{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T10:47:36Z","timestamp":1756810056692,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999412","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"128-134","source":"Crossref","is-referenced-by-count":20,"title":["Risk prediction of malware victimization based on user behavior"],"prefix":"10.1109","author":[{"given":"Fanny Lalonde","family":"Levesque","sequence":"first","affiliation":[]},{"given":"Jose M.","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Somayaji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.30"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590347"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01148.x"},{"key":"1","article-title":"The global impact of anti-malware protection state on infection rates","author":"blackbird","year":"2013","journal-title":"Proc Virus Bull Conf"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516747"},{"key":"6","article-title":"Computer security clinical trials: Lessons learned from a 4-month pilot study","author":"lalonde l\ufffdvesque","year":"2014","journal-title":"Proc of USENIX Cyber Security Experimentation and Test (CSET) Workshop"},{"key":"5","first-page":"87","article-title":"Evaluating antivirus products with field studies","author":"lalonde-levesque","year":"2012","journal-title":"22th Virus Bulletin International Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_7"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2006.43"},{"key":"8","first-page":"301","article-title":"Who's next? Identifying risks factors for subjects of targeted attacks","author":"lee","year":"2012","journal-title":"Proc Virus Bull Conf"},{"key":"11","first-page":"773","article-title":"Cybercrime victimization: An examination of individual and situational level factors","volume":"5","author":"ngo","year":"2011","journal-title":"International Journal of Cyber Criminology"},{"key":"12","article-title":"Evaluating security products with clinical trials","author":"somayaji","year":"2009","journal-title":"Proc of USENIX Cyber Security Experimentation and Test (CSET) Workshop"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999412.pdf?arnumber=6999412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:59:22Z","timestamp":1490302762000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999412","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}