{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:35Z","timestamp":1763499035101,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science and ICT South Korea","award":["No.NRF-2020R1A2B5B03001960","No.2018R1A5A7059549","No.2020-0-01373"],"award-info":[{"award-number":["No.NRF-2020R1A2B5B03001960","No.2018R1A5A7059549","No.2020-0-01373"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485355","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2441-2443","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["MANIAC: A Man-Machine Collaborative System for Classifying Malware Author Groups"],"prefix":"10.1145","author":[{"given":"Eujeanne","family":"Kim","sequence":"first","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]},{"given":"Sung-Jun","family":"Park","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]},{"given":"Seokwoo","family":"Choi","sequence":"additional","affiliation":[{"name":"The Attached Institute of ETRI, Daejeon, Republic of Korea"}]},{"given":"Dong-Kyu","family":"Chae","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]},{"given":"Sang-Wook","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"D.-K. Chae et al. 2013. Software plagiarism detection: a graph-based approach. In ACM CIKM. 1577--1580.","DOI":"10.1145\/2505515.2507848"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.01.002"},{"volume-title":"International Conference on Formal Engineering Methods. 505--521","author":"Costantini G.","key":"e_1_3_2_2_4_1","unstructured":"G. Costantini, P. Ferrara, and A. Cortesi. 2011. Static analysis of string values. In International Conference on Formal Engineering Methods. 505--521."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"F. M. Dekking et al. 2005. A Modern Introduction to Probability and Statistics: Understanding why and how. Springer Science & Business Media.","DOI":"10.1007\/1-84628-168-7_1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"M. Egele et al. 2008. Asurvey on automated dynamic malware-analysis techniques and tools. ACM computing surveys (CSUR) 44 2 (2008) 1--42.","DOI":"10.1145\/2089125.2089126"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"A. Gr\u00e9gio et al. 2011. Behavioral analysis of malicious code through network traffic and system call monitoring. 8059 (2011) 80590O.","DOI":"10.1117\/12.883457"},{"volume-title":"Data mining: concepts and techniques","author":"Han Jiawei","key":"e_1_3_2_2_8_1","unstructured":"Jiawei Han, Jian Pei, and Micheline Kamber. 2011. Data mining: concepts and techniques. Elsevier."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"J. Hong et al. 2019. Malware classification for identifying author groups: a graph-based approach. In ACM RACS. 169--174.","DOI":"10.1145\/3338840.3355684"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the Botconf","author":"D. Plohmann","year":"2017","unstructured":"D. Plohmann et al. 2017. Malpedia: a collaborative effort to inventorize the malware landscape. Proceedings of the Botconf (2017)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:05Z","timestamp":1763498825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":11,"alternative-id":["10.1145\/3460120.3485355","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485355","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}