{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:10:00Z","timestamp":1729638600492,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999404","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"135-143","source":"Crossref","is-referenced-by-count":7,"title":["Agent-based trace learning in a recommendation-verification system for cybersecurity"],"prefix":"10.1109","author":[{"given":"William","family":"Casey","sequence":"first","affiliation":[]},{"given":"Evan","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Jose Andre","family":"Morales","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Appel","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Gennari","sequence":"additional","affiliation":[]},{"given":"Bud","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Signature Limits An Entire Map of Clone Features and Their Discovery in Nearly Linear Time","year":"2014","author":"casey","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"18","first-page":"2007","article-title":"Windows anti-debug reference","volume":"1","author":"falliere","year":"2007","journal-title":"Retrieved October"},{"journal-title":"Clash of the Titans ZeuS v SpyEye","year":"2010","author":"nayyar","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2010.39"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"11","volume":"1","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction 2nd Ed","year":"2009","author":"hastie","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"year":"0","key":"3"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04483-5_4"},{"journal-title":"Android Flashlight App Tracks Users Via Gps Ftc Says Hold on","year":"0","author":"kassner","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"7","first-page":"829","article-title":"Unveiling zeus: Automated classification of malware samples","author":"mohaisen","year":"2013","journal-title":"Proceedings of the 22Nd International Conference on World Wide Web Companion Ser WWW '13 Companion"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565046"},{"key":"4","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","article-title":"Hyperproperties","volume":"18","author":"clarkson","year":"2010","journal-title":"Journal of Computer Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"key":"8","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-642-29615-4_13","article-title":"Feature reduction to speed up malware classification","author":"moonsamy","year":"2012","journal-title":"Proceedings of the 16th Nordic Conference on Information Security Technology for Applications Ser NordSec'11"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999404.pdf?arnumber=6999404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T17:41:23Z","timestamp":1566236483000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999404","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}