{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:37:10Z","timestamp":1775054230946,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T00:00:00Z","timestamp":1508889600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11416-017-0309-3","type":"journal-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T15:20:33Z","timestamp":1508944833000},"page":"225-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6501-2008","authenticated-orcid":false,"given":"A. V.","family":"Kozachok","sequence":"first","affiliation":[]},{"given":"V. I.","family":"Kozachok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,25]]},"reference":[{"key":"309_CR1","unstructured":"AV-Comparatives: malware protection test. https:\/\/www.av-comparatives.org\/wp-content\/uploads\/2017\/04\/avc_mpt_201703_en.pdf (2017)"},{"key":"309_CR2","unstructured":"Buitinck, L., Louppe, G., Blondel, M., Pedregosa, F., Mueller, A., Grisel, O., Niculae, V., Prettenhofer, P., Gramfort, A., Grobler, J., Layton, R., VanderPlas, J., Joly, A., Holt, B., Varoquaux, G.: API design for machine learning software: experiences from the scikit-learn project. In: ECML PKDD Workshop: Languages for Data Mining and Machine Learning, pp. 108\u2013122 (2013)"},{"issue":"2","key":"309_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s11416-016-0274-2","volume":"13","author":"B David","year":"2017","unstructured":"David, B., Filiol, E., Gallienne, K.: Structural analysis of binary executable headers for malware detection optimization. J. Comput. Virol. Hacking Tech. 13(2), 87\u201393 (2017). https:\/\/doi.org\/10.1007\/s11416-016-0274-2","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"309_CR4","unstructured":"Federal Service for Technology and Export Control: Informational report on antivirus software requirements approval (2012) (in Russian)"},{"key":"309_CR5","unstructured":"Kingma, D., Adam, J.B.: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"309_CR6","first-page":"29","volume":"3","author":"AV Kozachok","year":"2012","unstructured":"Kozachok, A.V.: Mathematical model of destructive software recognition tools based on hidden markov models. Vestnik SibGUTI 3, 29\u201339 (2012). (in Russian)","journal-title":"Vestnik SibGUTI"},{"key":"309_CR7","unstructured":"Ochsenmeier, M.: Pestudio\u2014malware initial assesment https:\/\/www.winitor.com\/features.html (2017)"},{"key":"309_CR8","doi-asserted-by":"crossref","unstructured":"Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: Opem: a static\u2013dynamic approach for machine-learning-based malware detection. In: International Joint Conference CISIS12-ICEUTE\u2019 12-SOCO\u2019 12 Special Sessions, pp. 271\u2013280. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-33018-6_28"},{"key":"309_CR9","volume-title":"Probabilistic Part-of-Speech Tagging Using Decision Trees","author":"H Schmid","year":"1994","unstructured":"Schmid, H.: Probabilistic Part-of-Speech Tagging Using Decision Trees. UMIST, Manchester (1994)"},{"key":"309_CR10","doi-asserted-by":"publisher","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Information Security Technical Report 14(1), 16\u201329 (2009). https:\/\/doi.org\/10.1016\/j.istr.2009.03.003 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1363412709000041","DOI":"10.1016\/j.istr.2009.03.003"},{"issue":"1","key":"309_CR11","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1198\/106186006X94072","volume":"15","author":"T Shi","year":"2006","unstructured":"Shi, T., Horvath, S.: Unsupervised learning with random forest predictors. J. Comput. Graph. Stat. 15(1), 118\u2013138 (2006)","journal-title":"J. Comput. Graph. Stat."},{"key":"309_CR12","doi-asserted-by":"publisher","unstructured":"Siddiqui, M., Wang, M.C., Lee, J.: A survey of data mining techniques for malware detection using file features. In: Proceedings of the 46th Annual Southeast Regional Conference on XX, ACM-SE 46, pp. 509\u2013510. ACM, New York (2008). https:\/\/doi.org\/10.1145\/1593105.1593239","DOI":"10.1145\/1593105.1593239"},{"key":"309_CR13","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014). http:\/\/dl.acm.org\/citation.cfm?id=2627435.2670313"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-017-0309-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-017-0309-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-017-0309-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:36:14Z","timestamp":1570235774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-017-0309-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,25]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["309"],"URL":"https:\/\/doi.org\/10.1007\/s11416-017-0309-3","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,25]]}}}