{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:12:49Z","timestamp":1729638769121,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/fskd.2015.7382048","type":"proceedings-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T23:52:33Z","timestamp":1452815553000},"page":"816-821","source":"Crossref","is-referenced-by-count":18,"title":["Using hidden markov model for dynamic malware analysis: First impressions"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Imran","sequence":"first","affiliation":[]},{"given":"Muhammad Tanvir","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Muhammad Abdul","family":"Qadir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(04)00162-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"ref11","first-page":"1","article-title":"Behavioral classification","author":"lee","year":"2006","journal-title":"EIC Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852716"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.10.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381900"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71549-8_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741874"},{"journal-title":"Malware analysis using profile hidden markov models and intrusion detection in a stream learning setting","year":"2014","author":"saradha","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0105-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"article-title":"A malware instruction set for behavior-based analysis","year":"2011","author":"trinius","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.07.004"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","article-title":"Automatic analysis of malware behavior using machine learning","volume":"19","author":"rieck","year":"2011","journal-title":"Journal of Computer Security"},{"journal-title":"Malware dataset","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref8","first-page":"1","article-title":"Hidden markov models for malware classification","author":"annachhatre","year":"2014","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0028-7"},{"journal-title":"McAfee Net losses Estimating the global cost of cybercrime","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029222"},{"year":"0","key":"ref1","article-title":"Annual report pandalabs, 2013 summary"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1994.1104"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4271\/2000-01-0349"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1986.1165342"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"}],"event":{"name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2015,8,15]]},"location":"Zhangjiajie, China","end":{"date-parts":[[2015,8,17]]}},"container-title":["2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7374053\/7381900\/07382048.pdf?arnumber=7382048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T14:27:22Z","timestamp":1567520842000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7382048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/fskd.2015.7382048","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}