{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:27:40Z","timestamp":1730258860248,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/icsrs48664.2019.8987703","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T21:46:05Z","timestamp":1581371165000},"page":"16-24","source":"Crossref","is-referenced-by-count":1,"title":["Applications of Graph Integration to Function Comparison and Malware Classification"],"prefix":"10.1109","author":[{"given":"Michael","family":"Slawinski","sequence":"first","affiliation":[]},{"given":"Andy","family":"Wortman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"ho","year":"1998","journal-title":"The Random Subspace Method for Constructing Decision Forests IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref30","first-page":"278","author":"ho","year":"1995","journal-title":"Random decision forests In Proceedings of the 3rd International Conference on Document Analysis and Recognition"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AIMSEC.2011.6010676"},{"journal-title":"Android Malware Detection based on Factorization Machine","year":"2018","author":"li","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507848"},{"key":"ref15","first-page":"130","article-title":"Mining control flow graph as api call-grams to detect portable executable malware","author":"parvez","year":"2012","journal-title":"Proceedings of the Fifth International Conference on Security of Information and Networks - SIN '12"},{"key":"ref16","first-page":"1","article-title":"Graph-based comparison of executable objects (English version)","volume":"5","author":"dullien","year":"2005","journal-title":"SSTIC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"journal-title":"Neural network-based graph embedding for cross-platform binary code similarity detection","year":"2018","author":"xu","key":"ref18"},{"journal-title":"Convolutional Neural Networks over Control Flow Graphs for Software Defect Prediction","year":"2018","author":"phan","key":"ref19"},{"key":"ref28","first-page":"107","volume":"30","author":"brin","year":"1998","journal-title":"The Anatomy of A Large-Scale Hypertextual Web Search Engine Computer Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"journal-title":"VirusTotal","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00015"},{"journal-title":"Adversarial perturbations against deep neural networks for malware classification","year":"2016","author":"gross","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13580-4_3"},{"journal-title":"Adversarial Examples Attacks on Machine Learning-based Malware Visualization Detection Methods","year":"2018","author":"liu","key":"ref5"},{"key":"ref8","article-title":"Selecting features to classify malware","author":"raman","year":"0","journal-title":"InfoSec Southwest 2012"},{"journal-title":"Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries","year":"2019","author":"demetrio","key":"ref7"},{"journal-title":"Adversarial Attacks on Deep Learning Models in Natural Language Processing A Survey","year":"2019","author":"zhang","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/390013.808479","volume":"5","author":"allen","year":"1970","journal-title":"Control flow analysis ACM Sigplan Notices"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/649"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_12"},{"journal-title":"Learning to evade static PE machine learning malware models via reinforcement learning","year":"0","author":"anderson","key":"ref24"},{"journal-title":"Graph Embedding Techniques Applications and Performance A Survey","year":"2017","author":"goyal","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952603"}],"event":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2019,11,20]]},"location":"Rome, Italy","end":{"date-parts":[[2019,11,22]]}},"container-title":["2019 4th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967508\/8987581\/08987703.pdf?arnumber=8987703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T11:29:26Z","timestamp":1658143766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987703\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icsrs48664.2019.8987703","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}