{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:54:01Z","timestamp":1729652041256,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/isda.2012.6416624","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:50:06Z","timestamp":1359568206000},"page":"711-717","source":"Crossref","is-referenced-by-count":1,"title":["Generic feature selection measure for botnet malware detection"],"prefix":"10.1109","author":[{"given":"Peter Ekstrand","family":"Berg","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Franke","sequence":"additional","affiliation":[]},{"given":"Hai Thanh","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.4018\/jmcmc.2011010102"},{"year":"2008","author":"malin","journal-title":"Malware Forensics Investigating and Analyzing Malicious Code","key":"17"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/ICPR.2010.378"},{"year":"1999","author":"hall","journal-title":"Correlation-based feature selection for machine learning","key":"15"},{"year":"2008","author":"liu","journal-title":"Computational Methods of Feature Selection","key":"16"},{"year":"2010","author":"fossi","journal-title":"Symantec Global Internet Security Threat Report Trends for 2009","key":"13"},{"key":"14","article-title":"Feature Extraction: Foundations and Applications","author":"guyon","year":"2005","journal-title":"Series Studies in Fuzziness and Soft Computing"},{"year":"2001","author":"duda","journal-title":"Pattern Classification","key":"11"},{"key":"12","article-title":"Analysis of machine learning techniques used in behavior-based malware detection","author":"l","year":"2010","journal-title":"Advances in Computing Control and Telecommunication Technologies (ACT)"},{"key":"21","first-page":"25","article-title":"Application of the generic feature selection measure in detection of web attacks","author":"nguyen","year":"2011","journal-title":"Cisis"},{"year":"2011","author":"nguyen","journal-title":"Reliability in Feature-selection Process for Intrusion Detection","key":"20"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/TPAMI.2005.159"},{"key":"23","first-page":"108","article-title":"Learning and classification of malware behavior","author":"rieck","year":"2008","journal-title":"DIMVA"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/1774088.1774303"},{"year":"2007","author":"schiller","journal-title":"Botnets The Killer Web App","key":"25"},{"year":"2006","author":"skoudis","journal-title":"A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)","key":"26"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1145\/1653662.1653738"},{"key":"28","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.45","article-title":"Toward automated dynamic malware analysis using cwsandbox","volume":"5","author":"willems","year":"2007","journal-title":"IEEE Security & Privacy"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1007\/s11416-008-0082-4"},{"year":"0","journal-title":"Offensive Computing","key":"3"},{"year":"0","author":"o'connor","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/s11416-006-0012-2"},{"year":"0","author":"knowles","key":"1"},{"year":"0","journal-title":"VMWare Workstation","key":"7"},{"year":"0","journal-title":"Top 10 Malware Registry Launchpoints","key":"6"},{"year":"0","journal-title":"Pendriveapps","key":"5"},{"year":"0","journal-title":"Packet storm","key":"4"},{"key":"9","first-page":"8","article-title":"A view on current malware behaviors","author":"bayer","year":"2009","journal-title":"Proceedings of the 2nd USENIX Conference on Largescale Exploits and Emergent Threats Botnels Spyware Worms and More LEET'09"},{"year":"0","journal-title":"VX heavens","key":"8"}],"event":{"name":"2012 12th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2012,11,27]]},"location":"Kochi, India","end":{"date-parts":[[2012,11,29]]}},"container-title":["2012 12th International Conference on Intelligent Systems Design and Applications (ISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6409495\/6416502\/06416624.pdf?arnumber=6416624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:42:10Z","timestamp":1498012930000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6416624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/isda.2012.6416624","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}