{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:37:52Z","timestamp":1730227072996,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346710","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:17:05Z","timestamp":1449613025000},"page":"377-382","source":"Crossref","is-referenced-by-count":1,"title":["Pruned feature space for metamorphic malware detection using Markov Blanket"],"prefix":"10.1109","author":[{"given":"Jithu","family":"Raphel","sequence":"first","affiliation":[]},{"family":"Vinod P.","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"225","author":"nair","year":"2009","journal-title":"Static cfg analyzer for metamorphic malware code"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.31979\/etd.3ge6-6nfx","article-title":"Metamorphic detection via emulation","author":"priyadarshi","year":"2011"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TPAMI.2006.211"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/s11416-012-0160-5"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/s11416-013-0184-5"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s11416-012-0174-z"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.neucom.2010.02.024"},{"key":"ref17","first-page":"949","article-title":"Mal-id: Automatic malware detection using common segment analysis and meta-features","volume":"13","author":"tahan","year":"2012","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/INNOVATIONS.2012.6207739"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s11416-006-0028-7"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1023\/A:1010933404324"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s11416-008-0105-1"},{"key":"ref6","first-page":"1","article-title":"Structural entropy and metamorphic malware","author":"donabelle","year":"2013","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s11416-013-0193-4"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/BFb0026666","article-title":"Naive (bayes) at forty: The independence assumption in information retrieval","author":"lewis","year":"1998","journal-title":"Machine Learning ECML-98"},{"key":"ref7","article-title":"Unknown metamorphic malware detection: Modelling with fewer relevant features and robust feature selection techniques","volume":"42","author":"kuriakose","year":"2015","journal-title":"IAENG International Journal of Computer Science"},{"key":"ref2","first-page":"1","article-title":"Hidden markov models for malware classification","author":"annachhatre","year":"2014","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"year":"0","author":"weka","journal-title":"open source machine learning software","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s11416-010-0148-y"},{"key":"ref20","first-page":"1205","article-title":"Efficient feature selection via analysis of relevance and redundancy","volume":"5","author":"lei","year":"2004","journal-title":"The Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1049\/iet-ifs.2012.0289"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2015,8,20]]},"location":"Noida","end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346710.pdf?arnumber=7346710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T08:58:56Z","timestamp":1585299536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7346710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346710","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}