{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:46:08Z","timestamp":1773236768913,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,21]],"date-time":"2010-04-21T00:00:00Z","timestamp":1271808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,21]]},"DOI":"10.1145\/1852666.1852716","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":115,"title":["Fast malware classification by automated behavioral graph matching"],"prefix":"10.1145","author":[{"given":"Younghee","family":"Park","sequence":"first","affiliation":[{"name":"NC State University, Raleigh, NC"}]},{"given":"Douglas","family":"Reeves","sequence":"additional","affiliation":[{"name":"NC State University, Raleigh, NC"}]},{"given":"Vikram","family":"Mulukutla","sequence":"additional","affiliation":[{"name":"NC State University, Raleigh, NC"}]},{"given":"Balaji","family":"Sundaravel","sequence":"additional","affiliation":[{"name":"NC State University, Raleigh, NC"}]}],"member":"320","published-online":{"date-parts":[[2010,4,21]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776449"},{"key":"e_1_3_2_2_2_1","volume-title":"Behavior-Based Malware Clustering. In 16th Symposium on Network and Distributed System Security (NDSS)","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , P. Milani Comparetti , C. Hlauscheck , C. Kruegel , and E. Kirda . Scalable , Behavior-Based Malware Clustering. In 16th Symposium on Network and Distributed System Security (NDSS) , 2009 . U. Bayer, P. Milani Comparetti, C. Hlauscheck, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In 16th Symposium on Network and Distributed System Security (NDSS), 2009."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(97)00179-7"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00139"},{"key":"e_1_3_2_2_6_1","volume-title":"April","author":"S. Corp.","year":"2008","unstructured":"S. Corp. Symantec global internet security threat report , April 2008 . http:\/\/www.symantec.com\/. S. Corp. Symantec global internet security threat report, April 2008. http:\/\/www.symantec.com\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855790"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248646"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11"},{"key":"e_1_3_2_2_12_1","unstructured":"A. T. R. Labs. Graphviz - graph visualization software. http:\/\/graphviz.org\/.  A. T. R. Labs. Graphviz - graph visualization software. http:\/\/graphviz.org\/."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.682179"},{"key":"e_1_3_2_2_14_1","unstructured":"T. M. Project. Windows system call table. http:\/\/www.metasploit.com\/users\/opcode\/syscalls.html.  T. M. Project. Windows system call table. http:\/\/www.metasploit.com\/users\/opcode\/syscalls.html."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_6"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884434"},{"key":"e_1_3_2_2_18_1","volume-title":"23rd Annual Computer Security Applications Conference (ACSAC).","author":"Zhang Q.","unstructured":"Q. Zhang and D. S. Reeves . Metaaware: Identifying metamorphic malware . In 23rd Annual Computer Security Applications Conference (ACSAC). Q. Zhang and D. S. Reeves. Metaaware: Identifying metamorphic malware. In 23rd Annual Computer Security Applications Conference (ACSAC)."}],"event":{"name":"CSIIRW '10: Annual Cyber Security and Information Intelligence Research Workshop","location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '10"},"container-title":["Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1852666.1852716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:41Z","timestamp":1750246781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1852666.1852716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,21]]},"references-count":18,"alternative-id":["10.1145\/1852666.1852716","10.1145\/1852666"],"URL":"https:\/\/doi.org\/10.1145\/1852666.1852716","relation":{},"subject":[],"published":{"date-parts":[[2010,4,21]]},"assertion":[{"value":"2010-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}