{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:36:57Z","timestamp":1730281017727,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999409","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:44:39Z","timestamp":1421721879000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Identifying malware genera using the Jensen-Shannon distance between system call traces"],"prefix":"10.1109","author":[{"given":"Jeremy D.","family":"Seideman","sequence":"first","affiliation":[]},{"given":"Bilal","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Antonio Cesar","family":"Vargas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Annual Report Panda Labs-2013 Summary","year":"2013","key":"19"},{"journal-title":"Norman Sandbox","year":"2009","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/BF02517812"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/18.61115"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"13","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"14","article-title":"Behavioral classification","author":"lee","year":"2006","journal-title":"Proceedings of EICAR 2006"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"journal-title":"A Virus by Any Other Name Virus Naming Practices","year":"2002","author":"riau","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852716"},{"key":"22","first-page":"291","article-title":"Towards autmating malware classification and characterization","volume":"2008","author":"seewald","year":"2008","journal-title":"Proceeding of Sicherheit"},{"journal-title":"Recent Advances in Malware Detection and Classification A Survey","year":"2009","author":"seideman","key":"23"},{"journal-title":"Threat Explorer - Spyware and Adware Dialers Hack Tools Hoaxes and Other Risks","year":"2012","key":"24"},{"journal-title":"VirusTotal","year":"2008","key":"25"},{"journal-title":"VX heavens","year":"2010","key":"26"},{"journal-title":"Biology","year":"1996","author":"campbell","key":"3"},{"key":"2","article-title":"Scalable, behavior-based malware clustering","volume":"2009","author":"bayer","year":"2009","journal-title":"Proceedings of NDSS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0086-0"},{"key":"1","first-page":"178","article-title":"Automated classification and analysis of internet malware","volume":"2007","author":"bailey","year":"2007","journal-title":"Proceedings of RAID"},{"key":"7","first-page":"63","article-title":"Behavioral distance for intrusion detection","volume":"2005","author":"gao","year":"2005","journal-title":"Proceedings of RAID"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.813506"},{"journal-title":"NLP09 Assignment 1 Computing KL Divergence","year":"2013","author":"elhadad","key":"5"},{"journal-title":"Classification of Species","year":"2009","key":"4"},{"key":"9","first-page":"294","article-title":"An automated virus classification system","author":"gheorghescu","year":"2005","journal-title":"Virus Bulletin Conference"},{"journal-title":"Genus-definition from Biology-online org","year":"2014","key":"8"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999409.pdf?arnumber=6999409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:45:27Z","timestamp":1490316327000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999409","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}