{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:16:53Z","timestamp":1729613813132,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/malware.2009.5403024","type":"proceedings-article","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T09:31:47Z","timestamp":1265967107000},"page":"15-22","source":"Crossref","is-referenced-by-count":40,"title":["Detecting Symbian OS malware through static function call analysis"],"prefix":"10.1109","author":[{"given":"Aubrey-Derrick","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"Jan Hendrik","family":"Clausen","sequence":"additional","affiliation":[]},{"given":"Ahmet","family":"Camtepe","sequence":"additional","affiliation":[]},{"given":"Sahin","family":"Albayrak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00031305.1994.10476030","article-title":"The three sigma rule","volume":"48","author":"pukelsheim","year":"1994","journal-title":"The American Statis-tician"},{"key":"ref11","article-title":"An empirical study of the naive bayes classifier","author":"rish","year":"2001","journal-title":"Technical Report"},{"key":"ref12","article-title":"Malicious software for smart-phones","author":"schmidt","year":"2008","journal-title":"Technical Report TUB-DAI 02\/08&#x2013;01"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015565"},{"year":"2006","key":"ref15","article-title":"Spyware. FlexiSpy"},{"key":"ref16","first-page":"288","article-title":"A virus prevention model based on static analysis and data mining methods","author":"wang","year":"2008","journal-title":"Computer and Information Technology Workshops"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"journal-title":"The IDA Pro Book The Unofficial Guide to the World's Most Popular Disassembler","year":"2008","author":"eagle","key":"ref4"},{"key":"ref3","first-page":"169","article-title":"Static analysis of executables to detect malicious patterns","author":"christodorescu","year":"2003","journal-title":"Proceedings of the 12th USENIX Security Symposium"},{"journal-title":"F-Secure Trojan symbos\/yxe","year":"2009","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.19"},{"key":"ref2","article-title":"Static detection of malicious code in executable programs","author":"bergeron","year":"2001","journal-title":"Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'0l)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0012-2"},{"key":"ref9","first-page":"18","article-title":"Improving host security with system call policies","author":"provos","year":"2003","journal-title":"SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium"}],"event":{"name":"2009 4th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2009,10,13]]},"location":"Montreal, Quebec, Canada","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 4th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5392747\/5403012\/05403024.pdf?arnumber=5403024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T19:53:25Z","timestamp":1711223605000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5403024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/malware.2009.5403024","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}