{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:42:02Z","timestamp":1729672922507,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icdim.2017.8244670","type":"proceedings-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T16:18:26Z","timestamp":1515514706000},"page":"27-31","source":"Crossref","is-referenced-by-count":2,"title":["Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination"],"prefix":"10.1109","author":[{"given":"Prasit","family":"Usaphapanus","sequence":"first","affiliation":[]},{"given":"Krerk","family":"Piromsopa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2014","journal-title":"Proc of the Int Conf on Learning Representations (ICLR)"},{"key":"ref38","first-page":"1026","article-title":"Delving deep into rectifiers: Surpassing human-level performance on imagenet classification","volume":"11","author":"he","year":"2016","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning ser Springer Series in Statistics"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(01)00065-2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref37","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume":"9","author":"glorot","year":"2010","journal-title":"Proceedings of the 13th International Conference on Artificial Intelligence and Statistics (AISTATS)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(89)90049-0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2010.30"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_22"},{"journal-title":"Online","year":"2012","key":"ref12"},{"key":"ref13","first-page":"295","article-title":"Detection of spyware by mining executable files","author":"shazhad","year":"0","journal-title":"2010 International Conference on Availability Reliability and Security ares"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027523"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.35"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.85"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0180"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2013.6724229"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2388-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"journal-title":"Microsoft malware classification challenge (big 2015) first place team Say no to overfitting","year":"2015","author":"wang","key":"ref27"},{"journal-title":"Nearly 1 million new malware threates released every day","year":"2015","author":"harrison","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref29","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","first-page":"2721","article-title":"Learning to detect malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"The Journal of Machine Learning Research"},{"key":"ref8","first-page":"288","article-title":"A Virus Prevention Model Based on Static Analysis and Data Mining Methods","author":"wang","year":"0","journal-title":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1593105.1593239"},{"key":"ref2","first-page":"31","article-title":"Kaspersky Security Bulletin. Overall Statistics for 2016","author":"garnaeva","year":"2016","journal-title":"Secure List"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"journal-title":"Cloud Infographic Computer Virus Facts And Stats","year":"2014","author":"tweaks","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.241"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CFIS.2015.7391648"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCK.2015.7582730"},{"key":"ref42","first-page":"148","article-title":"Experiments with a new boosting algorithm","author":"freund","year":"0","journal-title":"Thirteenth International Conference on Machine Learning"},{"key":"ref24","first-page":"646","article-title":"Welcome to VX Heaven!","year":"2016","journal-title":"Control and Computing Technologies (ICACCCT)"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2016.7831719"},{"journal-title":"GNU Binutils","year":"0","key":"ref26"},{"journal-title":"Hex-Rays Home","year":"0","key":"ref25"}],"event":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2017,9,12]]},"location":"Fukuoka","end":{"date-parts":[[2017,9,14]]}},"container-title":["2017 Twelfth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8231152\/8244639\/08244670.pdf?arnumber=8244670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T01:17:50Z","timestamp":1570583870000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8244670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icdim.2017.8244670","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}