{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T04:00:26Z","timestamp":1754193626020},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/icosc.2015.7050805","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T15:02:43Z","timestamp":1425394963000},"page":"189-196","source":"Crossref","is-referenced-by-count":10,"title":["Cluster-oriented ensemble classifiers for intelligent malware detection"],"prefix":"10.1109","author":[{"given":"Shifu","family":"Hou","sequence":"first","affiliation":[]},{"given":"Lifei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Egemen","family":"Tas","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Demihovskiy","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0108-y"},{"key":"ref32","article-title":"CIMDS: Adapting postprocessing techniques of associative classification for malware detection system","author":"ye","year":"2010","journal-title":"IEEE Transactions on systems man and cybernetics-Part C Applications and reviews"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557167"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"},{"journal-title":"Research on Intelligent Malware Detection Methods and Their Applications","year":"2010","author":"yeo","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0082-4"},{"key":"ref34","article-title":"Hierarchical Associative Classifier (HAC) for Malware Detection from the Large and Imbalanced Gray List","author":"ye","year":"2009","journal-title":"Journal of Intelligent Information Systems"},{"journal-title":"Large-Scale Malware Analysis Detection and Signature Generation","year":"2011","author":"hu","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-008-0137-3"},{"key":"ref12","article-title":"Automatic extraction of computer virus signatures","author":"kephart","year":"1994","journal-title":"Proceedings of 4th Virus Bulletin International Con-ference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"ref14","article-title":"Behavioral classification","author":"lee","year":"2006","journal-title":"EICAR"},{"key":"ref15","article-title":"Integrating classification and association rule mining","author":"liu","year":"1998","journal-title":"Proceedings of KDD"},{"key":"ref16","article-title":"Using of Jaccard Coefficient for Keywords Similarity","author":"niwattanakul","year":"2013","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2010.5596332"},{"key":"ref18","article-title":"Cluster-Oriented Ensemble Classifier: Impact of Multicluster Characterization on Ensemble Classifier Learning","author":"rahman","year":"2012","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2118765"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020448"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0029-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"ref3","article-title":"Metamorphism, formal grammars and undecidable code mutation","author":"beaucamps","year":"2007","journal-title":"J Sci Comput"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0009-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281308"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"ref8","article-title":"An automated virus classification system","author":"gheorghescu","year":"2005","journal-title":"Virus Bulletin Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0026-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0012-2"},{"key":"ref9","article-title":"Evaluation of mal ware clustering based on its dynamic behaviour","author":"gurrutxaga","year":"2008","journal-title":"Seventh Australasian Data Mining Conference"},{"key":"ref1","first-page":"178","article-title":"Automated classification and analysis of internet malware","author":"bailey","year":"2007","journal-title":"RAID 2007"},{"journal-title":"Cluster-based ensemble of classifiers Expert Systems","year":"2013","author":"rahman","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690860"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/64.511768"},{"key":"ref26","article-title":"An Improved Clustering Validity Index for Determining the Number of Malware Clusters","author":"wang","year":"2009","journal-title":"International Conference on Anti-Counterfeiting Security and Identification (ASID)"},{"key":"ref25","article-title":"Virus detection using data mining techniques","author":"wang","year":"2003","journal-title":"Proc ICDM"}],"event":{"name":"2015 IEEE International Conference on Semantic Computing (ICSC)","start":{"date-parts":[[2015,2,7]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2015,2,9]]}},"container-title":["Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7045128\/7050753\/07050805.pdf?arnumber=7050805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:56:04Z","timestamp":1490309764000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7050805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icosc.2015.7050805","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}