{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:52:32Z","timestamp":1730224352601,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/grc.2006.1635874","type":"proceedings-article","created":{"date-parts":[[2006,6,8]],"date-time":"2006-06-08T09:25:23Z","timestamp":1149758723000},"page":"600-603","source":"Crossref","is-referenced-by-count":1,"title":["Using null data processing to recognize variant computer viruses for rule-based anti-virus systems"],"prefix":"10.1109","author":[{"family":"Truong Minh Nhat Quang","sequence":"first","affiliation":[]},{"family":"Hoang Van Kiem","sequence":"additional","affiliation":[]},{"family":"Nguyen Thanh Thuy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"923","article-title":"De l'usage des fusions de donne?es dans les e?tudes de marche?","volume":"56","author":"lejeune","year":"1995","journal-title":"Proceedings 50th Session of ISI-Beijing"},{"key":"2","first-page":"153","article-title":"Data fusion: An appraisal and experimental evaluation","volume":"31","author":"baker","year":"1989","journal-title":"Journal of the Market Research Society"},{"key":"1","first-page":"40","article-title":"Data mining","author":"adriaans","year":"1996","journal-title":"Addison Wesley Longman"},{"key":"7","first-page":"374","article-title":"A global solution to anti-virus systems","author":"thuy","year":"1999","journal-title":"9th International Conference on Advanced Communication Technology"},{"key":"6","first-page":"61","article-title":"A machine learning approach to anti-virus system","author":"kiem","year":"2004","journal-title":"Joint Workshop of Vietnamese Society of AI SIGKBS-JSAI ICS-IPSJ and IEICE-SIGAI on Active Mining"},{"key":"5","first-page":"295","article-title":"Machine leaning approach to anti-virus expert system with nearest neighbor rule-based structural risk minimization","author":"kiem","year":"2005","journal-title":"RIVF'05 the 3rd International Conference in Computer Science Research Innovation and Vision for the Future"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(01)00072-X"},{"key":"8","article-title":"Expert system approach to diagnosing and destroying unknown computer viruses","author":"thuy","year":"1998","journal-title":"The Scientific Conference Proceedings of the 5th ASEAN Science and Technology Week"}],"event":{"name":"2006 IEEE International Conference on Granular Computing","location":"Atlanta, GA, USA"},"container-title":["2006 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10898\/34297\/01635874.pdf?arnumber=1635874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T18:52:06Z","timestamp":1489517526000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1635874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/grc.2006.1635874","relation":{},"subject":[]}}