{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:10Z","timestamp":1750220590200,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3429789.3429819","type":"proceedings-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:52:56Z","timestamp":1606423976000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Mal-TScore"],"prefix":"10.1145","author":[{"given":"Ali","family":"Suwanda","sequence":"first","affiliation":[{"name":"Swiss German University, Tangerang, Banten, Indonesia"}]},{"given":"Charles","family":"Lim","sequence":"additional","affiliation":[{"name":"Swiss German University, Tangerang, Banten, Indonesia"}]},{"family":"Lukas","sequence":"additional","affiliation":[{"name":"Cognitive Engineering Research Group (CERG) Universitas Katolik Atma Jaya Jakarta, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Cuckoo's, Malware Threat Scoring and Classification: Friend or Foe","author":"Amjad Aaron Walker Muhammad Faisal","year":"2019","unstructured":"Muhammad Faisal Amjad Aaron Walker and Shamik Sengupta . 2019. Cuckoo's , Malware Threat Scoring and Classification: Friend or Foe . In Cuckoo's, Malware Threat Scoring and Classification: Friend or Foe , 2019 . IEEE. https:\/\/doi.org\/10.1109\/CCWC.2019.8666454 Muhammad Faisal Amjad Aaron Walker and Shamik Sengupta. 2019. Cuckoo's, Malware Threat Scoring and Classification: Friend or Foe. In Cuckoo's, Malware Threat Scoring and Classification: Friend or Foe, 2019. IEEE. https:\/\/doi.org\/10.1109\/CCWC.2019.8666454"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_22"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"CIS.","year":"2018","unstructured":"CIS. 2018 . Top 10 Malware January 2018. (2018) . Retrieved January 11, 2020 from https:\/\/www.cisecurity.org\/blog\/top-10-malware-january-2018\/ CIS. 2018. Top 10 Malware January 2018. (2018). Retrieved January 11, 2020 from https:\/\/www.cisecurity.org\/blog\/top-10-malware-january-2018\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","author":"CIS.","year":"2019","unstructured":"CIS. 2019 . Top 10 Malware January 2019. (2019) . Retrieved Feb 01, 2020 from https:\/\/www.cisecurity.org\/blog\/top-10-malware-january-2019\/ CIS. 2019. Top 10 Malware January 2019. (2019). Retrieved Feb 01, 2020 from https:\/\/www.cisecurity.org\/blog\/top-10-malware-january-2019\/"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"CIS.","year":"2020","unstructured":"CIS. 2020 . Top 10 Malware January 2019. (2020) . Retrieved Feb 10, 2020 from https:\/\/www.cisecurity.org\/blog\/top-10-malware-january-2020\/ CIS. 2020. Top 10 Malware January 2019. (2020). Retrieved Feb 10, 2020 from https:\/\/www.cisecurity.org\/blog\/top-10-malware-january-2020\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0274-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2012.V4.512"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"e_1_3_2_1_11_1","unstructured":"Guojun Gan Chaoqun Ma and Jianhong Wu. 2007. Data clustering: theory algorithms and applications. SIAM.  Guojun Gan Chaoqun Ma and Jianhong Wu. 2007. Data clustering: theory algorithms and applications. SIAM."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2016.1262704"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2010.03.018"},{"volume-title":"Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware","author":"Monnappa K.A.","key":"e_1_3_2_1_14_1","unstructured":"Monnappa K.A. 2018. Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware . Packt Publishing Ltd . Monnappa K.A. 2018. Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware. Packt Publishing Ltd."},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Lee Wenke","year":"2019","unstructured":"Wenke Lee . 2019 . Malware and Attack Technologies Knowledge Area Issue . Retrieved March 20, 2020 from https:\/\/www.cybok.org\/media\/downloads\/Malware__Attack_Technology_issue_1.0.pdf Wenke Lee. 2019. Malware and Attack Technologies Knowledge Area Issue. Retrieved March 20, 2020 from https:\/\/www.cybok.org\/media\/downloads\/Malware__Attack_Technology_issue_1.0.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.682"},{"key":"e_1_3_2_1_17_1","unstructured":"Markus Mack. 2018. Cyber Security. ED-TECH PRESS.  Markus Mack. 2018. Cyber Security. ED-TECH PRESS."},{"key":"e_1_3_2_1_18_1","unstructured":"Cameron H Malin Eoghan Casey and James M Aquilina. 2008. Malware forensics: investigating and analyzing malicious code. Syngress.  Cameron H Malin Eoghan Casey and James M Aquilina. 2008. Malware forensics: investigating and analyzing malicious code. Syngress."},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_19_1","unstructured":"MalwareBytes. 2019 . 2019 State of Malware Report . Retrieved February 20, 2020 from https:\/\/resources.malwarebytes.com\/files\/2019\/01\/Malwarebytes-Labs-2019-State-of-Malware-Report-2.pdf MalwareBytes. 2019. 2019 State of Malware Report. Retrieved February 20, 2020 from https:\/\/resources.malwarebytes.com\/files\/2019\/01\/Malwarebytes-Labs-2019-State-of-Malware-Report-2.pdf"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"Mandiant FireEye","year":"2020","unstructured":"FireEye Mandiant . 2020 . M-Trends 2020 . Retrieved February 27, 2020 from https:\/\/content.fireeye.com\/m-trends\/rpt-m-trends-2020 FireEye Mandiant. 2020. M-Trends 2020. Retrieved February 27, 2020 from https:\/\/content.fireeye.com\/m-trends\/rpt-m-trends-2020"},{"key":"e_1_3_2_1_21_1","unstructured":"Reischaga Mohajit Chales Lim and Yohanes Syailendra. 2020. A Static and Dynamic Heuristic Analysis to Calculate Malware Threat Score.  Reischaga Mohajit Chales Lim and Yohanes Syailendra. 2020. A Static and Dynamic Heuristic Analysis to Calculate Malware Threat Score."},{"key":"e_1_3_2_1_22_1","volume-title":"SoK: ATT&CK Techniques and Trends in Windows Malware. In International Conference on Security and Privacy in Communication Systems. Springer, 406--425","author":"Oosthoek Kris","year":"2019","unstructured":"Kris Oosthoek and Christian Doerr . 2019 . SoK: ATT&CK Techniques and Trends in Windows Malware. In International Conference on Security and Privacy in Communication Systems. Springer, 406--425 . https:\/\/doi.org\/10.1007\/978-3-030-37228-6_20 Kris Oosthoek and Christian Doerr. 2019. SoK: ATT&CK Techniques and Trends in Windows Malware. In International Conference on Security and Privacy in Communication Systems. Springer, 406--425. https:\/\/doi.org\/10.1007\/978-3-030-37228-6_20"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3329786"},{"key":"e_1_3_2_1_24_1","unstructured":"Michael Sikorski and Andrew Honig. 2012. Practical malware analysis: the hands on guide to dissecting malicious software. no starch press.  Michael Sikorski and Andrew Honig. 2012. Practical malware analysis: the hands on guide to dissecting malicious software. no starch press."},{"volume-title":"Identifying malicious code through reverse engineering","author":"Singh Abhishek","key":"e_1_3_2_1_25_1","unstructured":"Abhishek Singh . 2009. Identifying malicious code through reverse engineering . Vol. 44 . Springer Science & Business Media . https:\/\/doi.org\/10.1007\/978-0-387-89468-3 Abhishek Singh. 2009. Identifying malicious code through reverse engineering. Vol. 44. Springer Science & Business Media. https:\/\/doi.org\/10.1007\/978-0-387-89468-3"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1228"}],"event":{"name":"ICONETSI: International Conference on Engineering and Information Technology for Sustainable Industry","acronym":"ICONETSI","location":"Tangerang Indonesia"},"container-title":["Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429789.3429819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:44Z","timestamp":1750195904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429819"}},"subtitle":["A Threat Score Framework Based on Static and Dynamic Analysis Features"],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":25,"alternative-id":["10.1145\/3429789.3429819","10.1145\/3429789"],"URL":"https:\/\/doi.org\/10.1145\/3429789.3429819","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}