computer Security","year":"2002","key":"33_CR1","unstructured":"Barbar, D., Jajodia, S. (eds.): Applications of Data Mining in Computer Security. Kluwer, Dordrecht (2002)"},{"key":"33_CR2","first-page":"2669","volume":"7","author":"P.K. Chan","year":"2006","unstructured":"Chan, P.K., Lippmann, R.P.: Machine learning for computer security. Journal of Machine Learning Research\u00a07, 2669\u20132672 (2006)","journal-title":"Journal of Machine Learning Research"},{"volume-title":"Machine Learning and Data Mining for Computer Security","year":"2006","key":"33_CR3","unstructured":"Maloof, M. (ed.): Machine Learning and Data Mining for Computer Security. Springer, Heidelberg (2006)"},{"issue":"1","key":"33_CR4","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.patcog.2007.04.006","volume":"41","author":"G. Mazeroff","year":"2008","unstructured":"Mazeroff, G., Knoxville, T., Thomason, M., Ford, R.: Probabilistic suffix models for API sequence analysis of Windows XP applications. Pattern Recognition\u00a041(1), 90\u2013101 (2008)","journal-title":"Pattern Recognition"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Wang, C., Pang, J., Zhao, R., Liu, X.: Using API sequence and Bayes algorithm to detect suspicious behavior. In: 2009 International Conference on Communication Software and Networks, Macau, China (February 27-28, 2009)","DOI":"10.1109\/ICCSN.2009.60"},{"key":"33_CR6","unstructured":"Ando, R.: A Visualization of anomaly memory behavior of full-virtuallized windows OS using virtual machine introspection (to appear, 2010)"},{"key":"33_CR7","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines (2001), Software available at \n                    \n                      http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing. Models and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17534-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T08:04:21Z","timestamp":1553241861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17534-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175336","9783642175343"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17534-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}