{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:22:38Z","timestamp":1730215358178,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1109\/ecai52376.2021.9515044","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T22:03:11Z","timestamp":1629756191000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Computation of Cyclomatic Complexity and Detection of Malware Executable Files"],"prefix":"10.1109","author":[{"given":"Sudesh Kumar Santhosh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sandeep Pai","family":"Kulyadi","sequence":"additional","affiliation":[]},{"given":"Pavitra","family":"Mohandas","sequence":"additional","affiliation":[]},{"given":"M J Shankar","family":"Raman","sequence":"additional","affiliation":[]},{"given":"V S","family":"Vasan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IMCSIT.2009.5352759"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.6"},{"key":"ref12","article-title":"The MalSource dataset: Quantifying complexity and code reuse in malware development","author":"calleja","year":"2018","journal-title":"arXiv [cs CR]"},{"key":"ref13","article-title":"Assembly code clone detection for malware binaries","author":"farhadi","year":"2013","journal-title":"Concordia University"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09770-1_3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0012-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"ref3","article-title":"Automatic behaviour-based analysis and classification system for malware detection","author":"devesa","year":"2010","journal-title":"ICEIS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2016.7473512"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5103"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.147"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/32.106988"},{"key":"ref2","article-title":"Introduction to Malware and Malware Analysis: A brief overview","volume":"4","author":"ray","year":"2016","journal-title":"International Journal of Advance Research in Computer Science and Management Studies"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00092"},{"key":"ref9","first-page":"65","article-title":"Malware detection techniques based on deep learning","author":"sreekumari","year":"2020","journal-title":"2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity) IEEE Intl Conference on High Performance and Smart Computing (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)"}],"event":{"name":"2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2021,7,1]]},"location":"Pitesti, Romania","end":{"date-parts":[[2021,7,3]]}},"container-title":["2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9514927\/9515011\/09515044.pdf?arnumber=9515044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:50Z","timestamp":1652197490000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9515044\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ecai52376.2021.9515044","relation":{},"subject":[],"published":{"date-parts":[[2021,7,1]]}}}