{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:29Z","timestamp":1750220729037,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T00:00:00Z","timestamp":1585612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,31]]},"DOI":"10.1145\/3386723.3387839","type":"proceedings-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T18:06:11Z","timestamp":1590429971000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide"],"prefix":"10.1145","author":[{"given":"Ben Abdel Ouahab","family":"Ikram","sequence":"first","affiliation":[{"name":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"}]},{"given":"El Aachak","family":"Lotfi","sequence":"additional","affiliation":[{"name":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"}]},{"given":"Boudhir Anouar","family":"Abdelhakim","sequence":"additional","affiliation":[{"name":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"}]},{"given":"Bouhorma","family":"Mohammed","sequence":"additional","affiliation":[{"name":"Computer science, systems and telecommunication Laboratory (LIST), University Abdelmalek Essaadi, Tangier, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0244-0"},{"key":"#cr-split#-e_1_3_2_1_2_1.1","doi-asserted-by":"crossref","unstructured":"Goshtasby A.A. 2012. Image Descriptors. Image Registration. (2012) 219--246. DOI:https:\/\/doi.org\/10.1007\/978-1-4471-2458-0_5. 10.1007\/978-1-4471-2458-0_5","DOI":"10.1007\/978-1-4471-2458-0_5"},{"key":"#cr-split#-e_1_3_2_1_2_1.2","doi-asserted-by":"crossref","unstructured":"Goshtasby A.A. 2012. Image Descriptors. Image Registration. (2012) 219--246. DOI:https:\/\/doi.org\/10.1007\/978-1-4471-2458-0_5.","DOI":"10.1007\/978-1-4471-2458-0_5"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 4th International Conference on Smart City Applications (Casablanca MA","author":"Ikram B.A.O.","year":"2019","unstructured":"Ikram , B.A.O. , Mohammed , B. , Abdelhakim , B.A. , Lotfi , E.A. and Zafar , B . 2019 . Machine Learning Application for Malwares Classification Using Visualization Technique. Proceedings of the 4th International Conference on Smart City Applications (Casablanca MA , 2019 ), 110:1-110:6. Ikram, B.A.O., Mohammed, B., Abdelhakim, B.A., Lotfi, E.A. and Zafar, B. 2019. Machine Learning Application for Malwares Classification Using Visualization Technique. Proceedings of the 4th International Conference on Smart City Applications (Casablanca MA, 2019), 110:1-110:6."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258512"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITACT.2015.7492653"},{"key":"#cr-split#-e_1_3_2_1_6_1.1","doi-asserted-by":"crossref","unstructured":"Makandar A. and Patrot A. 2017. Wavelet Statistical Feature based Malware Class Recognition and Classification using Supervised Learning Classifier. Oriental journal of computer science and technology. 10 2 (Jun. 2017) 400--406. DOI:https:\/\/doi.org\/10.13005\/ojcst\/10.02.20. 10.13005\/ojcst","DOI":"10.13005\/ojcst\/10.02.20"},{"key":"#cr-split#-e_1_3_2_1_6_1.2","doi-asserted-by":"crossref","unstructured":"Makandar A. and Patrot A. 2017. Wavelet Statistical Feature based Malware Class Recognition and Classification using Supervised Learning Classifier. Oriental journal of computer science and technology. 10 2 (Jun. 2017) 400--406. DOI:https:\/\/doi.org\/10.13005\/ojcst\/10.02.20.","DOI":"10.13005\/ojcst\/10.02.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0248-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"e_1_3_2_1_9_1","unstructured":"Oliva A. and Torralba A. Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope. 31.  Oliva A. and Torralba A. Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope. 31."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Rieck K. Holz T. Willems C. D\u00fcssel P. and Laskov P. 2008. Learning and Classification of Malware Behavior. Detection of Intrusions and Malware and Vulnerability Assessment. D. Zamboni ed. Springer Berlin Heidelberg. 108--125.  Rieck K. Holz T. Willems C. D\u00fcssel P. and Laskov P. 2008. Learning and Classification of Malware Behavior. Detection of Intrusions and Malware and Vulnerability Assessment. D. Zamboni ed. Springer Berlin Heidelberg. 108--125.","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"e_1_3_2_1_11_1","volume-title":"Madeira","author":"Yajamanam S.","year":"2018","unstructured":"Yajamanam , S. , Selvin , V.R.S. , Di Troia , F. and Stamp , M . 2018. Deep Learning versus Gist Descriptors for Image-based Malware Classification: Proceedings of the 4th International Conference on Information Systems Security and Privacy (Funchal , Madeira , Portugal , 2018 ), 553--561. Yajamanam, S., Selvin, V.R.S., Di Troia, F. and Stamp, M. 2018. Deep Learning versus Gist Descriptors for Image-based Malware Classification: Proceedings of the 4th International Conference on Information Systems Security and Privacy (Funchal, Madeira, Portugal, 2018), 553--561."}],"event":{"name":"NISS2020: The 3rd International Conference on Networking, Information Systems & Security","acronym":"NISS2020","location":"Marrakech Morocco"},"container-title":["Proceedings of the 3rd International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386723.3387839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386723.3387839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:19Z","timestamp":1750199899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386723.3387839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,31]]},"references-count":13,"alternative-id":["10.1145\/3386723.3387839","10.1145\/3386723"],"URL":"https:\/\/doi.org\/10.1145\/3386723.3387839","relation":{},"subject":[],"published":{"date-parts":[[2020,3,31]]},"assertion":[{"value":"2020-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}