{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:52:31Z","timestamp":1771699951148,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642296147","type":"print"},{"value":"9783642296154","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29615-4_13","type":"book-chapter","created":{"date-parts":[[2012,4,23]],"date-time":"2012-04-23T11:30:30Z","timestamp":1335180630000},"page":"176-188","source":"Crossref","is-referenced-by-count":10,"title":["Feature Reduction to Speed Up Malware Classification"],"prefix":"10.1007","author":[{"given":"Veelasha","family":"Moonsamy","sequence":"first","affiliation":[]},{"given":"Ronghua","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Lynn","family":"Batten","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, F., Hameed, H., Shafiq, M.Z., Farooq, M.: Using spatio-temporal information in API calls with machine learning algorithms for malware detection. In: AISec 2009: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, pp. 55\u201362 (2009)","DOI":"10.1145\/1654988.1655003"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-13541-5_15","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"K. Drozdz","year":"2010","unstructured":"Drozdz, K., Kwasnicka, H.: Feature Set Reduction by Evolutionary Selection and Construction. In: J\u0119drzejowicz, P., Nguyen, N.T., Howlet, R.J., Jain, L.C. (eds.) KES-AMSTA 2010. LNCS, vol.\u00a06071, pp. 140\u2013149. Springer, Heidelberg (2010)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Henchiri, O., Japkowicz, N.: A feature selection and evaluation scheme for computer virus detection. In: Proceedings of the Sixth International Conference on Data Mining, ICDM 2006, pp. 891\u2013895 (2006)","DOI":"10.1109\/ICDM.2006.4"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Komashinskiy, D., Kotenko, I.: Malware detection by data mining techniques based on positionally dependent features. In: 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 617\u2013623 (2010)","DOI":"10.1109\/PDP.2010.30"},{"key":"13_CR5","first-page":"2721","volume":"7","author":"J.Z. Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research\u00a07, 2721\u20132744 (2006)","journal-title":"Journal of Machine Learning Research"},{"issue":"9","key":"13_CR6","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1016\/j.patcog.2008.10.011","volume":"42","author":"Y. Li","year":"2009","unstructured":"Li, Y., Lu, B.: Feature selection based on loss-margin of nearest neighbor classification. Pattern Recognition\u00a042(9), 1914\u20131921 (2009)","journal-title":"Pattern Recognition"},{"issue":"2","key":"13_CR7","first-page":"57","volume":"39","author":"Y. Lu","year":"2010","unstructured":"Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. Journal of CCIT\u00a039(2), 57\u201372 (2010)","journal-title":"Journal of CCIT"},{"key":"13_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-71701-0_22","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"M.M. Masud","year":"2007","unstructured":"Masud, M.M., Khan, L., Thuraisingham, B.: Feature Based Techniques for Auto-Detection of Novel Email Worms. In: Zhou, Z.-H., Li, H., Yang, Q. (eds.) PAKDD 2007. LNCS (LNAI), vol.\u00a04426, pp. 205\u2013216. Springer, Heidelberg (2007)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Mehdi, S.B., Tanwani, A.K., Farooq, M.: IMAD: in-execution malware analysis and detection. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, GECCO 2009, pp. 1553\u20131560. ACM (2009)","DOI":"10.1145\/1569901.1570109"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Elovici, Y.: Unknown malcode detection via text categorization and the imbalance problem. In: 2008 IEEE International Conference on Intelligence and Security Informatics, pp. 156\u2013161 (2008)","DOI":"10.1109\/ISI.2008.4565046"},{"key":"13_CR11","unstructured":"Ranker Search Method, http:\/\/weka.sourceforge.net\/doc.stable\/weka\/attributeSelection\/Ranker.html"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Tian, R., Islam, R., Batten, L., Versteeg, S.: Differentiating malware from cleanware using behavioural analysis. In: Proceedings of the 5rd International Conference on Malicious and Unwanted Software: MALWARE 2010 (2010)","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Wang, T.-Y., Wu, C.-H., Hsieh, C.-C.: A virus prevention model based on static analysis and data mining methods. In: IEEE 8th International Conference on Computer and Information Technology Workshops, CIT Workshops 2008, pp. 288\u2013293 (2008)","DOI":"10.1109\/CIT.2008.Workshops.102"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Wang, T., Wu, C., Hsieh, C.: Detecting unknown malicious executables using portable executable headers. In: Fifth International Joint Conference on INC, IMS and IDC, NCM 2009, pp. 278\u2013284. IEEE (2009)","DOI":"10.1109\/NCM.2009.385"},{"key":"13_CR15","unstructured":"Waikato Environment for Knowledge Acquisition (WEKA): Data Mining Software in Java. University of Waikato, http:\/\/www.cs.waikato.ac.nz\/ml\/weka"},{"key":"13_CR16","volume-title":"Data mining: Practical machine learning tools and techniques","author":"I. Witten","year":"2011","unstructured":"Witten, I., Frank, E., Hall, M.A.: Data mining: Practical machine learning tools and techniques, 3rd edn. Morgan Kaufmann, Burlington (2011)","edition":"3"},{"issue":"3","key":"13_CR17","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TSMCC.2009.2037978","volume":"40","author":"Y. Ye","year":"2010","unstructured":"Ye, Y., Li, T., Jiang, Q., Wang, Y.: CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection. IEEE Transactions on Systems, Man, and Cybernetics\u00a040(3), 298\u2013307 (2010)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29615-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:10:04Z","timestamp":1620126604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29615-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642296147","9783642296154"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29615-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}