{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:54:44Z","timestamp":1730256884581,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/icsai.2018.8599509","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:07:30Z","timestamp":1546556850000},"page":"670-675","source":"Crossref","is-referenced-by-count":2,"title":["Malware Detection and Classification Based on Parallel Sequence Comparison"],"prefix":"10.1109","author":[{"given":"Hao","family":"Ding","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenjie","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yihang","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Binglin","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hairen","family":"Gui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","first-page":"326","author":"sung","year":"2004","journal-title":"Static Analyzer of Vicious Executables (SAVE)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"journal-title":"Microsoft Malware Classification Challenge (BIG 2015)","year":"0","key":"ref10"},{"key":"ref6","first-page":"204","article-title":"Unknown Malcode Detection Using OPCODE Representation","author":"moskovitch","year":"2008","journal-title":"2008 IEEE International Conference on Intelligence and Security Informatics ISI"},{"key":"ref5","first-page":"2583","article-title":"Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine","author":"zhang","year":"2006","journal-title":"International Joint Conference on Neural Networks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.65"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"journal-title":"A Wicked Family of Bots","year":"2017","key":"ref2"},{"key":"ref9","first-page":"1242","article-title":"Adaptive Affinity Propagation Clustering","volume":"33","author":"wang","year":"2007","journal-title":"ACTA Automatica Sinica"},{"journal-title":"Tencent Security Internet Security Report","year":"2017","key":"ref1"}],"event":{"name":"2018 5th International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2018,11,10]]},"location":"Nanjing","end":{"date-parts":[[2018,11,12]]}},"container-title":["2018 5th International Conference on Systems and Informatics (ICSAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8581430\/8599286\/08599509.pdf?arnumber=8599509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:57:01Z","timestamp":1643162221000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icsai.2018.8599509","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}