{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:24Z","timestamp":1775913504569,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["CSIT 2 EP\/N508664\/1"],"award-info":[{"award-number":["CSIT 2 EP\/N508664\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2749538","type":"journal-article","created":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T19:37:07Z","timestamp":1504813027000},"page":"17742-17752","source":"Crossref","is-referenced-by-count":29,"title":["The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8424-2757","authenticated-orcid":false,"given":"Domhnall","family":"Carlin","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Cowan","sequence":"additional","affiliation":[]},{"given":"Philip","family":"O'Kane","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177697196"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1992.223161"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref32","first-page":"727","article-title":"X-means: Extending k-means with efficient estimation of the number of clusters","volume":"1","author":"pelleg","year":"2000","journal-title":"Proc ICML"},{"key":"ref31","author":"lejska","year":"2017","journal-title":"X86 Opcode and Instruction Reference"},{"key":"ref30","year":"2015","journal-title":"Oracle Vm Virtualbox Programming Guide and Reference"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001401000836"},{"key":"ref36","article-title":"Dynamic Bayesian networks: Representation, inference and learning","author":"murphy","year":"2002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1882471.1882478"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2007.46"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0160-5"},{"key":"ref40","volume":"2004","author":"huang","year":"1990","journal-title":"Hidden Markov Models for Speech Recognition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-010-0148-y"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0105-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275913"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.217"},{"key":"ref16","first-page":"1","author":"nappa","year":"2013","journal-title":"Driving in the Cloud An Analysis of Drive-by Download Operations and Abuse Reporting"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0215-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503289"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.98"},{"key":"ref27","first-page":"230","article-title":"AVclass: A tool for massive malware labeling","author":"sebasti\u00e1n","year":"2016","journal-title":"Proc Int Symp Res Attacks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875476"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"ref29","year":"2015","journal-title":"Oracle VM VirtualBox"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2013.0020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.01.028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2242890"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0180"},{"key":"ref1","article-title":"McAfee labs threats report","author":"beek","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"ref22","first-page":"204","author":"moskovitch","year":"2008","journal-title":"Unknown Malcode Detection Using OPCODE Representation"},{"key":"ref21","first-page":"50","author":"santos","year":"2011","journal-title":"Opcodesequence-based Semi-supervised Unknown Malware Detection"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.31979\/etd.rnm3-sdfc","article-title":"Analysis and detection of metamorphic computer viruses","author":"wong","year":"2006"},{"key":"ref24","year":"2014","journal-title":"VX heavens"},{"key":"ref41","author":"murphy","year":"0","journal-title":"Hidden Markov Model (HMM) Toolbox for Matlab"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"ref26","author":"roberts","year":"2014","journal-title":"VirusShare"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.06.003"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08027024.pdf?arnumber=8027024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:11Z","timestamp":1642004771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8027024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2749538","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}