{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:12:35Z","timestamp":1772583155162,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642405754","type":"print"},{"value":"9783642405761","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40576-1_37","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T10:17:03Z","timestamp":1376475423000},"page":"378-388","source":"Crossref","is-referenced-by-count":22,"title":["Malware Detection Using API Function Frequency with Ensemble Based Classifier"],"prefix":"10.1007","author":[{"given":"Pratiksha","family":"Natani","sequence":"first","affiliation":[]},{"given":"Deepti","family":"Vidyarthi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/COMST.2008.4483668","volume":"10","author":"P. Li","year":"2008","unstructured":"Li, P., Salour, M., Su, X.: A Survey of Internet worm Detection and Containment. IEEE Communications Survey\u00a010, 20\u201335 (2008)","journal-title":"IEEE Communications Survey"},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11416-008-0086-0","volume":"4","author":"G. Jacob","year":"2008","unstructured":"Jacob, G., Debar, H., Filliol, E.: Behavioral Detection of Malware: From a Survey Towards an Established Taxonomy. Journal Computer Virology\u00a04, 251\u2013266 (2008)","journal-title":"Journal Computer Virology"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A Survey on Automated Dynamic Malware-Analysis Techniques and Tools. ACM Computing Survey\u00a044(2) (Feburary 2012)","DOI":"10.1145\/2089125.2089126"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Kwon, O., Bae, S., Cho, J., Moon, J.: Study of Fuzzy Clustering Methods for Malicious Code using Native API Call Frequency. In: IEEE Symposium on Computational Intelligence in Cyber Security, pp. 24\u201329 (2009)","DOI":"10.1109\/CICYBS.2009.4925086"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Han, K.S., Kang, B., GyuIm, E.: Malware Classification using Instruction Frequencies. In: Proceedings of RACS 2011 ACM Symposium on Research in Applied Computation, pp. 298\u2013300 (2011)","DOI":"10.1145\/2103380.2103441"},{"key":"37_CR6","unstructured":"Mathew, G., Schultz, E., Eskin, E., Stolfo, S.J.: Data Mining Methods for Detection of New Malicious Executables. In: Proceedings in IEEE Conference, pp. 38\u201349 (2001)"},{"key":"37_CR7","first-page":"2721","volume":"7","author":"J. Zico Kolter","year":"2006","unstructured":"Zico Kolter, J., Maloof, M.A.: Learning to Detect and Classify Malicious Executables in the Wild. Journal of Machine Learning Research\u00a07, 2721\u20132744 (2006)","journal-title":"Journal of Machine Learning Research"},{"key":"37_CR8","unstructured":"Zenobi, G., Cunningham, P.: Using Diversity in Preparing Ensembles of Classifiers Based on Different Feature Subsets to Minimize Generalization Error. Department of Computer Science. Trinity College Dublin, pp. 1\u201315"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Rokach, L.: Ensemble Methods for Classifiers, ch. 45, Department of Industrial Engineering, pp. 957\u2013962. Tel-Aviv University","DOI":"10.1007\/0-387-25465-X_45"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1016\/j.csda.2008.10.015","volume":"53","author":"E. Menahem","year":"2009","unstructured":"Menahem, E., Shabtai, A., Rokach, L., Elovici, Y.: Improving Malware Detection by Applying Multiinducer Ensemble. Elsevier Computational Statistics and Data Analysis\u00a053, 1483\u20131494 (2009)","journal-title":"Elsevier Computational Statistics and Data Analysis"},{"key":"37_CR11","unstructured":"VmWare Workstation, \n                    \n                      https:\/\/my.vmware.com\n                    \n                    \n                   (dated August 01, 2012)"},{"key":"37_CR12","unstructured":"Malware.lu, \n                    \n                      http:\/\/malware.lu\/\n                    \n                    \n                   (dated February 10, 2013)"},{"key":"37_CR13","unstructured":"Cuckoo Sandbox, \n                    \n                      http:\/\/www.cuckoosandbox.org\/\n                    \n                    \n                   (dated February 10, 2013)"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40576-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T16:41:22Z","timestamp":1558024882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40576-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405754","9783642405761"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40576-1_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}