{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:48:49Z","timestamp":1759092529155,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/icosc.2015.7050784","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T15:02:43Z","timestamp":1425394963000},"page":"85-92","source":"Crossref","is-referenced-by-count":15,"title":["Intelligent malware detection based on file relation graphs"],"prefix":"10.1109","author":[{"given":"Lingwei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Melih","family":"Abdulhayoglu","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Understanding Belief Propagation and its Generalizations","author":"yedidia","year":"2001","journal-title":"Mitsubishi Electric Research Laboratories"},{"key":"ref10","first-page":"2799","article-title":"Belief Propagation for Continuous State Spaces: Stochastic Message-Passing with Quantitative Guarantees","volume":"14","author":"noorshams","year":"2013","journal-title":"J Mach Learn Res"},{"key":"ref11","first-page":"133","article-title":"Reverend Bayes on inference engines: A distributed hierarchical approach","author":"pearl","year":"1982","journal-title":"Proceedings of the Second National Conference on Artificial Intelligence"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0027-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref15","article-title":"Ramnit Goes Social","author":"raff","year":"2012","journal-title":"Seculert"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623342"},{"key":"ref18","first-page":"1141","article-title":"Graph-based Malware Distributors Detection","author":"venzhega","year":"2013","journal-title":"Proceedings of the 22Nd International Conference on World Wide Web Companion Ser WWW '13 Companion"},{"key":"ref19","first-page":"74","article-title":"Survey on Malware Detection Meth-ods","author":"vinod","year":"2009","journal-title":"Internet Security Communication Workshop"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-009-0086-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0009-x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557167"},{"key":"ref3","first-page":"6:1","article-title":"A Survey on Automated Dynamic Malware Analysis Techniques and Tools","volume":"44","author":"egele","year":"2008","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0108-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0026-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"ref7","first-page":"178","article-title":"Automatic extraction of computer virus signatures","author":"kephart","year":"1994","journal-title":"Proceedings of 4th Virus Bulletin International Conference"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.12"},{"key":"ref9","first-page":"16:1","article-title":"Cloud-Based Malware Detection for Evolving Data Streams","volume":"2","author":"masud","year":"2008","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"key":"ref1","first-page":"178","article-title":"Automated classification and analysis of internet malware","volume":"4637","author":"bailey","year":"2007","journal-title":"RAID 2007"},{"journal-title":"Trend Threat Research Team Zeus A persistent criminal enterprise","year":"2010","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0082-4"},{"key":"ref21","article-title":"Virus detection using data mining techniques","author":"wang","year":"2003","journal-title":"Proc ICDM"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281308"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/TSMCC.2009.2037978","article-title":"CIMDS: Adapting post-processing techniques of associative classification for malware detection system","volume":"40","author":"ye","year":"2010","journal-title":"IEEE Transactions on systems man and cybernetics-Part C Applications and reviews"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020448"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"}],"event":{"name":"2015 IEEE International Conference on Semantic Computing (ICSC)","start":{"date-parts":[[2015,2,7]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2015,2,9]]}},"container-title":["Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7045128\/7050753\/07050784.pdf?arnumber=7050784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T02:37:47Z","timestamp":1498185467000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7050784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icosc.2015.7050784","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}