{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:12:00Z","timestamp":1761621120151},"reference-count":9,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/mnet.2012.6375889","type":"journal-article","created":{"date-parts":[[2012,12,8]],"date-time":"2012-12-08T02:09:55Z","timestamp":1354932595000},"page":"19-25","source":"Crossref","is-referenced-by-count":2,"title":["Navigating and visualizing the malware intelligence space"],"prefix":"10.1109","volume":"26","author":[{"given":"F.","family":"Massicotte","sequence":"first","affiliation":[]},{"given":"M.","family":"Couture","sequence":"additional","affiliation":[]},{"given":"H.","family":"Normandin","sequence":"additional","affiliation":[]},{"given":"M.","family":"Letourneau","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978675"},{"key":"ref3","article-title":"Behavioral Classification","author":"lee","year":"0","journal-title":"European Institute of Computer Antivirus Research"},{"key":"ref6","first-page":"391","article-title":"Behavioral Clustering of http-based Malware and Signature Generation Using Malicious Network Traces","author":"perdisci","year":"2010","journal-title":"NSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030395"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-2010-0410","article-title":"Automatic Analysis of Malware Behavior Using Machine Learning","author":"rieck","year":"2011","journal-title":"Journal of Computer Security (JCS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70582"},{"key":"ref9","first-page":"205","article-title":"A Malware Instruction Set for Behavior-Based Analysis","author":"trinius","year":"2010","journal-title":"Sicherheit"},{"key":"ref1","first-page":"178","article-title":"Automated Classification and Analysis of Internet Malware","author":"bailey","year":"2007","journal-title":"RAID"}],"container-title":["IEEE Network"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/65\/6375882\/06375889.pdf?arnumber=6375889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:18:53Z","timestamp":1642004333000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6375889\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":9,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mnet.2012.6375889","relation":{},"ISSN":["0890-8044"],"issn-type":[{"value":"0890-8044","type":"print"}],"subject":[],"published":{"date-parts":[[2012,11]]}}}