{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:22:32Z","timestamp":1769314952716,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/softcom.2018.8555738","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:46:31Z","timestamp":1543884391000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["Malware Detection using Opcode Trigram Sequence with SVM"],"prefix":"10.23919","author":[{"given":"Amr I.","family":"Elkhawas","sequence":"first","affiliation":[]},{"given":"Nashwa","family":"Abdelbaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-016-0027-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568542"},{"key":"ref12","first-page":"1","article-title":"An investigation of byte n-gram features for malware classification","author":"raff","year":"2016","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2016.7603221"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijiis.s.2014030601.16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2016.7556114"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0082-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.5.405-414"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568881"},{"key":"ref4","first-page":"555","article-title":"Case Studies on Intelligent Approaches for Static Malware Analysis","author":"mithal","year":"2016","journal-title":"Emerging Research in Computing Information Communication and Applications Springer Singapore"},{"key":"ref3","first-page":"48","article-title":"Detecting Internet Worms Using Data Mining Techniques","volume":"6","author":"siddiqui","year":"2009","journal-title":"Journal of Systemics Cybernetics and Informatics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513294"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18287\/1613-0073-2016-1638-437-443"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0252-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2103380.2103441"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2016.2559378"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2636078"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2811411.2811516"}],"event":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","location":"Split","start":{"date-parts":[[2018,9,13]]},"end":{"date-parts":[[2018,9,15]]}},"container-title":["2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8538965\/8555735\/08555738.pdf?arnumber=8555738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:29:03Z","timestamp":1546997343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8555738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/softcom.2018.8555738","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}