{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:12:25Z","timestamp":1730283145373,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/milcom.2017.8170758","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T22:40:39Z","timestamp":1513032039000},"page":"23-28","source":"Crossref","is-referenced-by-count":3,"title":["Hierarchical learning for automated malware classification"],"prefix":"10.1109","author":[{"given":"Shayok","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Jack W.","family":"Stokes","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Dengyong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Mady","family":"Marinescu","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"ref11","article-title":"Scalable, behavior-based malware clustering","author":"bayer","year":"2009","journal-title":"Annual Network & Distributed System Security Symposium (NDSS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"ref13","article-title":"Behavioral classification","author":"lee","year":"2006","journal-title":"Annual Conf of the European Institute for Computer Antivirus Research (EICAR)"},{"key":"ref14","article-title":"Cmar: Accurate and efficient classification based on multiple class-association rules","author":"li","year":"2001","journal-title":"IEEE ICDM"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031186"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015374"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345593"},{"key":"ref18","article-title":"Hierarchical classification via orthogonal transfer","author":"zhou","year":"2011","journal-title":"ICML"},{"journal-title":"An Introduction to Information Retrieval","year":"2009","author":"manning","key":"ref19"},{"key":"ref28","article-title":"Hierarchical classification: Combining bayes with svm","author":"bianchi","year":"2005","journal-title":"NIPS"},{"journal-title":"Machine learning for anti-virus software","year":"0","key":"ref4"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2007","author":"bishop","key":"ref27"},{"key":"ref3","first-page":"1","article-title":"Using file relationships in malware classification","author":"karampatziakis","year":"2012","journal-title":"DIMVA"},{"key":"ref6","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","author":"kolter","year":"2006","journal-title":"JMLR"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143867"},{"key":"ref5","first-page":"130","article-title":"A biologically inspired immune system for computers","author":"kephart","year":"1994","journal-title":"International Workshop on the Synthesis and Simulation of Living Systems (Artificial Life)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076735"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488219"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref1","article-title":"A survey of malware detection techniques","author":"idika","year":"2007","journal-title":"Purdue Univ Tech Rep"},{"key":"ref20","first-page":"265","article-title":"On the algorithmic implementation of multiclass kernel-based vector machines","volume":"2","author":"crammer","year":"2001","journal-title":"JMLR"},{"key":"ref22","first-page":"2543","article-title":"Dual averaging methods for regularized stochastic learning and online optimization","volume":"11","author":"xiao","year":"2010","journal-title":"JMLR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-007-0149-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-009-0086-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0120-x"},{"journal-title":"An Introduction to Support Vector Machines","year":"2000","author":"cristianini","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.47"}],"event":{"name":"2017 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2017,10,23]]},"location":"Baltimore, MD","end":{"date-parts":[[2017,10,25]]}},"container-title":["MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125230\/8170714\/08170758.pdf?arnumber=8170758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:52:01Z","timestamp":1516056721000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8170758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/milcom.2017.8170758","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}