{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:46:10Z","timestamp":1773409570547,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275913","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"2016-2022","source":"Crossref","is-referenced-by-count":7,"title":["Identifying metamorphic virus using n-grams and Hidden Markov Model"],"prefix":"10.1109","author":[{"given":"Shiva Prasad","family":"Thunga","sequence":"first","affiliation":[]},{"given":"Raghu Kisore","family":"Neelisetti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The Art of Computer Virus Research and Defense","volume":"11","author":"szor","year":"2005","journal-title":"Chapter 7"},{"key":"ref11","article-title":"Discriminative Training Methods for Hidden Markov Models: Theory and Experiments with Perceptron Algorithms","year":"2002","journal-title":"Proceedings of EMNLP Conference"},{"key":"ref12","article-title":"Metamorphic Virus: Analysis and Detection","author":"konstantinou","year":"2008","journal-title":"Technical Report Department of Mathematics Royal Holloway"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IMCSIT.2009.5352759"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0009-x"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref17","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"JMLR"},{"key":"ref18","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0027-8"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1186\/2190-8532-1-1","article-title":"Detecting malicious code by classification techniques on OpCode patterns","author":"shabtai","year":"2012","journal-title":"International Journal of Informatics Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_74"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0160-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.217"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001401000836"},{"key":"ref2","article-title":"A Survey of Malware Detection Techniques","author":"idika","year":"2007","journal-title":"Report for predoctoral Research"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","article-title":"A Tutorial on HMM and Selected applications of speech Recognition","volume":"77","author":"rabiner","year":"1989","journal-title":"Proc of IEEE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1214\/13-AOAS703"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0028-7"},{"key":"ref22","article-title":"A taxonomy of software uniqueness transformations","author":"mishra","year":"2003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0105-1"},{"key":"ref24","article-title":"AVG Anti-Virus","year":"0"},{"key":"ref23","year":"0"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Kochi, India","start":{"date-parts":[[2015,8,10]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275913.pdf?arnumber=7275913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:23:32Z","timestamp":1498235012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275913","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}