{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:08:39Z","timestamp":1725538119144},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642318368"},{"type":"electronic","value":"9783642318375"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31837-5_53","type":"book-chapter","created":{"date-parts":[[2012,7,4]],"date-time":"2012-07-04T22:48:56Z","timestamp":1341442136000},"page":"367-372","source":"Crossref","is-referenced-by-count":0,"title":["Research on Virus Detection Technology Based on Ensemble Neural Network and SVM"],"prefix":"10.1007","author":[{"given":"Boyun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Shulin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/64.511768","volume":"11","author":"G. Tesauro","year":"1996","unstructured":"Tesauro, G., Kephart, J., Sorkin, G.: Neural Networks for Computer Virus Recognition. IEEE Expert\u00a011, 5\u20136 (1996)","journal-title":"IEEE Expert"},{"key":"53_CR2","unstructured":"Arnold, W., Tesauro, G.: Automatically Generated Win32 Heuristic Virus Detection. In: Proc. of the 2000 International Virus Bulletin Conference, pp. 51\u201360 (2000)"},{"key":"53_CR3","unstructured":"Barnet, J.A.: Computational Methods for a Mathematical Theory of Evidence. In: Proc. 7th International Conference on Artificial Intelligence, pp. 868\u2013875 (1981)"},{"key":"53_CR4","unstructured":"Assaleh, T.A., Cercone, N., Keselj, V., Sweidan, R.: Detection of New Malicious Code Uing n-grams Signatures. In: Proc. of the 2nd Annual Conference on Privacy, Security and Trust, pp. 193\u2013196 (2004)"},{"issue":"2","key":"53_CR5","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L.: Bagging Predictors. Machine Learning\u00a024(2), 123\u2013140 (1996)","journal-title":"Machine Learning"},{"issue":"2","key":"53_CR6","first-page":"197","volume":"5","author":"R.E. Schapire","year":"1990","unstructured":"Schapire, R.E.: The Strength of Weak Learnability. Machine Learning\u00a05(2), 197\u2013227 (1990)","journal-title":"Machine Learning"},{"key":"53_CR7","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/CSAC.2004.37","volume-title":"20th Annual computer Security Applications Conference","author":"A. Sung","year":"2004","unstructured":"Sung, A., Xu, J., Chavez, P., Mukkamala, S.: Static Analyzer for Vicious Executables (SAVE). In: 20th Annual computer Security Applications Conference, pp. 326\u2013334. IEEE Computer Society, Washington, DC (2004)"}],"container-title":["Communications in Computer and Information Science","Emerging Intelligent Computing Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31837-5_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:49:15Z","timestamp":1620114555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31837-5_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318368","9783642318375"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31837-5_53","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}