{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:53:05Z","timestamp":1761007985831,"version":"build-2065373602"},"reference-count":27,"publisher":"IBM","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IBM J. Res. &amp; Dev."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1147\/jrd.2016.2559378","type":"journal-article","created":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T14:48:29Z","timestamp":1469630909000},"page":"6:1-6:11","source":"Crossref","is-referenced-by-count":17,"title":["Scalable malware classification with multifaceted content features and threat intelligence"],"prefix":"10.1147","volume":"60","author":[{"given":"X.","family":"Hu","sequence":"first","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"J.","family":"Jang","sequence":"additional","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"T.","family":"Wang","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"given":"Z.","family":"Ashraf","sequence":"additional","affiliation":[{"name":"IBM X-Force Advanced Security Team, Markham, ON, Canada"}]},{"given":"M. Ph.","family":"Stoecklin","sequence":"additional","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"D.","family":"Kirat","sequence":"additional","affiliation":[{"name":"IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA"}]}],"member":"3082","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11"},{"key":"ref11","first-page":"48","article-title":"Detecting internet worms using data mining techniques","volume":"6","author":"siddiqui","year":"2008","journal-title":"J Syst Cybern Informat"},{"key":"ref12","first-page":"1","article-title":"An undetectable computer virus","volume":"5","author":"chess","year":"0","journal-title":"Proc Virus Bull Conf"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08624-8_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"ref16","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"kolter","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref17","first-page":"1","article-title":"N-grams-based file signatures for malware detection","author":"santos","year":"0","journal-title":"Proc ICEIS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_6"},{"key":"ref27","first-page":"496","article-title":"Hash kernels","author":"shi","year":"0","journal-title":"Proc 12th Int Conf Artif Intell Statist"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05149-9_15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"journal-title":"Microsoft malware classification challenge","year":"0","key":"ref9"},{"journal-title":"Annual threat report","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523682"},{"key":"ref22","first-page":"1","article-title":"peHash: A novel approach to fast malware clustering","author":"wicherski","year":"0","journal-title":"Proceedings of USENIX Workshop on LEET"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_7"},{"journal-title":"Peering Inside the PE A Tour of the Win32 Portable Executable File Format","year":"0","author":"pietrek","key":"ref24"},{"key":"ref23","first-page":"187","article-title":"Digital genome mapping-advanced binary malware analysis","author":"carrera","year":"0","journal-title":"Proc Virus Bull Conf"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809682"},{"journal-title":"Malheur-Automatic Analysis Of Malware Behavior","year":"2010","author":"rieck","key":"ref25"}],"container-title":["IBM Journal of Research and Development"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5288520\/7523342\/07523365.pdf?arnumber=7523365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:55:20Z","timestamp":1760982920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7523365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":27,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1147\/jrd.2016.2559378","relation":{},"ISSN":["0018-8646","0018-8646"],"issn-type":[{"type":"print","value":"0018-8646"},{"type":"electronic","value":"0018-8646"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}