{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T20:40:14Z","timestamp":1718311214741},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T00:00:00Z","timestamp":1452729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Science and Technology Program of Wuhan City","award":["2014060101010029"],"award-info":[{"award-number":["2014060101010029"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11042-015-3228-7","type":"journal-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T06:10:30Z","timestamp":1452751830000},"page":"19543-19555","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detection technology of malicious code based on semantic"],"prefix":"10.1007","volume":"76","author":[{"given":"Qingmei","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yulin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,14]]},"reference":[{"key":"3228_CR1","doi-asserted-by":"crossref","unstructured":"Anyanwu K, Maduko A, Sheth A (2005) SemRank: ranking complex relationship search results on the semantic web. In: Proc of the 14th international world wide web conference. ACM Press. pp 117\u2013127","DOI":"10.1145\/1060745.1060766"},{"key":"3228_CR2","doi-asserted-by":"crossref","unstructured":"Anyanwu K, Sheth A (2003) \u03c1 -Queries: enabling querying for semantic associations on the semantic web. In: Proc of the 12th international world wide web conference. ACM Press. pp 690\u2013699 OpenURL","DOI":"10.1145\/775152.775249"},{"key":"3228_CR3","doi-asserted-by":"crossref","unstructured":"Diao M, Nicopoulos C, Jongman K (2011) Large-scale semantic concept detection on manycore platforms for multimedia mining. IEEE (1):384\u2013394","DOI":"10.1109\/IPDPS.2011.45"},{"key":"3228_CR4","volume-title":"Ranking semantic associations in systems chemical biology space, 19th International World Wide Web Conference","author":"X Dong","year":"2010","unstructured":"Dong X, Ding Y, Wang H, Chen B, Wild DJ (2010) Ranking semantic associations in systems chemical biology space, 19th International World Wide Web Conference. FWCS, Raleigh"},{"issue":"4","key":"3228_CR5","first-page":"481","volume":"6","author":"AM El-Semary","year":"2010","unstructured":"El-Semary AM, Gadal-Haqq M, Mostafa M (2010) Distributed and scalable intrusion detection system based on agents and intelligent techniques. JIPS 6(4):481\u2013483","journal-title":"JIPS"},{"issue":"3","key":"3228_CR6","first-page":"20","volume":"4","author":"K Goswami","year":"2013","unstructured":"Goswami K, Hong G-S, Kim B-G (2013) A novel mesh-based moving object detection technique in video sequence. JOS 4(3):20\u201324","journal-title":"JOS"},{"key":"3228_CR7","doi-asserted-by":"crossref","unstructured":"Ha H-Y, Fleites FC, Chen S-C, Chen M (2014) Correlation-based re-ranking for semantic concept detection. IEEE (10):765\u2013770","DOI":"10.1109\/IRI.2014.7051966"},{"key":"3228_CR8","doi-asserted-by":"crossref","first-page":"2794","DOI":"10.1016\/j.ins.2009.04.005","volume":"179","author":"X Jiang","year":"2009","unstructured":"Jiang X, Tan A (2009) Learning and inferencing in user ontology for personalized Semantic Web search. Inf Sci 179:2794\u20132808","journal-title":"Inf Sci"},{"key":"3228_CR9","doi-asserted-by":"crossref","unstructured":"Kolter JZ, Maloof MA (2004) Learning to detect malicious executables in the wild. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining. New York: ACM Press","DOI":"10.1145\/1014052.1014105"},{"key":"3228_CR10","unstructured":"Kumar KPK, Geethakumari G (2014) Detecting misinformation in online social networks using cognitive psychology. HCIS (9):4\u20139"},{"key":"3228_CR11","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1016\/j.amc.2014.06.016","volume":"243","author":"S Liu","year":"2014","unstructured":"Liu S, Cheng X, Fu W et al (2014) Numeric characteristics of generalized M-set with its asymptote [J]. Appl Math Comput 243:767\u2013774","journal-title":"Appl Math Comput"},{"key":"3228_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2408-1","author":"S Liu","year":"2015","unstructured":"Liu S, Fu W, He L et al (2015) Distribution of primary additional errors in fractal encoding method [J]. Multimed Tools Appl. doi: 10.1007\/s11042-014-2408-1","journal-title":"Multimed Tools Appl"},{"key":"3228_CR13","unstructured":"Liu T, Zhang L, Li P et al (2012) Remotely sensed image retrieval based on region-level\u2002semanticmining. Springer. (4):1186\u20131687"},{"issue":"1","key":"3228_CR14","first-page":"199","volume":"7","author":"G Martens","year":"2011","unstructured":"Martens G, Verborgh R, Poppe C (2011) Lifting a metadata model to the semantic multimedia world. JOS 7(1):199\u2013200","journal-title":"JOS"},{"key":"3228_CR15","unstructured":"Min H-S, Choi JY, De Neve W, Ro YM (2012) Near-duplicate video clip detection using model-free semantic concept detection and adaptive semantic distance measurement. IEEE (8):1174\u20131187"},{"issue":"4","key":"3228_CR16","first-page":"23","volume":"2","author":"KO Minsu","year":"2013","unstructured":"Minsu KO, Woonho CHOI (2013) A dstributional inference for cross-lingual undefined entities linking. JOS 2(4):23\u201328","journal-title":"JOS"},{"key":"3228_CR17","first-page":"3","volume":"8","author":"M Mozgovoy","year":"2013","unstructured":"Mozgovoy M, Efimov R (2013) WordBricks: a virtual language lab inspired by Scratch environment and dependency grammars. HCIS 8:3\u20135","journal-title":"HCIS"},{"key":"3228_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen NP, Yan G, Thai MT, Eidenbenz S (2012) Containment of misinformation spread in online social networks. In: Proceedings of the 3rd annual ACM web science conference. ACM, Illinois, USA. pp 213\u2013222","DOI":"10.1145\/2380718.2380746"},{"issue":"4","key":"3228_CR19","first-page":"1006","volume":"31","author":"G Ning","year":"2011","unstructured":"Ning G, Xiaopin S, He L (2011) Detection on malicious code based on nature sequence. Comput Appl 31(4):1006\u20131009","journal-title":"Comput Appl"},{"issue":"3","key":"3228_CR20","first-page":"349","volume":"9","author":"PB Patil","year":"2013","unstructured":"Patil PB, Kokare MB (2013) Interactive semantic image retrieval. JIPS 9(3):349\u2013364","journal-title":"JIPS"},{"key":"3228_CR21","unstructured":"Qazvinian V, Rosengren E, Radev DR, Mei Q (2011) Rumor has it: identifying misinformation in microblogs. In: Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, Edinburg, UK. pp 1589\u20131599 OpenURL"},{"key":"3228_CR22","doi-asserted-by":"crossref","unstructured":"Sun J, Zhan Y (2013) A Semi-supervised incremental learning algorithm based on auto-adaptive probabilistic hypergraph and its application for video semantic detection. IEEE (8) 743\u2013749","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.134"},{"key":"3228_CR23","unstructured":"Vidal M, Rashid L, Ibabez L, Rivera J, Rodrogiez H, Ruckhaus E (2010) A ranking-based approach to discover semantic association between linked data. The 2nd international workshop on inductive reasoning and machine learning for the semantic web 611:18\u201329 OpenURL"},{"key":"3228_CR24","first-page":"2","volume":"3","author":"V Viswanathan","year":"2012","unstructured":"Viswanathan V, Krishnamurthi I (2012) Finding relevant semantic association paths through user-specific intermediate entities. HCIS 3:2\u20139","journal-title":"HCIS"},{"key":"3228_CR25","unstructured":"Viswanathan V, Krishnamurthi I (2012) Finding relevant semantic association paths through user-specific intermediate entities. HCIS (2):3\u20139"},{"key":"3228_CR26","unstructured":"Weon I-Y, Song D-H, Ko S-B, Lee C-H (2013) A multiple instance learning problem approach model to anomaly network intrusion detection. JIPS (1):5\u20139"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3228-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3228-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3228-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3228-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T20:03:34Z","timestamp":1718309014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3228-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,14]]},"references-count":26,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["3228"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3228-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,14]]}}}