{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:21:58Z","timestamp":1775470918959,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icitcs.2016.7740362","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T16:40:55Z","timestamp":1478796055000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Polymorphic Malware Detection"],"prefix":"10.1109","author":[{"given":"Nur Syuhada","family":"Selamat","sequence":"first","affiliation":[]},{"given":"Fakariah Hani","family":"Mohd Ali","sequence":"additional","affiliation":[]},{"given":"Noor Ashitah","family":"Abu Othman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"24","article-title":"A survey on algorithmic techniques for malware detection","author":"chionis","year":"2013","journal-title":"ISCIM"},{"key":"ref3","article-title":"Malware detection and protection external devices","volume":"6","author":"charumathi","year":"2015","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref10","first-page":"694","article-title":"Optimizing decision tree in malware classification system by using genetic algorithm","volume":"1","author":"najwadi","year":"0","journal-title":"International Journal on New Computer Architectures and Their Applications (IJNCAA)"},{"key":"ref6","author":"alazab","year":"0","journal-title":"Malicious code detection using penalized splines on OPcode frequency"},{"key":"ref11","author":"deshpande","year":"0","journal-title":"Metamorphic detection using function call graph analysis"},{"key":"ref5","author":"deshpande","year":"0","journal-title":"Metamorphic detection using function call graph analysis"},{"key":"ref12","author":"bazrafshan","year":"0","journal-title":"A survey on heuristic malware detection techniques"},{"key":"ref8","author":"cani","year":"0","journal-title":"Towards automated malware creation code generation and code integration"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/21738-4937"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14257\/ijunesst.2014.7.3.12"},{"key":"ref9","author":"alazab","year":"0","journal-title":"Cybercrime the case of obfuscated malware"},{"key":"ref1","author":"wang","year":"0","journal-title":"Optimal design of self-adaptive anti-virus engine"}],"event":{"name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","location":"Prague, Czech Republic","start":{"date-parts":[[2016,9,26]]},"end":{"date-parts":[[2016,9,26]]}},"container-title":["2016 6th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740253\/7740293\/07740362.pdf?arnumber=7740362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T07:01:19Z","timestamp":1480489279000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7740362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2016.7740362","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}