{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:13:59Z","timestamp":1769922839058,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1774088.1774303","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"1020-1025","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":123,"title":["Malware detection based on mining API calls"],"prefix":"10.1145","author":[{"given":"Ashkan","family":"Sami","sequence":"first","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Babak","family":"Yadegari","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Hossein","family":"Rahimi","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Naser","family":"Peiravian","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Sattar","family":"Hashemi","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Ali","family":"Hamze","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Organization For Economic Co-operation And Development","year":"2007"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 12th USENIX Security Symposium","author":"Christodorescu M.","year":"2003"},{"key":"e_1_3_2_1_5_1","unstructured":"R. Duda P. Hart and D. Stork. Pattern Classification. Wiley Interscience 2nd edition 2000. R. Duda P. Hart and D. Stork. Pattern Classification . Wiley Interscience 2nd edition 2000."},{"key":"e_1_3_2_1_6_1","unstructured":"J. Han. Illimine project. University of Illinois at Urbana-Champaign Database and Information Systems Laboratory 2005. J. Han. Illimine project. University of Illinois at Urbana-Champaign Database and Information Systems Laboratory 2005."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Han and M. Kamber. Data Mining: Concepts and Techniques. DataManagement Systems. Morgan Kaufmann 2nd edition 2006. J. Han and M. Kamber. Data Mining: Concepts and Techniques . DataManagement Systems. Morgan Kaufmann 2nd edition 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"Springer","author":"Han J.","year":"2004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Hashemi Y. Yang D. Zabihzadeh and M. Kangavari. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Systems 25(5) November 2008. S. Hashemi Y. Yang D. Zabihzadeh and M. Kangavari. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Systems 25(5) November 2008.","DOI":"10.1111\/j.1468-0394.2008.00467.x"},{"key":"e_1_3_2_1_10_1","unstructured":"V. Heavens http:\/\/vx.netlux.org. V. Heavens http:\/\/vx.netlux.org."},{"key":"e_1_3_2_1_11_1","first-page":"178","volume-title":"Proceedings of 4th Virus Bulletin International Conference","author":"Kephart J.","year":"1994"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of 2006 EICAR Conference","author":"Lee T.","year":"2006"},{"key":"e_1_3_2_1_14_1","unstructured":"M. D. Library. Functions by category (windows). http:\/\/msdn.microsoft.com\/en-us\/library\/aa383686(VS.85).aspx. M. D. Library. Functions by category (windows). http:\/\/msdn.microsoft.com\/en-us\/library\/aa383686(VS.85).aspx."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557083"},{"key":"e_1_3_2_1_16_1","first-page":"541","volume-title":"Comput. Secur.","author":"Loand R.","year":"1995"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"e_1_3_2_1_18_1","unstructured":"M. Pietrek. Peering Inside the PE: A Tour of the Win32 Portable Executable File Format. Microsoft http:\/\/msdn.microsoft.com\/en-us\/magazine\/ms809762.aspx February 1994. M. Pietrek. Peering Inside the PE: A Tour of the Win32 Portable Executable File Format . Microsoft http:\/\/msdn.microsoft.com\/en-us\/magazine\/ms809762.aspx February 1994."},{"key":"e_1_3_2_1_19_1","unstructured":"M. Pietrek. An In-Depth Look into the Win32 Portable Executable File Format. Microsoft http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc301805.aspx February 2002. M. Pietrek. An In-Depth Look into the Win32 Portable Executable File Format . Microsoft http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc301805.aspx February 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948201"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"e_1_3_2_1_23_1","volume-title":"Symantec Corp","year":"2008"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-051-6","volume-title":"Proceedings of IEEE International Conference on Data Mining","author":"Wang J.","year":"2003"},{"key":"e_1_3_2_1_25_1","unstructured":"H. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann 2nd edition 2005. H. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques . Morgan Kaufmann 2nd edition 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.15"},{"key":"e_1_3_2_1_27_1","author":"Ye Y.","year":"2008","journal-title":"In Journal in Computer Virology"}],"event":{"name":"SAC'10: The 2010 ACM Symposium on Applied Computing","location":"Sierre Switzerland","acronym":"SAC'10","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 2010 ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774303","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1774088.1774303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:36Z","timestamp":1750249416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774303"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":27,"alternative-id":["10.1145\/1774088.1774303","10.1145\/1774088"],"URL":"https:\/\/doi.org\/10.1145\/1774088.1774303","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}