{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:22:13Z","timestamp":1777130533303,"version":"3.51.4"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/tencon.2019.8929250","type":"proceedings-article","created":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T02:01:41Z","timestamp":1576202501000},"page":"527-532","source":"Crossref","is-referenced-by-count":8,"title":["MACA-I: A Malware Detection Technique using Memory Management API Call Mining"],"prefix":"10.1109","author":[{"given":"K. V. Niranjan","family":"Sai","sequence":"first","affiliation":[]},{"given":"B.","family":"Thanudas","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sreelal","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"B. S.","family":"Manoj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774303"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AISP.2012.6313810"},{"key":"ref15","first-page":"130","article-title":"Mining control flow graph as API call-grams to detect portable executable malware","author":"faruki","year":"0","journal-title":"Proceedings of the 5th International Conference on Information Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.13189\/csit.2016.040301"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2018.8710081"},{"key":"ref19","year":"0","journal-title":"Vt community"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref3","author":"nash","year":"2005","journal-title":"An Undirected Attack Against Critical Infrastructure"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2011.77"},{"key":"ref5","author":"idika","year":"2007","journal-title":"A Survey of Malware Detection Techniques"},{"key":"ref8","first-page":"178","article-title":"Automatic extraction of computer virus signatures","author":"kephart","year":"0","journal-title":"Proceedings of the Virus Bulletin International Conference"},{"key":"ref7","article-title":"Polymorphic and metamorphic malware","author":"hosmer","year":"0","journal-title":"Proc Blackhat Conf"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.5120\/11480-7108","article-title":"A survey on malware and malware detection systems","volume":"67","author":"saeed","year":"2013","journal-title":"International Journal of Computer Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00012-W"},{"key":"ref20","first-page":"841","article-title":"On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes","author":"ng","year":"2002","journal-title":"Advances in neural information processing systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TGE.1977.6498972"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4175.001.0001","author":"scholkopf","year":"2001","journal-title":"Learning With Kernels Support Vector Machines Regularization Optimization and Beyond"},{"key":"ref23","author":"jolliffe","year":"2011","journal-title":"Principle Component Analysis"}],"event":{"name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","location":"Kochi, India","start":{"date-parts":[[2019,10,17]]},"end":{"date-parts":[[2019,10,20]]}},"container-title":["TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8910516\/8929228\/08929250.pdf?arnumber=8929250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T15:01:36Z","timestamp":1722178896000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8929250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/tencon.2019.8929250","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}