{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:00Z","timestamp":1750306500801,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T00:00:00Z","timestamp":1444348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,9]]},"DOI":"10.1145\/2811411.2811514","type":"proceedings-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T04:22:54Z","timestamp":1446006174000},"page":"291-295","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["PageRank in malware categorization"],"prefix":"10.1145","author":[{"given":"BooJoong","family":"Kang","sequence":"first","affiliation":[{"name":"Queen's University Belfast, Belfast, Northern Ireland, United Kindom"}]},{"given":"Suleiman","family":"Yerima","sequence":"additional","affiliation":[{"name":"Queen's University Belfast, Belfast, Northern Ireland, United Kindom"}]},{"given":"Kieran","family":"McLaughlin","sequence":"additional","affiliation":[{"name":"Queen's University Belfast, Belfast, Northern Ireland, United Kindom"}]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[{"name":"Queen's University Belfast, Belfast, Northern Ireland, United Kindom"}]}],"member":"320","published-online":{"date-parts":[[2015,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"},{"key":"e_1_3_2_1_2_1","unstructured":"Page L. Brin S. Motwani R. and Winograd T. 1998. The PageRank citation ranking: bringing order to the web. Technical Report Stanford InfoLab.  Page L. Brin S. Motwani R. and Winograd T. 1998. The PageRank citation ranking: bringing order to the web. Technical Report Stanford InfoLab."},{"volume-title":"Proceedings of the 2nd International Conference on Computer and Communication Technology","author":"Kumar G.","key":"e_1_3_2_1_3_1","unstructured":"Kumar , G. , Duhan , N. , and Sharma , A. K . 2011. Page ranking based on number of visits of links of web page . In Proceedings of the 2nd International Conference on Computer and Communication Technology , Allahabad, India, 11--14. Kumar, G., Duhan, N., and Sharma, A. K. 2011. Page ranking based on number of visits of links of web page. In Proceedings of the 2nd International Conference on Computer and Communication Technology, Allahabad, India, 11--14."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"volume-title":"Proceedings of the 14th WSEAS International Conference on COMPUTERS, Greece, 147--155","author":"Rad B. B.","key":"e_1_3_2_1_5_1","unstructured":"Rad , B. B. , and Masrom , M . 2010. Metamorphic virus variants classification using opcode frequency histogram . In Proceedings of the 14th WSEAS International Conference on COMPUTERS, Greece, 147--155 . Rad, B. B., and Masrom, M. 2010. Metamorphic virus variants classification using opcode frequency histogram. In Proceedings of the 14th WSEAS International Conference on COMPUTERS, Greece, 147--155."},{"key":"e_1_3_2_1_6_1","unstructured":"Santamarta R. 2006. Generic detection and classification of polymorphic malware using neural pattern recognition. http:\/\/www.reversemode.com.  Santamarta R. 2006. Generic detection and classification of polymorphic malware using neural pattern recognition. http:\/\/www.reversemode.com."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.06.003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Abou-Assaleh T. Cercone N. Keselj V. and Sweidan R. 2004. Detection of new malicious code using n-grams signatures. PST 193--196.  Abou-Assaleh T. Cercone N. Keselj V. and Sweidan R. 2004. Detection of new malicious code using n-grams signatures. PST 193--196.","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0027-8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"volume-title":"Proceedings of the 8th Australasian Symposium on Parallel and Distributed Computing, 108","author":"Cesare S.","key":"e_1_3_2_1_13_1","unstructured":"Cesare , S. and Xiang , Y . 2010. Classification of malware using structured control flow . In Proceedings of the 8th Australasian Symposium on Parallel and Distributed Computing, 108 , 61--70. Cesare, S. and Xiang, Y. 2010. Classification of malware using structured control flow. In Proceedings of the 8th Australasian Symposium on Parallel and Distributed Computing, 108, 61--70."},{"volume-title":"Proceedings of the 2008 Virus Bulletin Conference, 1--12","author":"Briones I.","key":"e_1_3_2_1_14_1","unstructured":"Briones , I. and Gomez , A . 2008. Graphs, entropy and grid computing: automatic comparison of malware . In Proceedings of the 2008 Virus Bulletin Conference, 1--12 . Briones, I. and Gomez, A. 2008. Graphs, entropy and grid computing: automatic comparison of malware. In Proceedings of the 2008 Virus Bulletin Conference, 1--12."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507848"},{"key":"e_1_3_2_1_16_1","unstructured":"VxHeaven http:\/\/vxheaven.org  VxHeaven http:\/\/vxheaven.org"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"volume-title":"Proceedings of the 13th International Conference on Machine Learning","author":"Freund Y.","key":"e_1_3_2_1_20_1","unstructured":"Freund , Y. and Schapire , R. E . 1996. Experiments with a new boosting algorithm . In Proceedings of the 13th International Conference on Machine Learning , San Francisco, USA, 148--156. Freund, Y. and Schapire, R. E. 1996. Experiments with a new boosting algorithm. In Proceedings of the 13th International Conference on Machine Learning, San Francisco, USA, 148--156."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007659514849"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_23_1","unstructured":"Han J. and Kamber M. 2006. Data mining: concepts and techniques (2nd edition). Morgan Kaufmann Publishers.   Han J. and Kamber M. 2006. Data mining: concepts and techniques (2nd edition). Morgan Kaufmann Publishers."}],"event":{"name":"RACS '15: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Prague Czech Republic","acronym":"RACS '15"},"container-title":["Proceedings of the 2015 Conference on research in adaptive and convergent systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2811411.2811514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:50Z","timestamp":1750225730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811514"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,9]]},"references-count":23,"alternative-id":["10.1145\/2811411.2811514","10.1145\/2811411"],"URL":"https:\/\/doi.org\/10.1145\/2811411.2811514","relation":{},"subject":[],"published":{"date-parts":[[2015,10,9]]},"assertion":[{"value":"2015-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}