{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:17:51Z","timestamp":1773479871515,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T00:00:00Z","timestamp":1523232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,9]]},"DOI":"10.1145\/3206098.3206113","type":"proceedings-article","created":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T12:08:00Z","timestamp":1529669280000},"page":"98-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Machine Learning Approach for Malware Detection Using Random Forest Classifier on Process List Data Structure"],"prefix":"10.1145","author":[{"given":"Santosh","family":"Joshi","sequence":"first","affiliation":[{"name":"Applied Research Center, Florida International University, Miami, FL, United States"}]},{"given":"Himanshu","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"Applied Research Center, Florida International University, Miami, FL, United States"}]},{"given":"Leonel","family":"Lagos","sequence":"additional","affiliation":[{"name":"Applied Research Center, Florida International University, Miami, FL, United States"}]},{"given":"Naga Suryamitra","family":"Akkipeddi","sequence":"additional","affiliation":[{"name":"Applied Research Center, Florida International University, Miami, FL, United States"}]},{"given":"Valerie","family":"Guerra","sequence":"additional","affiliation":[{"name":"Applied Research Center, Florida International University, Miami, FL, United States"}]}],"member":"320","published-online":{"date-parts":[[2018,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"LibVMI library - https:\/\/github.com\/libvmi\/libvmi  LibVMI library - https:\/\/github.com\/libvmi\/libvmi"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_3_1","unstructured":"Breiman L Friedman J Olshen R Stone C: Classification and regression trees New York: Chapman & Hall; 1984.  Breiman L Friedman J Olshen R Stone C: Classification and regression trees New York: Chapman & Hall; 1984."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_3_2_1_5_1","volume-title":"Herrero \u00c1. et al. (eds) International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions. Advances in Intelligent Systems and Computing, vol 189","author":"Sanz B.","year":"2013"},{"key":"e_1_3_2_1_6_1","unstructured":"Zarni Aung Win Zaw (MARCH 2013) 'Permission-Based Android Malware Detection' INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 2(3).  Zarni Aung Win Zaw (MARCH 2013) 'Permission-Based Android Malware Detection' INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 2(3)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"e_1_3_2_1_8_1","unstructured":"Himanshu Upadhyay Hardik Gohel Alexander Pons Leo Lagos (2017) 'Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment' https:\/\/astesj.com\/v03\/i01\/p04\/.  Himanshu Upadhyay Hardik Gohel Alexander Pons Leo Lagos (2017) 'Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment' https:\/\/astesj.com\/v03\/i01\/p04\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.09.016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Ram\u00f3n D\u00edaz-Uriarte Sara Alvarez de Andr\u00e9s (06 January 2006) 'Gene selection and classification of microarray data using random forest' BMC Bioinformatics  Ram\u00f3n D\u00edaz-Uriarte Sara Alvarez de Andr\u00e9s (06 January 2006) 'Gene selection and classification of microarray data using random forest' BMC Bioinformatics","DOI":"10.1186\/1471-2105-7-3"},{"key":"e_1_3_2_1_11_1","unstructured":"Fortran original by Leo Breiman and Adele Cutler R port by Andy Liaw and Matthew Wiener (2015-10-07 08: 38:34) Classification and regression based on a forest of trees using random inputs{Online}. Available at: https:\/\/www.stat.berkeley.edu\/~breiman\/RandomForests\/  Fortran original by Leo Breiman and Adele Cutler R port by Andy Liaw and Matthew Wiener (2015-10-07 08:38:34) Classification and regression based on a forest of trees using random inputs{Online}. Available at: https:\/\/www.stat.berkeley.edu\/~breiman\/RandomForests\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Zarni Aung Win Zaw (MARCH 2013) 'Permission-Based Android Malware Detection' INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 2(3).  Zarni Aung Win Zaw (MARCH 2013) 'Permission-Based Android Malware Detection' INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 2(3)."},{"key":"e_1_3_2_1_13_1","unstructured":"Ajit Kumar K.S. Kuppusamy G. Aghila (6 January 2017) 'A learning model to detect maliciousness of portable executable using integrated feature.  Ajit Kumar K.S. Kuppusamy G. Aghila (6 January 2017) 'A learning model to detect maliciousness of portable executable using integrated feature."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Hastie T Tibshirani R Friedman J: The elements of statistical learning New York: Springer; 2001.  Hastie T Tibshirani R Friedman J: The elements of statistical learning New York: Springer; 2001.","DOI":"10.1007\/978-0-387-21606-5"}],"event":{"name":"ICISDM '18: 2018 2nd International Conference on Information System and Data Mining ICISDM '18","location":"Lakeland FL USA","acronym":"ICISDM '18"},"container-title":["Proceedings of the 2nd International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206098.3206113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3206098.3206113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:34Z","timestamp":1750212694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206098.3206113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,9]]},"references-count":14,"alternative-id":["10.1145\/3206098.3206113","10.1145\/3206098"],"URL":"https:\/\/doi.org\/10.1145\/3206098.3206113","relation":{},"subject":[],"published":{"date-parts":[[2018,4,9]]},"assertion":[{"value":"2018-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}