{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:03:40Z","timestamp":1725998620175},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811315947"},{"type":"electronic","value":"9789811315954"}],"license":[{"start":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T00:00:00Z","timestamp":1540944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1595-4_46","type":"book-chapter","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T21:39:11Z","timestamp":1540935551000},"page":"577-590","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Empirical Study on Features Recommended by LSVC in Classifying Unknown Windows Malware"],"prefix":"10.1007","author":[{"given":"S. L.","family":"Shiva Darshan","sequence":"first","affiliation":[]},{"given":"C. D.","family":"Jaidhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Bai, J., Wang, J., Zou, G.: A malware detection scheme based on mining format information. Sci. World J. (2014)","DOI":"10.1155\/2014\/260905"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Belaoued, M., Mazouzi, S.: A real-time pe-malware detection system based on chi-square test and pe-file features. In: IFIP International Conference on Computer Science and Its Applications$$\\_$$_x000D$$\\_$$_, pp. 416\u2013425. Springer (2015)","DOI":"10.1007\/978-3-319-19578-0_34"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Firdausi, I., Erwin, A., Nugroho, A.S., et\u00a0al.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), pp. 201\u2013203. IEEE (2010)","DOI":"10.1109\/ACT.2010.33"},{"key":"46_CR4","unstructured":"Guarnieri, C., Tanasi, A., Bremer, J., Schloesser, M.: Automated malware analysis-cuckoo sandbox (2012)"},{"key":"46_CR5","unstructured":"Juwono, J.T., Lim, C., Erwin, A.: A comparative study of behavior analysis sandboxes in malware detection. In: International Conference on New Media (CONMEDIA), p.\u00a073 (2015)"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Kawaguchi, N., Omote, K.: Malware function classification using apis in initial behavior. In: 2015 10th Asia Joint Conference on Information Security (AsiaJCIS), pp. 138\u2013144. IEEE (2015)","DOI":"10.1109\/AsiaJCIS.2015.15"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Kim, J., Lee, S., Youn, J.M., Choi, H.: A study of simple classification of malware based on the dynamic api call counts. In: International Conference on Computer Science and its Applications, pp. 944\u2013949. Springer (2016)","DOI":"10.1007\/978-981-10-3023-9_147"},{"key":"46_CR8","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006)"},{"key":"46_CR9","unstructured":"Kruegel, C., Kirda, E., Bayer, U.: Ttanalyze: a tool for analyzing malware. In: Proceedings of the 15th European Institute for Computer Antivirus Research (EICAR 2006) Annual Conference, vol.\u00a04 (2006)"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Lengyel, T.K., Maresca, S., Payne, B.D., Webster, G.D., Vogl, S., Kiayias, A.: Scalability, fidelity and stealth in the drakvuf dynamic malware analysis system. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 386\u2013395. ACM (2014)","DOI":"10.1145\/2664243.2664252"},{"key":"46_CR11","doi-asserted-by":"publisher","first-page":"S48","DOI":"10.1016\/j.diin.2017.06.007","volume":"22","author":"C Miller","year":"2017","unstructured":"Miller, C., Glendowne, D., Cook, H., Thomas, D., Lanclos, C., Pape, P.: Insights gained from constructing a large scale dynamic analysis platform. Dig. Invest. 22, S48\u2013S56 (2017)","journal-title":"Dig. Invest."},{"key":"46_CR12","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Conference Computer Security Applications, 2007. ACSAC 2007, pp. 421\u2013430. IEEE (2007)"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Yang, Y., He, J., Tang, C., Liu, Z.: CBM: free, automatic malware analysis framework using api call sequences. In: Knowledge Engineering and Management, pp. 225\u2013236. Springer (2014)","DOI":"10.1007\/978-3-642-37832-4_21"},{"issue":"1","key":"46_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-016-0283-1","volume":"14","author":"Edward Raff","year":"2016","unstructured":"Raff, E., Zak, R., Cox, R., Sylvester, J., Yacci, P., Ward, R., Tracy, A., McLean, M., Nicholas, C.: An investigation of byte n-gram features for malware classification. J. Comput. Virol. Hack. Tech. 1\u201320 (2016)","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"issue":"4","key":"46_CR15","doi-asserted-by":"publisher","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Sec. 19(4), 639\u2013668 (2011)","journal-title":"J. Comput. Sec."},{"key":"46_CR16","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.engappai.2016.12.016","volume":"59","author":"Z Salehi","year":"2017","unstructured":"Salehi, Z., Sami, A., Ghiasi, M.: Maar: robust features to detect malicious activity based on api calls, their arguments and return values. Eng. Appl. Artif. Intel. 59, 93\u2013102 (2017)","journal-title":"Eng. Appl. Artif. Intel."},{"key":"46_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64\u201382 (2013)","journal-title":"Inf. Sci."},{"key":"46_CR18","unstructured":"Schultz, M.G., Eskin, E., Zadok, F., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings, pp. 38\u201349. IEEE (2001)"},{"issue":"1","key":"46_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.istr.2009.03.003","volume":"14","author":"A Shabtai","year":"2009","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Inf. Sec. Tech. Report 14(1), 16\u201329 (2009)","journal-title":"Inf. Sec. Tech. Report"},{"key":"46_CR20","unstructured":"Siddiqui, M., Wang, M.C., Lee, J.: Data mining methods for malware detection using instruction sequences. In: Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, AIA \u201908, pp. 358\u2013363. ACTA Press, Anaheim, CA, USA (2008). http:\/\/dl.acm.org\/citation.cfm?id=1712759.1712825"},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Tsyganok, K., Tumoyan, E., Babenko, L., Anikeev, M.: Classification of polymorphic and metamorphic malware samples based on their behavior. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 111\u2013116. ACM (2012)","DOI":"10.1145\/2388576.2388591"},{"key":"46_CR22","doi-asserted-by":"crossref","unstructured":"Vinod, P., Laxmi, V., Gaur, M.S.: Scattered feature space for malware analysis. Adv. Comput. Commun. 562\u2013571 (2011)","DOI":"10.1007\/978-3-642-22709-7_55"},{"issue":"3","key":"46_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/3073559","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (CSUR) 50(3), 41 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1595-4_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T23:20:25Z","timestamp":1572391225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1595-4_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,31]]},"ISBN":["9789811315947","9789811315954"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1595-4_46","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,10,31]]}}}