{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:08:39Z","timestamp":1773670119007,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T00:00:00Z","timestamp":1246147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,28]]},"DOI":"10.1145\/1599272.1599278","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"23-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["Malware detection using statistical analysis of byte-level file content"],"prefix":"10.1145","author":[{"given":"S. Momina","family":"Tabish","sequence":"first","affiliation":[{"name":"National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan"}]},{"given":"M. Zubair","family":"Shafiq","sequence":"additional","affiliation":[{"name":"National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan"}]},{"given":"Muddassar","family":"Farooq","sequence":"additional","affiliation":[{"name":"National University of Computer &amp; Emerging Sciences (FAST-NUCES), Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2009,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Symantec Internet Security Threat Reports I-XI (Jan 2002---Jan 2008).  Symantec Internet Security Threat Reports I-XI (Jan 2002---Jan 2008)."},{"key":"e_1_3_2_1_2_1","volume-title":"Press release","author":"F-Secure Corporation","year":"2007","unstructured":"F-Secure Corporation , \"F-Secure Reports Amount of Malware Grew by 100% during 2007\" , Press release , 2007 . F-Secure Corporation, \"F-Secure Reports Amount of Malware Grew by 100% during 2007\", Press release, 2007."},{"key":"e_1_3_2_1_3_1","unstructured":"A. Stepan \"Improving Proactive Detection of Packed Malware\" Virus Buletin March 2006 available at http:\/\/www.virusbtn.com\/virusbulletin\/archive\/2006\/03\/vb200603-packed.dkb  A. Stepan \"Improving Proactive Detection of Packed Malware\" Virus Buletin March 2006 available at http:\/\/www.virusbtn.com\/virusbulletin\/archive\/2006\/03\/vb200603-packed.dkb"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.06.016"},{"key":"e_1_3_2_1_5_1","unstructured":"AVG Free Antivirus available at http:\/\/free.avg.com\/.  AVG Free Antivirus available at http:\/\/free.avg.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Panda Antivirus available at http:\/\/www.pandasecurity.com\/.  Panda Antivirus available at http:\/\/www.pandasecurity.com\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_1_9_1","first-page":"985","volume-title":"International Joint Conference on Artificial Intelligence (IJCAI)","author":"Kephart J.","year":"1995","unstructured":"J. Kephart , G. Sorkin , W. Arnold , D. Chess , G. Tesauro , S. White , \"Biologically inspired defenses against computer viruses \", International Joint Conference on Artificial Intelligence (IJCAI) , pp. 985 -- 996 , USA, 1995 . J. Kephart, G. Sorkin, W. Arnold, D. Chess, G. Tesauro, S. White, \"Biologically inspired defenses against computer viruses\", International Joint Conference on Artificial Intelligence (IJCAI), pp. 985--996, USA, 1995."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00012-W"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.4"},{"key":"e_1_3_2_1_12_1","first-page":"277","volume-title":"International Conference on Intelligent Information Systems","author":"Kierski P.","year":"2003","unstructured":"P. Kierski , M. Okoniewski , P. Gawrysiak , \"Automatic Classification of Executable Code for Computer Virus Detection\" , International Conference on Intelligent Information Systems , pp. 277 -- 284 , Springer, Poland , 2003 . P. Kierski, M. Okoniewski, P. Gawrysiak, \"Automatic Classification of Executable Code for Computer Virus Detection\", International Conference on Intelligent Information Systems, pp. 277--284, Springer, Poland, 2003."},{"key":"e_1_3_2_1_13_1","first-page":"193","volume-title":"International Conference on Intelligent Information Systems","author":"Abou-Assaleh T.","year":"2003","unstructured":"T. Abou-Assaleh , N. Cercone , V. Keselj , R. Sweidan . \"Detection of New Malicious Code Using N-grams Signatures\" , International Conference on Intelligent Information Systems , pp. 193 -- 196 , Springer, Poland , 2003 . T. Abou-Assaleh, N. Cercone, V. Keselj, R. Sweidan. \"Detection of New Malicious Code Using N-grams Signatures\", International Conference on Intelligent Information Systems, pp. 193--196, Springer, Poland, 2003."},{"key":"e_1_3_2_1_14_1","first-page":"71","volume-title":"IEEE International Carnahan Conference on Security Technology","author":"Wang J. H.","year":"2003","unstructured":"J. H. Wang , P. S. Deng , \"Virus Detection using Data Mining Techniques\" , IEEE International Carnahan Conference on Security Technology , pp. 71 -- 76 , IEEE Press , 2003 . J. H. Wang, P. S. Deng, \"Virus Detection using Data Mining Techniques\", IEEE International Carnahan Conference on Security Technology, pp. 71--76, IEEE Press, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Information Assurance Workshop, USA, IEEE Press","author":"Li W. J.","year":"2005","unstructured":"W. J. Li , K. Wang , S. J. Stolfo , B. Herzog , \"Fileprints : identifying filetypes by n-gram analysis \", IEEE Information Assurance Workshop, USA, IEEE Press , 2005 . W. J. Li, K. Wang, S. J. Stolfo, B. Herzog, \"Fileprints: identifying filetypes by n-gram analysis\", IEEE Information Assurance Workshop, USA, IEEE Press, 2005."},{"key":"e_1_3_2_1_16_1","first-page":"231","volume-title":"Advances in Information Security","author":"Stolfo S. J.","year":"2007","unstructured":"S. J. Stolfo , K. Wang , W. J. Li , \"Towards Stealthy Malware Detection\" , Advances in Information Security , Vol. 27 , pp. 231 -- 249 , Springer , USA , 2007 . S. J. Stolfo, K. Wang, W. J. Li, \"Towards Stealthy Malware Detection\", Advances in Information Security, Vol. 27, pp. 231--249, Springer, USA, 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_14"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"e_1_3_2_1_20_1","first-page":"67","volume-title":"International Virus Bulletin Conference","year":"1993","unstructured":"Frans Veldman, \"Heuristic Anti-Virus Technology\" , International Virus Bulletin Conference , pp. 67 -- 76 , USA, 1993 , available at http:\/\/mirror.sweon.net\/madchat\/vxdevl\/vdat\/epheurs1.htm. Frans Veldman, \"Heuristic Anti-Virus Technology\", International Virus Bulletin Conference, pp. 67--76, USA, 1993, available at http:\/\/mirror.sweon.net\/madchat\/vxdevl\/vdat\/epheurs1.htm."},{"key":"e_1_3_2_1_21_1","volume-title":"ExtremeTech","year":"2002","unstructured":"Jay Munro, \"Antivirus Research and Detection Techniques\" , Antivirus Research and Detection Techniques , ExtremeTech , 2002 , available at http:\/\/www.extremetech.com\/article2\/0,2845, 367051,00.asp. Jay Munro, \"Antivirus Research and Detection Techniques\", Antivirus Research and Detection Techniques, ExtremeTech, 2002, available at http:\/\/www.extremetech.com\/article2\/0,2845, 367051,00.asp."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022689900470"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/321033.321035"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_3_2_1_25_1","volume-title":"USA","author":"Quinlan J. R.","year":"1993","unstructured":"J. R. Quinlan , \"C4.5 : Programs for machine learning\", Morgan Kaufmann , USA , 1993 . J. R. Quinlan, \"C4.5: Programs for machine learning\", Morgan Kaufmann, USA, 1993."},{"key":"e_1_3_2_1_26_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"2005","unstructured":"I. H. Witten , E. Frank , \"Data mining : Practical machine learning tools and techniques \", Morgan Kaufmann , 2 nd edition, USA , 2005 . I. H. Witten, E. Frank, \"Data mining: Practical machine learning tools and techniques\", Morgan Kaufmann, 2nd edition, USA, 2005.","edition":"2"},{"key":"e_1_3_2_1_27_1","unstructured":"VX Heavens Virus Collection VX Heavens website available at http:\/\/vx.netlux.org  VX Heavens Virus Collection VX Heavens website available at http:\/\/vx.netlux.org"},{"key":"e_1_3_2_1_28_1","first-page":"91","volume-title":"USENIX Security Symposium","author":"Oberheide J.","year":"2008","unstructured":"J. Oberheide , E. Cooke , F. Jahanian . \"CloudAV : N-Version Antivirus in the Network Cloud \", USENIX Security Symposium , pp. 91 -- 106 , USA, 2008 . J. Oberheide, E. Cooke, F. Jahanian. \"CloudAV: N-Version Antivirus in the Network Cloud\", USENIX Security Symposium, pp. 91--106, USA, 2008."},{"key":"e_1_3_2_1_29_1","volume-title":"USA","author":"Fawcett T.","year":"2004","unstructured":"T. Fawcett , \" ROC Graphs : Notes and Practical Considerations for Researchers\", TR HPL-2003-4, HP Labs , USA , 2004 . T. Fawcett, \"ROC Graphs: Notes and Practical Considerations for Researchers\", TR HPL-2003-4, HP Labs, USA, 2004."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/sim.2103"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"T. M. Cover J. A. Thomas \"Elements of Information Theory\" Wiley-Interscience 1991.   T. M. Cover J. A. Thomas \"Elements of Information Theory\" Wiley-Interscience 1991.","DOI":"10.1002\/0471200611"}],"event":{"name":"KDD09: The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Paris France","acronym":"KDD09","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1599272.1599278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:09Z","timestamp":1750249089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,28]]},"references-count":31,"alternative-id":["10.1145\/1599272.1599278","10.1145\/1599272"],"URL":"https:\/\/doi.org\/10.1145\/1599272.1599278","relation":{},"subject":[],"published":{"date-parts":[[2009,6,28]]},"assertion":[{"value":"2009-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}