{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:43:43Z","timestamp":1743129823096,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":73,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_9","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:13:02Z","timestamp":1741867982000},"page":"167-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a\u00a0Malware Family Classification Model Using Static Call Graph Instruction Visualization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2251-5107","authenticated-orcid":false,"given":"Attila","family":"Mester","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4857-878X","authenticated-orcid":false,"given":"Zal\u00e1n","family":"Bod\u00f3","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6078-2014","authenticated-orcid":false,"given":"P.","family":"Vinod","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Aghakhani, H., et al.: When malware is packin\u2019 heat; limits of machine learning classifiers based on static analysis features. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.24310"},{"key":"9_CR2","unstructured":"Alazab, M., Venkatraman, S., Watters, P.A., Alazab, M., et\u00a0al.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: AusDM, vol.\u00a011, pp. 171\u2013182 (2011)"},{"key":"9_CR3","unstructured":"Anderson, H.S., Roth, P.: EMBER: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 (2018)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"6249","DOI":"10.1109\/ACCESS.2019.2963724","volume":"8","author":"\u00d6A Aslan","year":"2020","unstructured":"Aslan, \u00d6.A., Samet, R.: A comprehensive review on malware detection approaches. IEEE Access 8, 6249\u20136271 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"9_CR5","volume":"2014","author":"J Bai","year":"2014","unstructured":"Bai, J., Wang, J., Zou, G.: A malware detection scheme based on mining format information. Sci. World J. 2014(1), 260905 (2014)","journal-title":"Sci. World J."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Charikar, M.S.: Similarity estimation techniques from rounding algorithms. In: STOC, pp. 380\u2013388. ACM (2002)","DOI":"10.1145\/509907.509965"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Cui, Z., Xue, F., Cai, X., Cao, Y., Wang, G.g., Chen, J.: Detection of malicious code variants based on deep learning. IEEE Trans. Indust. Inform. 14(7), 3187\u20133196 (2018)","DOI":"10.1109\/TII.2018.2822680"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Dahl, G.E., Stokes, J.W., Deng, L., Yu, D.: Large-scale malware classification using random projections and neural networks. In: ICASSP, pp. 3422\u20133426. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.32604\/cmc.2023.036357","volume":"75","author":"M Dener","year":"2023","unstructured":"Dener, M., Gulburun, S.: Clustering-aided supervised malware detection with specialized classifiers and early consensus. Comput. Mater. Continua 75, 1235\u20131251 (2023)","journal-title":"Comput. Mater. Continua"},{"key":"9_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103084","volume":"126","author":"H Deng","year":"2023","unstructured":"Deng, H., Guo, C., Shen, G., Cui, Y., Ping, Y.: MCTVD: A malware classification method based on three-channel visualization and deep learning. Compu. Sec. 126, 103084 (2023)","journal-title":"Compu. Sec."},{"key":"9_CR11","first-page":"29","volume":"7","author":"A Elhadi","year":"2013","unstructured":"Elhadi, A., Maarof, M., Barry, B.: Improving the detection of malware behaviour using simplified data dependent API Call graph. Inter. J. Sec. Appli. 7, 29\u201342 (2013)","journal-title":"Inter. J. Sec. Appli."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Faruki, P., Laxmi, V., Gaur, M.S., Vinod, P.: Mining control flow graph as API call-grams to detect portable executable malware. In: SINCONF, pp. 130\u2013137. ACM (2012)","DOI":"10.1145\/2388576.2388594"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: SIGSOFT, pp. 576\u2013587. ACM (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"14510","DOI":"10.1109\/ACCESS.2018.2805301","volume":"6","author":"J Fu","year":"2018","unstructured":"Fu, J., Xue, J., Wang, Y., Liu, Z., Shan, C.: Malware visualization for fine-grained classification. IEEE Access 6, 14510\u201314523 (2018)","journal-title":"IEEE Access"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"111830","DOI":"10.1109\/ACCESS.2022.3215267","volume":"10","author":"Y Gao","year":"2022","unstructured":"Gao, Y., Hasegawa, H., Yamaguchi, Y., Shimada, H.: Malware detection by control-flow graph level representation learning with graph isomorphism network. IEEE Access 10, 111830\u2013111841 (2022)","journal-title":"IEEE Access"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: AISec, pp. 45\u201354. ACM (2013)","DOI":"10.1145\/2517312.2517315"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Gibert, D., Mateu, C., Planes, J., Vicens, R.: Using convolutional neural networks for classification of malware represented as images. J. Comput. Virol. Hacking Tec. 15, 15\u201328 (3 2019)","DOI":"10.1007\/s11416-018-0323-0"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"122859","DOI":"10.1109\/ACCESS.2023.3329112","volume":"11","author":"TH Hai","year":"2023","unstructured":"Hai, T.H., Thieu, V.V., Duong, T.T., Nguyen, H.H., Huh, E.N.: A proposed new endpoint detection and response with image-based malware detection system. IEEE Access 11, 122859\u2013122875 (2023)","journal-title":"IEEE Access"},{"key":"9_CR19","unstructured":"Harang, R., Rudd, E.M.: Sorel-20m: a large scale benchmark dataset for malicious pe detection. arXiv preprint arXiv:2012.07634 (2020)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Herath, J.D., Wakodikar, P.P., Yang, P., Yan, G.: CFGExplainer: explaining graph neural network-based malware classification from control flow graphs. In: DSN, pp. 172\u2013184. IEEE (2022)","DOI":"10.1109\/DSN53405.2022.00028"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Hong, J., et al.: Malware classification for identifying author groups: a graph-based approach. In: RACS, pp. 169\u2013174. ACM (2019)","DOI":"10.1145\/3338840.3355684"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Hong, S., et al.: Holmes: health online model ensemble serving for deep learning models in intensive care units. In: SIGKDD, pp. 1614\u20131624 (2020)","DOI":"10.1145\/3394486.3403212"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Howard, A., et\u00a0al.: Searching for mobilenetv3. In: ICCV, pp. 1314\u20131324 (2019)","DOI":"10.1109\/ICCV.2019.00140"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: CVPR, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Hussain, M.J., Shaoor, A., Baig, S., Hussain, A., Muqurrab, S.A.: A hierarchical based ensemble classifier for behavioral malware detection using machine learning. In: IBCAST, pp. 702\u2013706 (2022)","DOI":"10.1109\/IBCAST54850.2022.9990203"},{"key":"9_CR27","unstructured":"Intel\u00ae 64 and IA-32 architectures software developer\u2019s manual (2024)"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Jia, L., Yang, Y., Tang, B., Jiang, Z.: ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system. BenchCouncil Trans. Benchmarks, Standards Evaluations 3, 100106 (2023)","DOI":"10.1016\/j.tbench.2023.100106"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Jiang, H., Turki, T., Wang, J.T.: DLGraph: malware detection using deep learning and graph embedding. In: ICMLA, pp. 1029\u20131033. IEEE (2018)","DOI":"10.1109\/ICMLA.2018.00168"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Kalash, M., Rochan, M., Mohammed, N., Bruce, N.D., Wang, Y., Iqbal, F.: Malware classification with deep convolutional neural networks. In: NTMS, pp.\u00a01\u20135. IEEE (2018)","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"22889","DOI":"10.1109\/ACCESS.2023.3253770","volume":"11","author":"J Kim","year":"2023","unstructured":"Kim, J., Paik, J.Y., Cho, E.S.: Attention-based cross-modal CNN using non-disassembled files for malware classification. IEEE Access 11, 22889\u201322903 (2023)","journal-title":"IEEE Access"},{"key":"9_CR32","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7(12) (2006)"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Kornish, D., Geary, J., Sansing, V., Ezekiel, S., Pearlstein, L., Njilla, L.: Malware classification using deep convolutional neural networks. In: AIPR, pp.\u00a01\u20136 (2018)","DOI":"10.1109\/AIPR.2018.8707429"},{"key":"9_CR34","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: NeurIPS (2012)"},{"key":"9_CR35","unstructured":"Li, S., Zhou, Q., Zhou, R., Lv, Q.: Intelligent malware detection based on graph convolutional network. J. Supercomput., 1\u201317 (2021)"},{"key":"9_CR36","unstructured":"Maillet, W., Marais, B.: Neural networks optimizations against concept and data drift in malware detection. arXiv preprint arXiv:2308.10821 (2023)"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Mantovani, A., Aonzo, S., Ugarte-Pedrero, X., Merlo, A., Balzarotti, D.: Prevalence and impact of low-entropy packing schemes in the malware ecosystem. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.24297"},{"key":"9_CR38","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1016\/j.procs.2017.08.216","volume":"112","author":"F Martinelli","year":"2017","unstructured":"Martinelli, F., Marulli, F., Mercaldo, F.: Evaluating convolutional neural network for effective mobile malware detection. Proc. Comput. Sci. 112, 2372\u20132381 (2017)","journal-title":"Proc. Comput. Sci."},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10796-007-9054-3","volume":"10","author":"MM Masud","year":"2008","unstructured":"Masud, M.M., Khan, L., Thuraisingham, B.: A scalable multi-level feature extraction technique to detect malicious executables. Inf. Syst. Front. 10, 33\u201345 (2008)","journal-title":"Inf. Syst. Front."},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"McLaughlin, N., Martinez\u00a0del Rincon, J., Kang, B., et\u00a0al.: Deep Android malware detection. In: CODASPY, pp. 301\u2013308. ACM (2017)","DOI":"10.1145\/3029806.3029823"},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Mester, A., Bod\u00f3, Z.: Validating static call graph-based malware signatures using community detection methods. In: ESANN, pp. 429\u2013434 (2021)","DOI":"10.14428\/esann\/2021.ES2021-27"},{"key":"9_CR42","doi-asserted-by":"publisher","unstructured":"Mester, A., Bod\u00f3, Z.: Malware classification based on graph convolutional neural networks and static call graph features. In: IEA\/AIE. pp. 528\u2013539. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-08530-7_45","DOI":"10.1007\/978-3-031-08530-7_45"},{"issue":"1","key":"9_CR43","doi-asserted-by":"publisher","first-page":"5","DOI":"10.24193\/subbi.2023.1.01","volume":"68","author":"A Mester","year":"2023","unstructured":"Mester, A.: Malware analysis and static call graph generation with Radare2. Studia Universitatis Babe\u015f-Bolyai Informatica 68(1), 5\u201320 (2023)","journal-title":"Studia Universitatis Babe\u015f-Bolyai Informatica"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Mitra, S., Torri, S.A., Mittal, S.: Survey of malware analysis through control flow graph using machine learning. In: TrustCom, pp. 1554\u20131561. IEEE (2023)","DOI":"10.1109\/TrustCom60117.2023.00212"},{"key":"9_CR45","doi-asserted-by":"publisher","unstructured":"Moskovitch, R., Feher, C., Elovici, Y.: A chronological evaluation of unknown malcode detection. In: Chen, H., Yang, C.C., Chau, M., Li, S.-H. (eds.) PAISI 2009. LNCS, vol. 5477, pp. 112\u2013117. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01393-5_12","DOI":"10.1007\/978-3-642-01393-5_12"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Moussas, V., Andreatos, A.: Malware detection based on code visualization and two-level classification. Information 12, 1\u201314 (3 2021)","DOI":"10.3390\/info12030118"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: VizSec, pp.\u00a01\u20137 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"9_CR48","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.cose.2018.04.005","volume":"77","author":"S Ni","year":"2018","unstructured":"Ni, S., Qian, Q., Zhang, R.: Malware identification using visualization images and deep learning. Comput. Sec. 77, 871\u2013885 (2018)","journal-title":"Comput. Sec."},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"de\u00a0Oliveira, A.S., Sassi, R.J.: Behavioral malware detection using deep graph convolutional neural networks. Inter. J. Comput. Appli. 174 (2021)","DOI":"10.5120\/ijca2021921218"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"Park, Y., Reeves, D., Mulukutla, V., Sundaravel, B.: Fast malware classification by automated behavioral graph matching. In: CSIIRW, pp.\u00a01\u20134 (2010)","DOI":"10.1145\/1852666.1852716"},{"issue":"2","key":"9_CR51","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00500-019-03940-5","volume":"24","author":"A Pekta\u015f","year":"2020","unstructured":"Pekta\u015f, A., Acarman, T.: Deep learning for effective android malware detection using api call graph embeddings. Soft. Comput. 24(2), 1027\u20131043 (2020)","journal-title":"Soft. Comput."},{"key":"9_CR52","unstructured":"Quertier, T., Marais, B., Morucci, S., Fournel, B.: MERLIN \u2013 Malware Evasion with Reinforcement LearnINg. arXiv preprint arXiv:2203.12980 (2022)"},{"key":"9_CR53","unstructured":"Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft malware classification challenge. arXiv preprint arXiv:1802.10135 (2018)"},{"key":"9_CR54","doi-asserted-by":"crossref","unstructured":"Sandor, M., Portase, R.M., Colesa, A.: Ember feature dataset analysis for malware detection. In: ICCP, pp. 203\u2013210 (2023)","DOI":"10.1109\/ICCP60212.2023.10398693"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: MALWARE, pp. 11\u201320. IEEE (2015)","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"9_CR56","doi-asserted-by":"crossref","unstructured":"Shang, S., Zheng, N., Xu, J., Xu, M., Zhang, H.: Detecting malware variants via function-call graph similarity. In: MALWARE, pp. 113\u2013120. IEEE (2010)","DOI":"10.1109\/MALWARE.2010.5665787"},{"key":"9_CR57","unstructured":"Sheskin, D.J.: Handbook of parametric and nonparametric statistical procedures. Chapman & Hall\/CRC (2000)"},{"key":"9_CR58","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2015)"},{"key":"9_CR59","unstructured":"Singh, A., Arora, R., Pareek, H.: Malware Analysis using Multiple API Sequence Mining Control Flow Graph. arXiv preprint arXiv:1707.02691 (2017)"},{"key":"9_CR60","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: CVPR, pp.\u00a01\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"9_CR61","unstructured":"Tan, M., Le, Q.: EfficientNetV2: smaller models and faster training. In: ICML, pp. 10096\u201310106. PMLR (2021)"},{"issue":"4","key":"9_CR62","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1049\/iet-ifs.2018.5268","volume":"13","author":"M Tang","year":"2019","unstructured":"Tang, M., Qian, Q.: Dynamic api call sequence visualisation for malware classification. IET Inf. Secur. 13(4), 367\u2013377 (2019)","journal-title":"IET Inf. Secur."},{"key":"9_CR63","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.cose.2018.11.001","volume":"81","author":"D Ucci","year":"2019","unstructured":"Ucci, D., Aniello, L., Baldoni, R.: Survey of machine learning techniques for malware analysis. Comput. Sec. 81, 123\u2013147 (2019)","journal-title":"Comput. Sec."},{"key":"9_CR64","doi-asserted-by":"publisher","first-page":"46717","DOI":"10.1109\/ACCESS.2019.2906934","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Venkatraman, S.: Robust intelligent malware detection using deep learning. IEEE Access 7, 46717\u201346738 (2019)","journal-title":"IEEE Access"},{"key":"9_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102420","volume":"110","author":"M Xiao","year":"2021","unstructured":"Xiao, M., Guo, C., Shen, G., Cui, Y., Jiang, C.: Image-based malware classification using section distribution information. Comput. Sec. 110, 102420 (2021)","journal-title":"Comput. Sec."},{"key":"9_CR66","doi-asserted-by":"crossref","unstructured":"Yan, J., Jia, X., Ying, L., Yan, J., Su, P.: Understanding and mitigating label bias in malware classification: An empirical study. In: QRS, pp. 492\u2013503 (2022)","DOI":"10.1109\/QRS57517.2022.00057"},{"key":"9_CR67","doi-asserted-by":"crossref","unstructured":"Yan, J., Yan, G., Jin, D.: Classifying malware represented as control flow graphs using deep graph convolutional neural network. In: DSN, pp. 52\u201363. IEEE (2019)","DOI":"10.1109\/DSN.2019.00020"},{"key":"9_CR68","doi-asserted-by":"crossref","unstructured":"Yang, L., Ciptadi, A., Laziuk, I., Ahmadzadeh, A., Wang, G.: BODMAS: an open dataset for learning based temporal analysis of PE malware. In: SPW, pp. 78\u201384 (May 2021)","DOI":"10.1109\/SPW53761.2021.00020"},{"key":"9_CR69","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s11416-008-0108-y","volume":"5","author":"Y Ye","year":"2009","unstructured":"Ye, Y., Chen, L., Wang, D., Li, T., Jiang, Q., Zhao, M.: SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. J. Comput. Virol. 5, 283\u2013293 (2009)","journal-title":"J. Comput. Virol."},{"issue":"3","key":"9_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3073559","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (CSUR) 50(3), 1\u201340 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9_CR71","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, T., Jiang, Q., Han, Z., Wan, L.: Intelligent file scoring system for malware detection from the gray list. In: SIGKDD, pp. 1385\u20131394 (2009)","DOI":"10.1145\/1557019.1557167"},{"key":"9_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101740","volume":"92","author":"B Yuan","year":"2020","unstructured":"Yuan, B., Wang, J., Liu, D., Guo, W., Wu, P., Bao, X.: Byte-level malware classification based on markov images and deep learning. Comput. Sec. 92, 101740 (2020)","journal-title":"Comput. Sec."},{"key":"9_CR73","doi-asserted-by":"crossref","unstructured":"Zhan, D., Duan, Y., Hu, Y., Yin, L., Pan, Z., Guo, S.: AMGmal: adaptive mask-guided adversarial attack against malware detection with minimal perturbation. Comput. Sec. 127 (2023)","DOI":"10.1016\/j.cose.2023.103103"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:13:36Z","timestamp":1741868016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}