{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:26:19Z","timestamp":1730265979215,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/ijcnn.2010.5596339","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T14:58:15Z","timestamp":1287500295000},"page":"1-6","source":"Crossref","is-referenced-by-count":24,"title":["Kernel machines for malware classification and similarity analysis"],"prefix":"10.1109","author":[{"given":"M.","family":"Shankarapani","sequence":"first","affiliation":[]},{"given":"K.","family":"Kancherla","sequence":"additional","affiliation":[]},{"given":"S.","family":"Ramammoorthy","sequence":"additional","affiliation":[]},{"given":"R.","family":"Movva","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mukkamala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"journal-title":"Malware normalization Technical Report 1539 University of Wisconsin Madison Wisconsin USA","year":"2005","author":"christodorescu","key":"ref11"},{"year":"0","key":"ref12"},{"key":"ref13","first-page":"109","volume":"1","author":"cherkassy","year":"2002","journal-title":"Model complexity control and statistical learning theory Journal of Natural Computing"},{"journal-title":"Automatic model selection for support vector machines Technical Report Department of Computer Science and Information Engineering","year":"2000","author":"lee","key":"ref14"},{"journal-title":"Signal Detection Theory and ROC Analysis","year":"1975","author":"egan","key":"ref15"},{"journal-title":"Data mining methods for detection of new malicious executables In Proceedings of IEEE International Conference on Data Mining","year":"2001","author":"schultz","key":"ref4"},{"key":"ref3","first-page":"76.82","author":"rabek","year":"2003","journal-title":"Detection of injected dynamically generated and obfuscated malicious code In Proceedings of the 2003 ACM workshop on Rapid malcode"},{"journal-title":"IMDS Intelligent Malware Detection System In Proceedings of KDD'07","year":"2007","author":"yanfang","key":"ref6"},{"journal-title":"Learning to detect malicious executables in the wild In Proceedings of KDD'04","year":"2004","author":"kolter","key":"ref5"},{"journal-title":"Objective-oriented utility-based association mining In Proceedings of IEEE International Conference on Data Mining","year":"2002","author":"shen","key":"ref8"},{"journal-title":"Integrating Classification and Association Rule Mining KDD'98","year":"1998","author":"liu","key":"ref7"},{"journal-title":"Static analysis of executables to detect malicious patterns In Proceedings of the 12th USENIX Security Symposium","year":"2003","author":"christodorescu","key":"ref2"},{"key":"ref1","first-page":"178","author":"kephart","year":"1994","journal-title":"Automatic extraction of computer virus signatures In Proceedings of 4th Virus Bulletin International Conference"},{"journal-title":"Google Inc The Ghost In The Browser Analysis of Web-based Malware","year":"0","author":"provos","key":"ref9"}],"event":{"name":"2010 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2010,7,18]]},"location":"Barcelona, Spain","end":{"date-parts":[[2010,7,23]]}},"container-title":["The 2010 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5581822\/5595732\/05596339.pdf?arnumber=5596339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:34:15Z","timestamp":1489887255000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5596339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2010.5596339","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}