{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:22Z","timestamp":1750306402147,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1145\/2801948.2802017","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T12:31:10Z","timestamp":1442925070000},"page":"59-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Malicious software classification based on relations of system-call groups"],"prefix":"10.1145","author":[{"given":"Stavros D.","family":"Nikolopoulos","sequence":"first","affiliation":[{"name":"University of Ioannina, Ioannina, Greece"}]},{"given":"Iosif","family":"Polenakis","sequence":"additional","affiliation":[{"name":"University of Ioannina, Ioannina, Greece"}]}],"member":"320","published-online":{"date-parts":[[2015,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-3-642-22110-1_10","volume-title":"Computer Aided Verification (CAV'11)","author":"Babic D.","year":"2011","unstructured":"D. Babic , D. Reynaud , and D. Song . Malware analysis with tree automata inference . In Computer Aided Verification (CAV'11) , pages 116 -- 131 , 2011 . D. Babic, D. Reynaud, and D. Song. Malware analysis with tree automata inference. In Computer Aided Verification (CAV'11), pages 116--131, 2011."},{"key":"e_1_3_2_1_2_1","first-page":"8","volume-title":"Network and Distributed System Security Symposium (NDSS'09)","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , P. Comparetti , C. Hlauschek , C. Kruegel , and E. Kirda . Scalable behavior-based malware clustering . In Network and Distributed System Security Symposium (NDSS'09) , pages 8 -- 11 , 2009 . U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable behavior-based malware clustering. In Network and Distributed System Security Symposium (NDSS'09), pages 8--11, 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.11"},{"key":"e_1_3_2_1_5_1","volume-title":"Detecting malicious code by exploiting dependencies of system-call groups","author":"Nikolopoulos S. D.","year":"2014","unstructured":"S. D. Nikolopoulos and I. Polenakis . Detecting malicious code by exploiting dependencies of system-call groups . Cornell University Library , arXiv:1412.8712v1, 2014 . S. D. Nikolopoulos and I. Polenakis. Detecting malicious code by exploiting dependencies of system-call groups. Cornell University Library, arXiv:1412.8712v1, 2014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2812428.2812432"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"e_1_3_2_1_8_1","first-page":"69","volume-title":"3rd Int'l Conference on Malicious and Unwanted Software (MALWARE'08)","author":"Tian R.","year":"2008","unstructured":"R. Tian , L. M. Batten , and S. C. Versteeg . Function length as a tool for malware classification . In 3rd Int'l Conference on Malicious and Unwanted Software (MALWARE'08) , pages 69 -- 76 , 2008 . R. Tian, L. M. Batten, and S. C. Versteeg. Function length as a tool for malware classification. In 3rd Int'l Conference on Malicious and Unwanted Software (MALWARE'08), pages 69--76, 2008."}],"event":{"name":"PCI '15: 19th Panhellenic Conference on Informatics","acronym":"PCI '15","location":"Athens Greece"},"container-title":["Proceedings of the 19th Panhellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2802017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2801948.2802017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:29Z","timestamp":1750223249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2802017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":8,"alternative-id":["10.1145\/2801948.2802017","10.1145\/2801948"],"URL":"https:\/\/doi.org\/10.1145\/2801948.2802017","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"2015-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}