{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:40:02Z","timestamp":1746074402488,"version":"3.40.4"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,6,15]],"date-time":"2013-06-15T00:00:00Z","timestamp":1371254400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s11416-013-0188-1","type":"journal-article","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T16:39:53Z","timestamp":1386693593000},"page":"205-214","source":"Crossref","is-referenced-by-count":9,"title":["Building a practical and reliable classifier for malware detection"],"prefix":"10.1007","volume":"9","author":[{"given":"Cristina","family":"Vatamanu","sequence":"first","affiliation":[]},{"given":"Drago\u015f","family":"Gavrilu\u0163","sequence":"additional","affiliation":[]},{"given":"R\u0103zvan-Mihai","family":"Benchea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,15]]},"reference":[{"key":"188_CR1","unstructured":"Aizerman, M., Braverman, E., Rozonoer, L.: Theoretical foundations of the potential function method in pattern recognition learning. Autom. Remote Control, 821\u2013837 (1964)"},{"key":"188_CR2","unstructured":"Altaher, A., Ramadass, S., Ali, A.: Computer virus detection using features ranking and machine learning. Aust. J. Basic Appl. Sci., 1482\u20131486 (2011)"},{"key":"188_CR3","unstructured":"Avtest. http:\/\/www.av-test.org\/en\/statistics\/malware\/ (2012)"},{"key":"188_CR4","doi-asserted-by":"crossref","unstructured":"Chu, C.T., Kim, S.K., Lin, Y.A., Yu, Y., Bradski, G.R., Ng, A.Y., Olukotun, K.: Map-reduce for machine learning on multicore. In: NIPS , pp. 281\u2013288 (2006)","DOI":"10.7551\/mitpress\/7503.003.0040"},{"key":"188_CR5","doi-asserted-by":"crossref","unstructured":"Dai, J., Guha, R., Lee, J.: Effcient virus detection using dynamic instruction sequences. J. Comput., 405\u2013414 (2009)","DOI":"10.4304\/jcp.4.5.405-414"},{"key":"188_CR6","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. In: OSDI\u201904, sixth symposium on operating system design and implementation, San Francisco (2004)"},{"key":"188_CR7","unstructured":"Domingos, P.: Metacost: a general method for making classifiers costsensitive. In: Proceedings of the fifth international conference on knowledge discovery and data mining, pp. 155\u2013164 (2009)"},{"key":"188_CR8","doi-asserted-by":"crossref","unstructured":"Freund, Y., Schapire, R.E.: Large margin classification using the perceptron algorithm. Mach. Learn., 277\u2013296 (1999)","DOI":"10.1023\/A:1007662407062"},{"key":"188_CR9","doi-asserted-by":"crossref","unstructured":"Gavrilut, D., Cimpoesu, M., Anton, D., Ciortuz, L.: Malware detection using machine learning. In: Proceedings of the international multiconference on computer science and information technology, IMCSIT 2009, Mragowo, 12\u201314 October 2009, pp. 735\u2013741 (2009)","DOI":"10.1109\/IMCSIT.2009.5352759"},{"key":"188_CR10","doi-asserted-by":"crossref","unstructured":"Gavrilut, D., Vatamanu, C., Benchea, R.: Optimized zero false positives perceptron training for malware detection. In: Proceedings of SYNASC conference, Timisoara (2012)","DOI":"10.1109\/SYNASC.2012.34"},{"key":"188_CR11","unstructured":"Hung, T.C., Lam, D.X.: A feature extraction method and recognition algorithm for detection unknown worm and variations based on static features. Cyber J. Multidiscip. J. Sci. Technol. J. Select. Areas Softw. Eng. (JSSE) (2011)"},{"key":"188_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Zhao, X., Huang, K.: A feature selection method for malware detection. Inform. Autom. In: IEEE international conference, pp. 890\u2013895 (2011)","DOI":"10.1109\/ICINFA.2011.5949122"},{"key":"188_CR13","unstructured":"Kolcz, A., Alspector, J.: Svm-based filtering of e-mail spam with content-specific misclassification costs. In: IEEE international conference on data mining (2001)"},{"key":"188_CR14","unstructured":"Langford, J., Smola, A., Zinkevich, M.: Slow learners are fast. J. Mach. Learn. Res., 1\u20139 (2009)"},{"key":"188_CR15","doi-asserted-by":"crossref","unstructured":"Leather, H., Bonilla, E., O\u2019Boyle, M.: Automatic feature generation for machine learning based optimizing compilation. In: Code generation and optimization international, symposium, pp. 81\u201391 (2009)","DOI":"10.1109\/CGO.2009.21"},{"key":"188_CR16","unstructured":"McDonald, R., Hall, K., Mann, G.: Distributed training strategies for the structured perceptron. In: HLT \u201910 human language technologies: the 2010 annual conference of the North American chapter of the association for, computational linguistics, pp. 456\u2013464 (2002)"},{"key":"188_CR17","doi-asserted-by":"crossref","unstructured":"Rosenblatt, F.: The perceptron: a probabilistic model for information storage and organization in the brain. Psychol. Rev., 386\u2013407 (1958)","DOI":"10.1037\/h0042519"},{"key":"188_CR18","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1093\/bioinformatics\/btm026","volume":"23","author":"Kwang Loong Stanley","year":"2007","unstructured":"Stanley, Kwang Loong, Mishra, Santosh K.: De novo svm classification of precursor micrornas from genomic pseudo hairpins using global and intrinsic folding measures. J. Bioinform. 23, 1321\u20131330 (2007)","journal-title":"J. Bioinform."},{"key":"188_CR19","unstructured":"Tretyakov, K.: Machine learning techniques in spam filtering. In: Data mining problem-oriented, Seminar, pp. 60\u201379 (2004)"},{"key":"188_CR20","unstructured":"Whitney, M., Clifton.A., Sarkar A., Fedorova A.: Making the most of a distributed perceptron for NLP. In: proceedings of Nortwest NLP (2012)"},{"key":"188_CR21","doi-asserted-by":"crossref","unstructured":"Ye, Y., Chen, L., Wang, D., Li, T., Jiang, Q., Zhao, M.: Sbmds: an interpretable string based malware detection system using svm ensemble with bagging. J. Comput. Virol., 283\u2013293 (2009)","DOI":"10.1007\/s11416-008-0108-y"},{"key":"188_CR22","unstructured":"Yih, W., Goodman, J., Hulten, G.: Learning at low false positiverates. In: Proceedings of the 3rd conference on email and anti-spam (2006)"},{"key":"188_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, B., Yin, J., Hao, J.: Using fuzzy pattern recognition to detect unknown malicious executables code. Fuzzy Syst. Knowl. Discov., 629\u2013634 (2005)","DOI":"10.1007\/11539506_78"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0188-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-013-0188-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0188-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T03:59:39Z","timestamp":1746071979000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-013-0188-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,15]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["188"],"URL":"https:\/\/doi.org\/10.1007\/s11416-013-0188-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2013,6,15]]}}}