{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:13:36Z","timestamp":1755792816911,"version":"3.44.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777866","type":"proceedings-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T20:35:39Z","timestamp":1481574939000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced detection of advanced malicious software"],"prefix":"10.1109","author":[{"given":"James B.","family":"Fraley","sequence":"first","affiliation":[{"name":"College of Engineering and Computing, Nova Southeastern University"}]},{"given":"James","family":"Cannady","sequence":"additional","affiliation":[{"name":"College of Engineering and Computing, Nova Southeastern University"}]}],"member":"263","reference":[{"key":"ref10","first-page":"8","article-title":"Scalable, Behavior-Based Malware Clustering","volume":"9","author":"bayer","year":"2009","journal-title":"NDSS"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","article-title":"Automated classification and analysis of internet malware.","author":"bailey","year":"2007","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2527006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2009.48"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623342"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242610"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839448"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5244\/C.22.50"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-7899-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703679"},{"journal-title":"McAfee Labs Report","year":"2015","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Entelecheia: Detecting p2p botnets in their waiting stage","author":"hang","year":"2013","journal-title":"IFIP Networking Conference 2013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RAECS.2014.6799525"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","article-title":"Learning and classification of malware behavior.","author":"rieck","year":"2008","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref7","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"The Journal of Machine Learning Research"},{"journal-title":"McAfee Labs Report","year":"2016","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501659"},{"key":"ref9","first-page":"1","article-title":"Behavioral classification","author":"lee","year":"2006","journal-title":"EIC Conference"},{"key":"ref20","first-page":"518","article-title":"Similarity search in high dimensions via hashing","volume":"99","author":"gionis","year":"1999","journal-title":"VLDB"},{"key":"ref22","first-page":"236","article-title":"Understanding belief propagation and its generalizations","volume":"8","author":"yedidia","year":"2003","journal-title":"Exploring Artificial Intelligence in the New Millennium"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020448"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICTSS.2014.7013151"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2016,10,20]]},"location":"New York, NY, USA","end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777866.pdf?arnumber=7777866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:40:29Z","timestamp":1755196829000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7777866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777866","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}