{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:08:02Z","timestamp":1730282882290,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/mlsp.2015.7324334","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T18:09:32Z","timestamp":1447351772000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Valkyrie: Behavioral malware detection using global kernel-level telemetry data"],"prefix":"10.1109","author":[{"given":"Sven","family":"Krasser","sequence":"first","affiliation":[]},{"given":"Brett","family":"Meyer","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Crenshaw","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"351","article-title":"Effective and efficient malware detection at the end host","author":"kolbitsch","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.19"},{"year":"0","key":"ref12","article-title":"VirusTotal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref14","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"The Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"ref5","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"The Journal of Machine Learning Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref7","first-page":"116","article-title":"Panorama: capturing system-wide information flow for malware detection and analysis","author":"yin","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"ref1","article-title":"Resilient distributed datasets: A fault-tolerant abstraction for inmemory cluster computing","author":"zaharia","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref9","first-page":"8","article-title":"Scalable, behavior-based malware clustering","volume":"9","author":"bayer","year":"2009","journal-title":"NDSS"}],"event":{"name":"2015 IEEE 25th International Workshop on Machine Learning for Signal Processing (MLSP)","start":{"date-parts":[[2015,9,17]]},"location":"Boston, MA, USA","end":{"date-parts":[[2015,9,20]]}},"container-title":["2015 IEEE 25th International Workshop on Machine Learning for Signal Processing (MLSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7311793\/7324166\/07324334.pdf?arnumber=7324334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:21:35Z","timestamp":1490401295000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7324334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/mlsp.2015.7324334","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}