{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:21:32Z","timestamp":1752229292456,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:00:00Z","timestamp":1489708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,17]]},"DOI":"10.1145\/3058060.3058065","type":"proceedings-article","created":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T12:33:27Z","timestamp":1492691607000},"page":"96-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["MGeT"],"prefix":"10.1145","author":[{"given":"Jianwei","family":"Ding","sequence":"first","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"}]},{"given":"Zhouguo","family":"Chen","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"}]},{"given":"Yue","family":"Zhao","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"}]},{"given":"Hong","family":"Su","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"}]},{"given":"Yubin","family":"Guo","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"}]},{"given":"Enbo","family":"Sun","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, High-tech Zone, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"volume-title":"Pearson Education","year":"2005","author":"Szor P.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Company S. Internet security report of china in the year 2015. http:\/\/www.360doc.com\/content 2015.  Company S. Internet security report of china in the year 2015. http:\/\/www.360doc.com\/content 2015."},{"key":"e_1_3_2_1_4_1","unstructured":"McAfee N. L. Estimating the global cost of cybercrime. economic impact of cybercrime ii mcafee junio de 2014.  McAfee N. L. Estimating the global cost of cybercrime. economic impact of cybercrime ii mcafee junio de 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0082-4"},{"issue":"22","key":"e_1_3_2_1_7_1","first-page":"2031","article-title":"Malware detection based on evolving clustering method for classification","volume":"7","author":"Ramadass S","year":"2012","journal-title":"Scientific Research and Essays"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0215-x"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488219"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504162"},{"key":"e_1_3_2_1_13_1","unstructured":"Sandbox N. Norman sandbox whitepaper 2010.  Sandbox N. Norman sandbox whitepaper 2010."},{"key":"e_1_3_2_1_14_1","unstructured":"Bayer U. Kruegel C. and Kirda E. Anubis: Analyzing unknown binaries 2009.  Bayer U. Kruegel C. and Kirda E. Anubis: Analyzing unknown binaries 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2012.283.288"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557122"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3015812.3015991"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2015.7382048"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"}],"event":{"name":"ICCSP '17: 2017 International Conference on Cryptography, Security and Privacy","sponsor":["Wuhan Univ. Wuhan University, China"],"location":"Wuhan China","acronym":"ICCSP '17"},"container-title":["Proceedings of the 2017 International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3058060.3058065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3058060.3058065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:03Z","timestamp":1750220643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3058060.3058065"}},"subtitle":["Malware Gene-Based Malware Dynamic Analyses"],"short-title":[],"issued":{"date-parts":[[2017,3,17]]},"references-count":20,"alternative-id":["10.1145\/3058060.3058065","10.1145\/3058060"],"URL":"https:\/\/doi.org\/10.1145\/3058060.3058065","relation":{},"subject":[],"published":{"date-parts":[[2017,3,17]]},"assertion":[{"value":"2017-03-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}