{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T03:40:04Z","timestamp":1749958804664,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7841031","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T21:46:59Z","timestamp":1486504019000},"page":"3648-3655","source":"Crossref","is-referenced-by-count":5,"title":["Towards an effective and efficient malware detection system"],"prefix":"10.1109","author":[{"given":"Chia Tien","family":"Dan Lo","sequence":"first","affiliation":[]},{"given":"Ordonez","family":"Pablo","sequence":"additional","affiliation":[]},{"given":"Cepeda Mora","family":"Carlos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"OPEM: A Static-Dynamic Approach for Machine-learning-based Malware Detection","year":"0","author":"santos","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","article-title":"Classification of malware based on integrated static and dynamic features","volume":"36","author":"islam","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"article-title":"Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence","year":"2015","author":"graziano","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/21220-3960"},{"journal-title":"Cuckoo Sandbox","year":"0","key":"ref15"},{"year":"0","author":"cran","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181312"},{"article-title":"Feature Selection and Extraction for Malware Classification","year":"2015","author":"lin","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.26636\/jtit.2014.4.1044","article-title":"Comparative Study of Supervised Learning Methods for Malware Analysis","author":"kruczkowoski","year":"2014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"article-title":"Large-Scale Malware Analysis, Detection, and Signature Generation","year":"2011","author":"hu","key":"ref3"},{"article-title":"A Static Malware Detection System Using Data Mining Methods","year":"2012","author":"baldangombo","key":"ref6"},{"key":"ref5","article-title":"Learning to Detect and Classify Malicious Executables in the Wild","volume":"7","author":"kolter","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"ref8","article-title":"Malware Classification Using N-grams Sequential Pattern Features","volume":"4","author":"sornil","year":"2013","journal-title":"International Journal of Information Processing and Management(IJIPM)"},{"article-title":"Detection of Malicious Code-Injection Attack Using Two Phase Analysis Technique","year":"2012","author":"swathigavaishnave","key":"ref7"},{"year":"2013","key":"ref2","article-title":"Expanded Top Ten Big Data Security and Privacy Challenges"},{"journal-title":"VirusTotal","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07841031.pdf?arnumber=7841031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T03:03:07Z","timestamp":1749956587000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7841031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7841031","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}