{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T12:04:06Z","timestamp":1649160246164},"reference-count":15,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transinf.2016edl8230","type":"journal-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T22:23:07Z","timestamp":1496269387000},"page":"1368-1371","source":"Crossref","is-referenced-by-count":2,"title":["Inferring Phylogenetic Network of Malware Families Based on Splits Graph"],"prefix":"10.1587","volume":"E100.D","author":[{"given":"Jing","family":"LIU","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology"}]},{"given":"Yuan","family":"WANG","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology"}]},{"given":"Pei Dai","family":"XIE","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology"}]},{"given":"Yong Jun","family":"WANG","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] M.E. Karim, A. Walenstein, A. Lakhotia, and L. Parida, \u201cMalware phylogeny generation using permutations of code,\u201d Journal in Computer Virology, vol.1, no.1-2, pp.13-23, 2005.","DOI":"10.1007\/s11416-005-0002-9"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J.D. Seideman, B. Khan, and A.C. Vargas, \u201cMalware biodiversity using static analysis,\u201d International Conference on Future Network Systems and Security, pp.139-155, Springer, 2015.","DOI":"10.1007\/978-3-319-19210-9_10"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] J.D. Seideman, B. Khan, and A.C. Vargas, \u201cIdentifying malware genera using the Jensen-Shannon distance between system call traces,\u201d 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), pp.1-7, IEEE, 2014.","DOI":"10.1109\/MALWARE.2014.6999409"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] A. Pfeffer, C. Call, J. Chamberlain, L. Kellogg, J. Ouellette, T. Patten, G. Zacharias, A. Lakhotia, S. Golconda, J. Bay, R. Hall, and D. Scofield, \u201cMalware analysis and attribution using genetic information,\u201d 2012 7th International Conference on Malicious and Unwanted Software (MALWARE), pp.39-45, IEEE, 2012.","DOI":"10.1109\/MALWARE.2012.6461006"},{"key":"5","unstructured":"[5] M.E. Karim, A. Walenstein, A. Lakhotia, and L. Parida, \u201cMalware phylogeny using maximal pi-patterns,\u201d EICAR 2005 Conference: Best Paper Proceedings, pp.156-174, 2005."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] A. Gupta, P. Kuppili, A. Akella, and P. Barford, \u201cAn empirical study of malware evolution,\u201d 2009 First International Communication Systems and Networks and Workshops, pp.1-10, IEEE, 2009.","DOI":"10.1109\/COMSNETS.2009.4808876"},{"key":"7","unstructured":"[7] J. Jang, M. Woo, and D. Brumley, \u201cTowards automatic software lineage inference,\u201d Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), pp.81-96, 2013."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] B. Anderson, T. Lane, and C. Hash, \u201cMalware phylogenetics based on the multiview graphical lasso,\u201d International Symposium on Intelligent Data Analysis, pp.1-12, Springer, 2014.","DOI":"10.1007\/978-3-319-12571-8_1"},{"key":"9","unstructured":"[9] D. Oyen, B. Anderson, and C. Anderson-Cook, \u201cBayesian networks with prior knowledge for malware phylogenetics,\u201d Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016."},{"key":"10","unstructured":"[10] G. Dan, V. Bansal, V. Bafna, and Y.S. Song, \u201cA decomposition theory for phylogenetic networks and incompatible characters,\u201d Journal of Computational Biology, vol.14, no.10, pp.1247-1272, 2007."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] H.W. Kuhn, \u201cThe hungarian method for the assignment problem,\u201d Naval Research Logistics, vol.52, no.1, p.7-21, 2005.","DOI":"10.1002\/nav.20053"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] B. Anderson, \u201cIntegrating multiple data views for improved malware analysis,\u201d 2014.","DOI":"10.2172\/1119578"},{"key":"13","unstructured":"[13] http:\/\/vxheaven.org\/"},{"key":"14","unstructured":"[14] https:\/\/sourceforge.net\/projects\/networkminer\/"},{"key":"15","unstructured":"[15] https:\/\/github.com\/fador\/mineserver"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/6\/E100.D_2016EDL8230\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T10:01:48Z","timestamp":1569405708000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/6\/E100.D_2016EDL8230\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":15,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2016edl8230","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}