{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:52:36Z","timestamp":1730281956287,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/mcna59361.2023.10185752","type":"proceedings-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:37:39Z","timestamp":1690220259000},"page":"55-61","source":"Crossref","is-referenced-by-count":0,"title":["Runs in the Family: Malware Family Variants Identification through API Sequence and Frequency Analysis"],"prefix":"10.1109","author":[{"given":"Aaron","family":"Walker","sequence":"first","affiliation":[{"name":"University of Nevada,Department of Computer Science and Engineering,Reno,USA"}]},{"given":"Raj Mani","family":"Shukla","sequence":"additional","affiliation":[{"name":"Anglia Ruskin University,Department of Computing and Information Science,Cambridge,UK"}]},{"given":"Tapadhir","family":"Das","sequence":"additional","affiliation":[{"name":"University of the Pacific,Department of Computer Science,USA"}]},{"given":"Shamik","family":"Sengupta","sequence":"additional","affiliation":[{"name":"University of Nevada,Department of Computer Science and Engineering,Reno,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-016-0094-0"},{"journal-title":"Windows api index - win32 apps","year":"2021","author":"kennedy","key":"ref12"},{"key":"ref15","article-title":"Malpedia: A Collaborative Effort to Inventorize the Malware Landscape","volume":"3","author":"plohmann","year":"2018","journal-title":"The Journal on Cybercrime & Digital Investigations"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685415"},{"journal-title":"Trojan win32 skeeyah h - threat encyclopedia","year":"2019","author":"micro","key":"ref20"},{"journal-title":"Using machine learning to detect malware similarity","year":"2011","author":"chaki","key":"ref11"},{"key":"ref10","article-title":"The software similarity problem in malware analysis","author":"walenstein","year":"0","journal-title":"Dagstuhl Seminar Proceedings"},{"journal-title":"Trojanspy win32 ursnif tiaboefp - threat encyclopedia","year":"2020","author":"fuentebella","key":"ref21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3268535"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527960"},{"key":"ref17","article-title":"Zeus virus","author":"lab","year":"2019","journal-title":"https \/\/usa kaspersky com\/resource-center\/threats\/zeus-"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AITB48515.2019.8947433"},{"journal-title":"C Pew Research","article-title":"Gozi: The malware with a thousand faces","year":"2020","key":"ref19"},{"journal-title":"ANSSI THE MALWARE DRIDEX ORIGINS AND USES","year":"2020","key":"ref18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873583"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00067"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ic-ETITE47903.2020.264"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0100-6"},{"journal-title":"A -T T I I -S Institute","article-title":"Malware statistics & trends report &#x2014; av-test","year":"2019","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885512"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280529"}],"event":{"name":"2023 International Conference on Multimedia Computing, Networking and Applications (MCNA)","start":{"date-parts":[[2023,6,19]]},"location":"Valencia, Spain","end":{"date-parts":[[2023,6,22]]}},"container-title":["2023 International Conference on Multimedia Computing, Networking and Applications (MCNA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10185659\/10185643\/10185752.pdf?arnumber=10185752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:34:16Z","timestamp":1692034456000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10185752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/mcna59361.2023.10185752","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}