{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:14:26Z","timestamp":1725459266406},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/siu.2014.6830667","type":"proceedings-article","created":{"date-parts":[[2014,6,21]],"date-time":"2014-06-21T01:51:45Z","timestamp":1403315505000},"page":"2066-2069","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of machine learning methods on malware detection"],"prefix":"10.1109","author":[{"given":"Emre","family":"Aydogan","sequence":"first","affiliation":[]},{"given":"Sevil","family":"Sen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"year":"2014","key":"16"},{"key":"13","first-page":"185","article-title":"Fast training of support vector machines using sequential minimal optimization","author":"platt","year":"1999","journal-title":"Advances in Kernel Methods"},{"key":"14","article-title":"The power of decision tables","author":"kohavi","year":"1995","journal-title":"Proceedings of the 8th European Conference on Machine Learning"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"12"},{"key":"3","first-page":"178","article-title":"Automatic extraction of computer virus signatures","author":"kephart","year":"1994","journal-title":"4th Virus Bulletin International Conference"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/66093.66095"},{"journal-title":"Microsoft PE and COFF Specification","year":"2013","key":"10"},{"journal-title":"Number of the Year Kaspersky Lab Is Detecting 315 000 New Malicious Files Every day","year":"2013","key":"1"},{"key":"7","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"9","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-04342-0_7","article-title":"PE-miner: Mining structural information to detect malicious executables in realtime","author":"shafiq","year":"2009","journal-title":"Recent Advances in Intrusion Detection"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314399"}],"event":{"name":"2014 22nd Signal Processing and Communications Applications Conference (SIU)","start":{"date-parts":[[2014,4,23]]},"location":"Trabzon, Turkey","end":{"date-parts":[[2014,4,25]]}},"container-title":["2014 22nd Signal Processing and Communications Applications Conference (SIU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820096\/6830164\/06830667.pdf?arnumber=6830667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T19:55:57Z","timestamp":1565553357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6830667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/siu.2014.6830667","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}