{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:01:38Z","timestamp":1769126498156,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/snams52053.2020.9336538","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T23:20:56Z","timestamp":1612394456000},"page":"1-7","source":"Crossref","is-referenced-by-count":11,"title":["Evaluating Performance Maintenance and Deterioration Over Time of Machine Learning-based Malware Detection Models on the EMBER PE Dataset"],"prefix":"10.1109","author":[{"given":"Colin","family":"Galen","sequence":"first","affiliation":[{"name":"Computer Science Lab, Capitol Technology University,Laurel,MD,USA"}]},{"given":"Robert","family":"Steele","sequence":"additional","affiliation":[{"name":"Computer Science Lab, Capitol Technology University,Laurel,MD,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-030-03192-3_17","article-title":"Static PE malware detection using gradient boosting decision trees algorithm","author":"pham","year":"2018","journal-title":"International Conference on Future Data and Security Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2018.8574202"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.016"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.icte.2018.10.006","article-title":"DeepMalNet: evaluating shallow and deep networks for static PE malware detection","volume":"4","author":"vinayakumar","year":"2018","journal-title":"ICT Express"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00312-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00304"},{"key":"ref16","article-title":"Performance Maintenance Over Time of Random Forest-based Malware Detection Models","author":"galen","year":"0","journal-title":"In Proceedings of the 11th Annual IEEE UEMCON Conference"},{"key":"ref17","article-title":"The Effect of Training Set Timeframe on the Future Performance of Machine Learning-based Malware Detection Models","author":"galen","year":"0","journal-title":"In Proceedings of 54th Annual HICSS Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2875369"},{"key":"ref19","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774303"},{"key":"ref6","year":"2020","journal-title":"EMBER2018 Dataset"},{"key":"ref5","article-title":"Ember: an open dataset for training static pe malware machine learning models","author":"anderson","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref8","article-title":"Malware detection by eating a whole exe","author":"raff","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref7","article-title":"Ember Improvements","author":"roth","year":"0","journal-title":"Conference on Applied Machine Learning for Information Security (CAMLIS 19)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.01.003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WATeR.2014.7015757"},{"key":"ref9","first-page":"949","article-title":"Mal-id: Automatic malware detection using common segment analysis and meta-features","volume":"13","author":"tahan","year":"2012","journal-title":"The Journal of Machine Learning Research"},{"key":"ref20","first-page":"148","article-title":"Experiments with a new boosting algorithm","volume":"96","author":"freund","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000015881.36452.6e"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"}],"event":{"name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Paris, France","start":{"date-parts":[[2020,12,14]]},"end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9336519\/9336528\/09336538.pdf?arnumber=9336538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:21Z","timestamp":1656602301000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9336538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/snams52053.2020.9336538","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}