{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:16:20Z","timestamp":1759133780437,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/malware.2009.5403018","type":"proceedings-article","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T14:31:47Z","timestamp":1265985107000},"page":"63-68","source":"Crossref","is-referenced-by-count":14,"title":["Malware analysis with graph kernels and support vector machines"],"prefix":"10.1109","author":[{"given":"Cynthia","family":"Wagner","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Wagener","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Efficient convolution kernels for dependency and constituent syntactic trees","author":"moschitti","year":"2006","journal-title":"Proc 17th Eur Conf Mach Learn"},{"key":"ref11","article-title":"Making tree kernels practical for natural language learning","author":"moschitti","year":"2006","journal-title":"In Proceedings of the 11 th International Conference on EACL"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/SP.2007.17","article-title":"Exploring multiple execution paths for malware analysis","author":"moser","year":"2007","journal-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy Ser SP 07"},{"key":"ref13","first-page":"18","article-title":"Improving host security with system call poli-cies","author":"provos","year":"2003","journal-title":"SSYM'03 Proceedings of the 12th USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.76"},{"key":"ref15","first-page":"1","author":"schoelkopf","year":"2002","journal-title":"Learning with kernels"},{"key":"ref16","article-title":"Implementing selinux as a linux security module","author":"smalley","year":"2002","journal-title":"Technical Report 01&#x2013;043 NAI Labs Report"},{"journal-title":"Statistical Learning Theory","year":"1998","author":"vapnik","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/18.suppl_1.S276"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref4","article-title":"Robust anomaly detection using support vector machines","author":"hu","year":"2005","journal-title":"In Proceedings of the International Conference on Machine Learning"},{"key":"ref3","article-title":"Convolutional kernels for natural language","volume":"14","author":"collins","year":"2002","journal-title":"Advances in neural information processing systems"},{"key":"ref6","first-page":"155","author":"kashima","year":"2004","journal-title":"Kernels for Graphs"},{"key":"ref5","article-title":"Marginalized kernels between labeled graphs","author":"kashima","year":"2003","journal-title":"In Proceedings of the Twentieth International Conference on Machine Learning ICML-2003"},{"journal-title":"Linux Kernel Development","year":"2005","author":"love","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0002-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.31"},{"key":"ref1","article-title":"Paranoid penguin: an introduction to novell ap-parmor","volume":"148","author":"bauer","year":"2006","journal-title":"Linux J 2006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253575"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5019\/j.ijcir.2006.51"},{"key":"ref21","first-page":"198","article-title":"out-of-the-box&#x201D; monitoring of vm-based high-interaction honeypots","author":"xuxian","year":"2007","journal-title":"RAID"}],"event":{"name":"2009 4th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2009,10,13]]},"location":"Montreal, Quebec, Canada","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 4th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5392747\/5403012\/05403018.pdf?arnumber=5403018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T04:43:04Z","timestamp":1497847384000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5403018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/malware.2009.5403018","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}