{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:00:17Z","timestamp":1743015617381,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227080"},{"type":"electronic","value":"9783642227097"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22709-7_55","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:13:09Z","timestamp":1311610389000},"page":"562-571","source":"Crossref","is-referenced-by-count":5,"title":["Scattered Feature Space for Malware Analysis"],"prefix":"10.1007","author":[{"given":"P.","family":"Vinod","sequence":"first","affiliation":[]},{"given":"V.","family":"Laxmi","sequence":"additional","affiliation":[]},{"given":"M. S.","family":"Gaur","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","first-page":"13","volume":"1-2","author":"K.M. Enamul","year":"2005","unstructured":"Enamul, K.M., Andrew, W., Arun, L.: Malware Phylogeny Generation using Permutations of code. Journal in Computer Virology\u00a0(1-2), 13\u201323 (2005)","journal-title":"Journal in Computer Virology"},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/ICDM.2006.4","volume-title":"Proceedings of the Sixth International Conference on Data Mining (IEEE) (ICDM 2006)","author":"O. Henchiri","year":"2006","unstructured":"Henchiri, O., Japkowicz, N.: A Feature Selection and Evaluation Scheme for Computer Virus Detection. In: Proceedings of the Sixth International Conference on Data Mining (IEEE) (ICDM 2006), pp. 891\u2013895. IEEE Computer Society, Los Alamitos (2006)"},{"issue":"3","key":"55_CR3","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11416-006-0013-1","volume":"2","author":"I.S. Yoo","year":"2006","unstructured":"Yoo, I.S., Ultes-Nitsche, U.: Towards Establishing a Unknown Virus Detection Technique using SOM. Journal in Computer Virology\u00a02(3), 163\u2013186 (2006)","journal-title":"Journal in Computer Virology"},{"key":"55_CR4","unstructured":"Kephart, J.O., Arnold, B.: N-grams-Based File Signatures For Malware Detection, pp. 178\u2013184 (1994)"},{"key":"55_CR5","unstructured":"Kephart, J.O., Arnold, B.: A Feature Selection and Evaluation of Computer Virus Signatures. In: Proceeding of the 4th Virus Bulletin International Conference, pp. 178\u2013184 (1994)"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to Detect Malicious Executables in the Wild. In: Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data mining (KDD 2004), pp. 470\u2013478 (2004)","DOI":"10.1145\/1014052.1014105"},{"key":"55_CR7","unstructured":"Li, W.J., Wang, K., Stolfo, S.J., Herzog, B.: Fileprints:Identifying File types by n-gram analysis. In: Proceedings of the Sixth Annual IEEE SMC 4th Virus Bulletin International Conference, pp. 64\u201371 (2005)"},{"issue":"4","key":"55_CR8","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11416-009-0122-8","volume":"5","author":"R. Moskovitch","year":"2009","unstructured":"Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Japkowicz, N., Elovici, Y.: Unknown Malcode Detection and the Imbalance Problem. Journal in Computer Virology\u00a05(4), 295\u2013308 (2009)","journal-title":"Journal in Computer Virology"},{"key":"55_CR9","unstructured":"Microsoft Portable Executable and Common Object File Format Specification www.osdever.net\/documents\/PECOFF.pdf"},{"key":"55_CR10","unstructured":"Vinod, P., Laxmi, V., Gaur, M.S.: Mnemonics as Predictor for Malware Analysis. In: Proceedings of IEEE International Conference on Advances in Communication, Network, and Computing (CNC 2011), pp. 366\u2013368 (2011)"},{"key":"55_CR11","unstructured":"Vinod, P., Laxmi, V., Gaur, M.S., Chauhan, G.: Malware Analysis using Non-Signature based Method. In: Proceedings of IEEE International Conference on Network Communication and Computer (ICNCC 2011), New Delhi, India, March 21-23 (to appear, 2011)"},{"key":"55_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-13241-4_10","volume-title":"Communications and Multimedia Security","author":"R. Merkel","year":"2010","unstructured":"Merkel, R., Hoppe, T., Kraetzer, C., Dittmann, J.: Statistical detection of malicious PE-executables for fast offline analysis. In: De Decker, B., Schaum\u00fcller-Bichl, I. (eds.) CMS 2010. LNCS, vol.\u00a06109, pp. 93\u2013105. Springer, Heidelberg (2010)"},{"key":"55_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-11747-3_3","volume-title":"Engineering Secure Software and Systems","author":"I. Santos","year":"2010","unstructured":"Santos, I., Brezo, F., Nieves, J., Penya, Y.K., Sanz, B., Laorden, C., Bringas, P.G.: Idea: Opcode-sequence-based malware detection. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol.\u00a05965, pp. 35\u201343. Springer, Heidelberg (2010)"},{"key":"55_CR14","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data Mining Methods for Detection of New Malicious Executables. Proceedings of the IEEE Symposium on Security and Privacy (2001)"},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Tzu-Yen, W., Chin-Hsiung, W., Chu-Cheng, H.: Detecting Unknown Malicious Executables Using Portable Executable Headers. In: Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC (NCM 2009), pp. 278\u2013284 (2009)","DOI":"10.1109\/NCM.2009.385"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Tabish, S.M., Shafiq, M.Z., Farooq, M.: Malware Detection using Statistical Analysis of byte-level file content. In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD), pp. 23\u201331 (2009)","DOI":"10.1145\/1599272.1599278"},{"key":"55_CR17","unstructured":"University of Waikato. Open Source Machine Learning Software WEKA, http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"55_CR18","unstructured":"Virus Total, http:\/\/www.virustotal.com\/stats.html"},{"key":"55_CR19","unstructured":"VX Heavens, http:\/\/vx.netlux.org\/lib"},{"key":"55_CR20","unstructured":"Yuval, E., Asaf, S., Robert, M., Gil, T., Chanan, G.: Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. In: Proceedings of the 30th Annual German Conference on Advances in Artificial Intelligence (KI 2007), pp. 44\u201350 (2007)"},{"key":"55_CR21","unstructured":"Walenstein, A., Venable, M., Hayes, M., Thompson, C., Lakhotia, A.:Exploiting Similarity between Variants to Ddefeat Malware: Vilo Method for Comparing and Searching Binary Programs. In: Proceedings of BlackHat DC, https:\/\/blackhat.com\/presentations\/bh-dc-07\/Walenstein\/Paper\/bh-dc-07-walenstein-WP.pdf"},{"key":"55_CR22","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations","author":"I.H. Witten","year":"1999","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, San Francisco (1999)"},{"issue":"8","key":"55_CR23","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T. Fawcett","year":"2006","unstructured":"Fawcett, T.: An Introduction to ROC Analysis. Pattern Recognition Letter\u00a027(8), 861\u2013874 (2006)","journal-title":"Pattern Recognition Letter"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22709-7_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:04:18Z","timestamp":1741345458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22709-7_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227080","9783642227097"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22709-7_55","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}