{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:02:40Z","timestamp":1729638160152,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413684","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T16:26:08Z","timestamp":1456503968000},"page":"48-55","source":"Crossref","is-referenced-by-count":2,"title":["Automatically combining static malware detection techniques"],"prefix":"10.1109","author":[{"given":"David","family":"De Lille","sequence":"first","affiliation":[]},{"given":"Bart","family":"Coppens","sequence":"additional","affiliation":[]},{"given":"Daan","family":"Raman","sequence":"additional","affiliation":[]},{"given":"Bjorn","family":"De Sutter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"journal-title":"Discriminant Analysis","year":"1975","author":"lachenbruch","key":"ref11"},{"key":"ref12","first-page":"800","article-title":"Generating better decision trees","author":"norton","year":"1989","journal-title":"Proc 11th Int'l Joint Conf on Artificial Intelligence (IJCAI)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF00114778"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"696","DOI":"10.7551\/mitpress\/4943.003.0042","author":"rumelhart","year":"1988","journal-title":"Neurocomputing Foundations of Research"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993101"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2011","author":"witten","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2556464.2556467"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11871842_60"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","article-title":"DroidAPIMiner: Mining API-level features for robust malware detection in Android","volume":"127","author":"aafer","year":"2013","journal-title":"Security and Privacy in Communication Networks"},{"key":"ref9","first-page":"1277","article-title":"Building classifiers using bayesian networks","author":"friedman","year":"1996","journal-title":"Proc Nat'l Conf Artificial Intelligence (AAAI)"}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2015,10,20]]},"location":"Fajardo","end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413684.pdf?arnumber=7413684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T16:53:03Z","timestamp":1718383983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7413684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413684","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}