{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:50:38Z","timestamp":1742993438027,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811566332"},{"type":"electronic","value":"9789811566349"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-6634-9_26","type":"book-chapter","created":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:27:09Z","timestamp":1594996029000},"page":"283-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ELM-MVD: An Extreme Learning Machine Trained Model for Malware Variants Detection"],"prefix":"10.1007","author":[{"given":"Pushkar","family":"Kishore","sequence":"first","affiliation":[]},{"given":"Swadhin Kumar","family":"Barisal","sequence":"additional","affiliation":[]},{"given":"Alle Giridhar","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"Durga Prasad","family":"Mohapatra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"unstructured":"Symantec, Internet security threat report (2017)","key":"26_CR1"},{"doi-asserted-by":"crossref","unstructured":"Kishore, P., Barisal, S.K., Vaish, S.: NITRSCT: a software security tool for collection and analysis of kernel calls. In: IEEE Region 10 Conference (TENCON), pp. 510\u2013515 (2019)","key":"26_CR2","DOI":"10.1109\/TENCON.2019.8929513"},{"doi-asserted-by":"crossref","unstructured":"Cesare, S., Xiang, Y.: Malware variant detection using similarity search over sets of control flow graphs. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 181\u2013189 (2011)","key":"26_CR3","DOI":"10.1109\/TrustCom.2011.26"},{"issue":"8","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.1109\/TIFS.2018.2806891","volume":"13","author":"M Fan","year":"2018","unstructured":"Fan, M., et al.: Android malware familial classification and representative sample selection via frequent subgraph analysis. IEEE Trans. Inf. Forensics Secur. 13(8), 1890\u20131905 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.cose.2019.04.005","volume":"84","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Qin, Z., Yin, H., Ou, L., Zhang, K.: A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. Comput. Secur. 84, 376\u2013392 (2019)","journal-title":"Comput. Secur."},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"51964","DOI":"10.1109\/ACCESS.2018.2870534","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Qin, Z., Zhang, K., Yin, H., Zou, J.: Dalvik opcode graph based Android malware variants detection using global topology features. IEEE Access 6, 51964\u201361974 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"McLaughlin, N., et al.: Deep Android malware detection. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 301\u2013308 (2017)","key":"26_CR7","DOI":"10.1145\/3029806.3029823"},{"doi-asserted-by":"crossref","unstructured":"Stringhiniq, G., Shen, Y., Han, Y., Zhang, X.: Marmite: spreading malicious file reputation through download graphs. In: Proceedings of the 33rd Annual Computer Security Applications Conference (AC-SAC) (2017)","key":"26_CR8","DOI":"10.1145\/3134600.3134604"},{"unstructured":"Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., Nicholas C.: Malware detection by eating a whole EXE. Proceedings of arXiv:1710.09435 (2017)","key":"26_CR9"},{"doi-asserted-by":"crossref","unstructured":"Kang, B., Yerima, S.Y., McLaughlin, K., Sezer, S.: N-opcode analysis for Android malware classification and categorization. In: Proceedings of International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (2016)","key":"26_CR10","DOI":"10.1109\/CyberSecPODS.2016.7502343"},{"doi-asserted-by":"crossref","unstructured":"Barisal, S.K., Dutta, A., Godboley, S., Sahoo, B., Mohapatra, D.P.: MC\/DC guided test sequence prioritization using firefly algorithm. Evol. Intell., 1\u201314 (2019)","key":"26_CR11","DOI":"10.1007\/s12065-019-00322-6"},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639\u2013668 (2011)","journal-title":"J. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Xu, L., Zhang, D., Alvarez, M.A., Morales, J.A., Ma, X., Cavazos, J.: Dynamic Android malware classification using graph-based representations. In: IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 220\u2013231 (2016)","key":"26_CR13","DOI":"10.1109\/CSCloud.2016.27"},{"issue":"4","key":"26_CR14","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s13198-019-00815-8","volume":"10","author":"SK Barisal","year":"2019","unstructured":"Barisal, S.K., Behera, S.S., Godboley, S., Mohapatra, D.P.: Validating object-oriented software at design phase by achieving MC\/DC. Int. J. Syst. Assur. Eng. Manag. 10(4), 811\u2013823 (2019). https:\/\/doi.org\/10.1007\/s13198-019-00815-8","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"unstructured":"Kolbitsch, C., Comparetti, P.M., Kruegel, C., Kirda, E., Zhou, X.Y., Wang, X.: Effective and efficient malware detection at the end host. In: USENIX Security Symposium, vol. 4, no. 1, pp. 351\u2013366 (2009)","key":"26_CR15"},{"issue":"1","key":"26_CR16","first-page":"1","volume":"3","author":"S Boyd","year":"2011","unstructured":"Boyd, S., Parikh, N., Chu, E., Peleato, B., Eckstein, J.: Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends\u00ae Mach. Learn. 3(1), 1\u2013122 (2011)","journal-title":"Found. Trends\u00ae Mach. Learn."},{"issue":"3","key":"26_CR17","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/TIP.2010.2076294","volume":"20","author":"MV Afonso","year":"2010","unstructured":"Afonso, M.V., Bioucas-Dias, J.M., Figueiredo, M.A.: An augmented Lagrangian approach to the constrained optimization formulation of imaging inverse problems. IEEE Trans. Image Process. 20(3), 681\u2013695 (2010)","journal-title":"IEEE Trans. Image Process."},{"issue":"16","key":"26_CR18","doi-asserted-by":"publisher","first-page":"2502","DOI":"10.1016\/j.neucom.2010.11.032","volume":"74","author":"F Fern\u00e1ndez-Navarro","year":"2011","unstructured":"Fern\u00e1ndez-Navarro, F., Herv\u00e1s-Mart\u00ednez, C., Sanchez-Monedero, J., Guti\u00e9rrez, P.A.: MELM-GRBF: a modified version of the extreme learning machine for generalized radial basis function neural networks. Neurocomputing 74(16), 2502\u20132510 (2011)","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Zhang, J., Khan, M.F., Lin, X., Qin, Z.: An optimized positive-unlabeled learning method for detecting a large scale of malware variants. In: IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138 (2019)","key":"26_CR19","DOI":"10.1109\/DSC47296.2019.8937650"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6634-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T03:58:34Z","timestamp":1667447914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6634-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811566332","9789811566349"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6634-9_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"354","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}