{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:01:00Z","timestamp":1744164060900,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/fuzz-ieee.2018.8491625","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T22:18:38Z","timestamp":1539987518000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["A Fuzzy Clustering-based Approach to study Malware Phylogeny"],"prefix":"10.1109","author":[{"given":"Giovanni","family":"Acampora","sequence":"first","affiliation":[]},{"given":"Mario Luca","family":"Bernardi","sequence":"additional","affiliation":[]},{"given":"Marta","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"Genoveffa","family":"Tortora","sequence":"additional","affiliation":[]},{"given":"Autilia","family":"Vitiello","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Digital genome mapping&#x2013;advanced binary malware analysis","volume":"11","author":"carrera","year":"2004","journal-title":"Virus Bulletin Conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012801612483"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0100-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"ref16","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177087"},{"key":"ref18","article-title":"Android malware family classification based on resource consumption over time","author":"massarelli","year":"2017","journal-title":"CoRR abs\/1709 00875"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.14"},{"key":"ref4","first-page":"3","author":"anderson","year":"2012","journal-title":"Improving malware classification Bridging the static\/dynamic gap"},{"journal-title":"Mobile Threat Report","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7907009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2016.0111"},{"key":"ref7","first-page":"281","article-title":"Using discriminative rule mining to discover declarative process models with non-atomic activities","author":"bernardi","year":"0","journal-title":"Rules on the Web From Theory to Applications - 8th International Symposium RuleML"},{"journal-title":"VirusTotal","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2006.07.006"},{"key":"ref1","first-page":"1","article-title":"IEEE Standard for eXtensible Event Stream (XES) for achieving interoperability in event logs and event streams","year":"2016","journal-title":"IEEE Std 1849&#x2013;2016"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","article-title":"Learning and classification of malware behavior","author":"rieck","year":"2008","journal-title":"Proceedings of the 5th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref22","first-page":"1","article-title":"Clustering in an object-oriented environment","volume":"1","author":"struyf","year":"1997","journal-title":"Journal of Statistical Software"},{"journal-title":"Finding Groups in Data","year":"1990","author":"rousseeuw","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1007\/11494744_25","article-title":"The ProM framework: A new era in process mining tool support","author":"van dongen","year":"2005","journal-title":"Proceedings of the 26th International Conference on Applications and Theory of Petri Nets ICATPN&#x2019;05"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461003"}],"event":{"name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466242\/8491438\/08491625.pdf?arnumber=8491625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:47:18Z","timestamp":1598237238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2018.8491625","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}