{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T18:34:15Z","timestamp":1774377255638,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6824988","type":"proceedings-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T01:53:24Z","timestamp":1402970004000},"page":"211-216","source":"Crossref","is-referenced-by-count":8,"title":["Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware"],"prefix":"10.1109","author":[{"given":"Mikhail","family":"Zolotukhin","sequence":"first","affiliation":[]},{"given":"Timo","family":"Hamalainen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1134\/S1054661806030084"},{"key":"17","first-page":"557","article-title":"Further research on feature selection and classification using genetic algorithms","author":"punch","year":"1993","journal-title":"Proc of the Fifth International Conference on Genetic Algorithms (1993)"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1109\/IAW.2005.1495950","article-title":"A Machine Learning framework for network anomaly detection using SVM and GA","author":"shon","year":"2005","journal-title":"Proceedings from the Sixth Annual IEEE SMC"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2012.48"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2008.2012323"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-89900-6_21","article-title":"Unknown malcode detection using OPCODE representation","author":"moskovitch","year":"2008","journal-title":"Proc of the 1-st European Conference on Intelligence and Security Informatics (EuroISI 08)"},{"key":"11","first-page":"32","article-title":"Malware variants identification based on byte frequency","volume":"2","author":"yu","year":"2010","journal-title":"Proc of Networks Security Wireless Communications and Trusted Computing (NSWCTC)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"21","article-title":"The feature selection problem: Traditional methods and new algorithm","author":"kira","year":"1992","journal-title":"Proc Conf Artificial Intelligence"},{"key":"20","author":"romp","year":"1997","journal-title":"Game Theory Introduction and Applications"},{"key":"22","article-title":"Another approach to polychotomous classification","author":"friedman","year":"1996","journal-title":"Dept Statistics Stanford Univ Tech Rep"},{"key":"23","first-page":"113","article-title":"Fuzzy support vector machines for multiclass problems","author":"abe","year":"2002","journal-title":"Proc of European Symposium on Artificial Neural Networks"},{"key":"24","first-page":"790804","author":"cormen","year":"2001","journal-title":"INTRODUCTION TO ALGORITHMS Second Edition"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.143"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-75496-1_19","article-title":"On the concept of software obfuscation in computer security","author":"kuzurin","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.11"},{"key":"10","article-title":"Fileprints Identifying file types by n-gram analysis","author":"li","year":"2005","journal-title":"Proc of the IEEE Workshop on Information Assurance and Security"},{"key":"1","article-title":"House of commons-science and technology committee","year":"2012","journal-title":"Malware and Cyber Crime"},{"key":"7","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","author":"kotsiantis","year":"2007","journal-title":"Proc of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering Real"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.9"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179558"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/11790754_8","article-title":"Detecting self-mutating malware using control-flow graph matching","author":"bruschi","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262033589.001.0001"},{"key":"8","first-page":"73","article-title":"Recent advances in clustering: A brief survey","author":"kotsiantis","year":"2004","journal-title":"WSEAS Trans Information Science and Applications"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","location":"Atlanta, GA","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06824988.pdf?arnumber=6824988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T13:56:43Z","timestamp":1649426203000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6824988","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}