{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:57:23Z","timestamp":1729652243354,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122799","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"80-85","source":"Crossref","is-referenced-by-count":5,"title":["Ensemble based categorization and adaptive model for malware detection"],"prefix":"10.1109","author":[{"given":"Muhammad Najmi Ahmad","family":"Zabidi","sequence":"first","affiliation":[]},{"given":"Mohd Aizaini","family":"Maarof","sequence":"additional","affiliation":[]},{"given":"Anazida","family":"Zainal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334105"},{"journal-title":"Malware Normalization","year":"2005","author":"christodorescu","key":"17"},{"key":"18","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.45","article-title":"Toward automated dynamic malware analysis using CWSandbox","volume":"5","author":"willems","year":"2007","journal-title":"IEEE Security and Privacy"},{"key":"33","first-page":"529","author":"zhou","year":"2009","journal-title":"When Semi-supervised Learning Meets Ensemble Learning"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.17"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_11"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.8"},{"key":"11","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/978-3-642-05179-1_23","article-title":"Neural network and artificial immune systems for malware and network intrusion detection","volume":"263","author":"golovko","year":"2010","journal-title":"Studies in Computational Intelligence"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2009.494"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2009.629"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19934-9_53"},{"key":"22","volume":"4","author":"rieck","year":"2009","journal-title":"Automatic Analysis of Malware Behavior Using Machine Learning"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.11"},{"key":"24","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"J Mach Learn Res"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/11559887_11"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1201\/9781420089653","article-title":"The top ten algorithms in data mining","author":"wu","year":"2009","journal-title":"Chapman &amp Hall\/CRC Data Mining and Knowledge Discovery Series"},{"key":"27","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1613\/jair.614","article-title":"Popular Ensemble Methods: An Empirical Study","volume":"11","author":"opitz","year":"1999","journal-title":"Journal of Artificial Intelligence Research"},{"key":"28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","article-title":"Ensemble methods in machine learningMultiple Classifier Systems, ser","volume":"1857","author":"dietterich","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"29","article-title":"Behavioral classification","author":"lee","year":"0","journal-title":"EICAR Conference 2006"},{"key":"3","article-title":"Statistical Analysis in Evaluating STAKCERT Infection, Activation and Payload Methods","volume":"1","author":"saudi","year":"2010","journal-title":"World Engineering Congress Proc"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314397"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"},{"journal-title":"VirusTotal - Free Online Virus Malware and URL Scanner","year":"2011","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0086-0"},{"key":"7","first-page":"617","article-title":"Malware detection by data mining techniques based on positionally dependent features","author":"komashinskiy","year":"0","journal-title":"Proc 18th Euromicro Int Parallel Distributed and Network-Based Processing (PDP) Conf 2010"},{"key":"6","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/978-3-642-00304-2_24","article-title":"Integrated usage of data mining methods for malware detection","author":"komashinskiy","year":"2009","journal-title":"Lecture Notes in Geoinformation and Cartography"},{"journal-title":"Semi-supervised learning literature survey","year":"2005","author":"zhu","key":"32"},{"key":"5","first-page":"677","article-title":"Mining distinguishing patterns based on malware traces","volume":"2","author":"sun","year":"2010","journal-title":"Proc 3rd IEEE Int Computer Science and Information Technology (ICCSIT) Conf"},{"journal-title":"Analyzing and Exploiting Network Behaviors of Malware","year":"2007","author":"morales","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13241-4_10"},{"key":"9","first-page":"735","article-title":"Malware detection using machine learning","author":"gavrilut","year":"0","journal-title":"Proc Int Multiconference Computer Science and Information Technology IMCSIT '09 2009"},{"key":"8","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/978-3-540-74565-5_5","article-title":"Applying machine learning techniques for detection of malicious code in network traffic","volume":"4667","author":"elovici","year":"2007","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122799.pdf?arnumber=6122799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T06:33:48Z","timestamp":1561185228000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122799","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}