{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:31Z","timestamp":1750306771283,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,4]],"date-time":"2013-04-04T00:00:00Z","timestamp":1365033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA9550-10-1-0289"],"award-info":[{"award-number":["FA9550-10-1-0289"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,4]]},"DOI":"10.1145\/2498328.2500079","type":"proceedings-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T14:33:48Z","timestamp":1372775628000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Applying static analysis to high-dimensional malicious application detection"],"prefix":"10.1145","author":[{"given":"Sean","family":"Semple","sequence":"first","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]},{"given":"Stanislav","family":"Ponomarev","sequence":"additional","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]},{"given":"Jan","family":"Durand","sequence":"additional","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]},{"given":"Travis","family":"Atkison","sequence":"additional","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]}],"member":"320","published-online":{"date-parts":[[2013,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"key":"e_1_3_2_1_2_1","first-page":"12","volume-title":"USA","author":"Christodorescu M.","year":"2003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190270"},{"key":"e_1_3_2_1_5_1","first-page":"193","article-title":"Detection of New Malicious Code Using N-grams Signatures","author":"Abou-Assaleh T.","year":"2004","journal-title":"Proceedings of the 2nd Annual Conference on Privacy, Security and Trust, New Brunswick, Canada"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"T. Abou-Assaleh N. Cercone V. Keselj and R. Sweidan \"N-gram-based Detection of New Malicious Code \" Proceedings of the 28th Annual International Computer Software and Applications Conference COMPSAC. vol. 2 2004.   T. Abou-Assaleh N. Cercone V. Keselj and R. Sweidan \" N -gram-based Detection of New Malicious Code \" Proceedings of the 28th Annual International Computer Software and Applications Conference COMPSAC. vol. 2 2004.","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366197"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0027-8"},{"volume-title":"England","year":"1999","author":"Baeza-Yates R.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"H. Mannila and J. K. Sepp\u00e4nen \"Finding similar situations in sequences of events \" 1st SIAM International Conference on Data Mining 2001 H. Mannila and J. K. Sepp\u00e4nen \"Finding similar situations in sequences of events \" 1st SIAM International Conference on Data Mining 2001","DOI":"10.1137\/1.9781611972719.3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502546"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.77"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028664.1028717"},{"key":"e_1_3_2_1_15_1","unstructured":"D. Wagner and R. Dean \"Intrusion detection via static analysis \" 2001 pp. 156--168.   D. Wagner and R. Dean \"Intrusion detection via static analysis \" 2001 pp. 156--168."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Y. Zhang J. Rilling and V. Haarslev \"An Ontology-based Approach to Software Comprehension-Reasoning about Security Concerns \" 2006.  Y. Zhang J. Rilling and V. Haarslev \"An Ontology-based Approach to Software Comprehension-Reasoning about Security Concerns \" 2006.","DOI":"10.1109\/COMPSAC.2006.27"},{"key":"e_1_3_2_1_17_1","unstructured":"J. Bergeron M. Debbabi M. M. Erhioui and B. Ktari \"Static analysis of binary code to isolate malicious behaviors \" IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises 1999.(WET ICE'99) Proceedings 1999 pp. 184--189.   J. Bergeron M. Debbabi M. M. Erhioui and B. Ktari \"Static analysis of binary code to isolate malicious behaviors \" IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises 1999.(WET ICE'99) Proceedings 1999 pp. 184--189."},{"key":"e_1_3_2_1_18_1","unstructured":"J. Lin and D. Gunopulos \"Dimensionality reduction by random projection and latent semantic indexing \" Proceedings of the Text Mining Workshop at the 3rd SIAM International Conference on Data Mining 2003.  J. Lin and D. Gunopulos \"Dimensionality reduction by random projection and latent semantic indexing \" Proceedings of the Text Mining Workshop at the 3rd SIAM International Conference on Data Mining 2003."},{"key":"e_1_3_2_1_19_1","unstructured":"C. Kruegel E. Kirda D. Mutz W. Robertson and G. Vigna \"Automating mimicry attacks using static binary analysis \"  C. Kruegel E. Kirda D. Mutz W. Robertson and G. Vigna \"Automating mimicry attacks using static binary analysis \""},{"key":"e_1_3_2_1_20_1","unstructured":"J. Bergeron M. Debbabi J. Desharnais M. M. Erhioui Y. Lavoie N. Tawbi and M. Erhioui \"Static Detection of Malicious Code in Executable Programs \" Symposium on Requirements Engineering for Information Security Indianapolis IN 2001.  J. Bergeron M. Debbabi J. Desharnais M. M. Erhioui Y. Lavoie N. Tawbi and M. Erhioui \"Static Detection of Malicious Code in Executable Programs \" Symposium on Requirements Engineering for Information Security Indianapolis IN 2001."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"J. Hegedus Y. Miche A. Ilin and A. Lendasse 2011 \"Methodology for Behavioral-based Malware Analysis and Detection using Random Projections and K-Nearest Neighbors Classifiers \" Hainan 2011.  J. Hegedus Y. Miche A. Ilin and A. Lendasse 2011 \"Methodology for Behavioral-based Malware Analysis and Detection using Random Projections and K-Nearest Neighbors Classifiers \" Hainan 2011.","DOI":"10.1109\/CIS.2011.227"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2000.1711"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"journal-title":"The Journal of Machine Learning Research","article-title":"Learning to Detect and Classify Malicious Executables in the Wild","author":"Kolter J. Z.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"R. W. Lo K. N. Levit and R. A. Olsson \"MCF: A Malicious Code Filter \" Computers & Security vol. 14 1995.  R. W. Lo K. N. Levit and R. A. Olsson \"MCF: A Malicious Code Filter \" Computers & Security vol. 14 1995.","DOI":"10.1016\/0167-4048(95)00012-W"},{"volume-title":"USA: Morgan Kaufmann","year":"2005","author":"Witten I. H.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"R. Bellman Adaptive Control Processes: A Guided Tour.: Princeton University Press 1961.  R. Bellman Adaptive Control Processes: A Guided Tour.: Princeton University Press 1961.","DOI":"10.1515\/9781400874668"}],"event":{"name":"ACM SE'13: ACM Southeast Regional 2013","sponsor":["ACM Association for Computing Machinery"],"location":"Savannah Georgia","acronym":"ACM SE'13"},"container-title":["Proceedings of the 51st ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2498328.2500079","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2498328.2500079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:56Z","timestamp":1750231736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2498328.2500079"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,4]]},"references-count":27,"alternative-id":["10.1145\/2498328.2500079","10.1145\/2498328"],"URL":"https:\/\/doi.org\/10.1145\/2498328.2500079","relation":{},"subject":[],"published":{"date-parts":[[2013,4,4]]},"assertion":[{"value":"2013-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}