{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:55:15Z","timestamp":1772063715043,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,28]],"date-time":"2008-03-28T00:00:00Z","timestamp":1206662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,28]]},"DOI":"10.1145\/1593105.1593239","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T13:29:27Z","timestamp":1249997367000},"page":"509-510","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["A survey of data mining techniques for malware detection using file features"],"prefix":"10.1145","author":[{"given":"Muazzam","family":"Siddiqui","sequence":"first","affiliation":[{"name":"University of Central Florida"}]},{"given":"Morgan C.","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Joohan","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]}],"member":"320","published-online":{"date-parts":[[2008,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"193","volume-title":"Proceedings of Second Annual Conference on Privacy, Security and Trust","author":"Abou-Assaleh T.","year":"2004","unstructured":"T. Abou-Assaleh , N. Cercone , V. Keselj , and R. Sweidan . Detection of new malicious code using n-grams signatures . In Proceedings of Second Annual Conference on Privacy, Security and Trust , pages 193 -- 196 , 2004 . T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan. Detection of new malicious code using n-grams signatures. In Proceedings of Second Annual Conference on Privacy, Security and Trust, pages 193--196, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025118.1025582"},{"key":"e_1_3_2_1_3_1","first-page":"123","volume-title":"Virus Bulletin Conference","author":"Arnold W.","year":"2000","unstructured":"W. Arnold and G. Tesauro . Automatically generated win32 heuristic virus detection . In Virus Bulletin Conference , pages 123 -- 132 , 2000 . W. Arnold and G. Tesauro. Automatically generated win32 heuristic virus detection. In Virus Bulletin Conference, pages 123--132, 2000."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/64.511768"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.4"},{"key":"e_1_3_2_1_6_1","first-page":"178","volume-title":"Proceedings of the 4th Virus Bulletin Internation Conference","author":"Kephart J. O.","year":"1994","unstructured":"J. O. Kephart and B. Arnold . Automatic extraction of computer virus signatures . In Proceedings of the 4th Virus Bulletin Internation Conference , pages 178 -- 184 , 1994 . J. O. Kephart and B. Arnold. Automatic extraction of computer virus signatures. In Proceedings of the 4th Virus Bulletin Internation Conference, pages 178--184, 1994."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103641"},{"key":"e_1_3_2_1_9_1","article-title":"Malware phylogeny generation using permutations of code","author":"Enamul Karim A. L. Md.","year":"2005","unstructured":"A. L. Md. Enamul Karim , Andrew Walenstein and L. Parida . Malware phylogeny generation using permutations of code . Journal in Computer Virology, 1(1, 2):13--23 , 2005 . A. L. Md. Enamul Karim, Andrew Walenstein and L. Parida. Malware phylogeny generation using permutations of code. Journal in Computer Virology, 1(1, 2):13--23, 2005.","journal-title":"Journal in Computer Virology, 1(1, 2):13--23"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-007-9054-3"},{"key":"e_1_3_2_1_11_1","first-page":"245","volume-title":"MEF: Malicious email filter: A UNIX mail filter that detects malicious windows executables","author":"Schultz M. G.","year":"2001","unstructured":"M. G. Schultz , E. Eskin , E. Zadok , M. Bhattacharyya , and S. J. Stolfo . MEF: Malicious email filter: A UNIX mail filter that detects malicious windows executables . pages 245 -- 252 , 2001 . M. G. Schultz, E. Eskin, E. Zadok, M. Bhattacharyya, and S. J. Stolfo. MEF: Malicious email filter: A UNIX mail filter that detects malicious windows executables. pages 245--252, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_13_1","volume-title":"Data mining methods for malware detection using instruction sequences. Accepted at IASTED AIA","author":"Siddiqui M.","year":"2008","unstructured":"M. Siddiqui , M. C. Wang , and J. Lee . Data mining methods for malware detection using instruction sequences. Accepted at IASTED AIA 2008 , 2008. M. Siddiqui, M. C. Wang, and J. Lee. Data mining methods for malware detection using instruction sequences. Accepted at IASTED AIA 2008, 2008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688720"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784811"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281308"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029222"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0013-1"}],"event":{"name":"ACM SE08: ACM Southeast Regional Conference","location":"Auburn Alabama","acronym":"ACM SE08"},"container-title":["Proceedings of the 46th Annual Southeast Regional Conference on XX"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1593105.1593239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:19Z","timestamp":1750249399000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,28]]},"references-count":19,"alternative-id":["10.1145\/1593105.1593239","10.1145\/1593105"],"URL":"https:\/\/doi.org\/10.1145\/1593105.1593239","relation":{},"subject":[],"published":{"date-parts":[[2008,3,28]]},"assertion":[{"value":"2008-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}