{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:53:57Z","timestamp":1725580437895},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642202667"},{"type":"electronic","value":"9783642202674"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20267-4_11","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T20:34:38Z","timestamp":1302294878000},"page":"98-107","source":"Crossref","is-referenced-by-count":14,"title":["A New N-gram Feature Extraction-Selection Method for Malicious Code"],"prefix":"10.1007","author":[{"given":"Hamid","family":"Parvin","sequence":"first","affiliation":[]},{"given":"Behrouz","family":"Minaei","sequence":"additional","affiliation":[]},{"given":"Hossein","family":"Karshenas","sequence":"additional","affiliation":[]},{"given":"Akram","family":"Beigi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Machine Learning","author":"T. Mitchell","year":"1997","unstructured":"Mitchell, T.: Machine Learning. Prentice Hall, Englewood Cliffs (1997)"},{"key":"11_CR2","unstructured":"Schultz, M., Eskin, E., Zadok, E., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 38\u201349 (2001)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: Detection of new malicious code using n-grams signatures. In: PST, pp. 193\u2013196 (2004)","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"11_CR4","unstructured":"Yang, Y., Pedersen, J.O.: A comparative study on feature selection in text categorization. In: Fisher, D.H. (ed.) Proceedings of ICML 1997, 14th International Conference on Machine Learning, Nashville, pp. 412\u2013420 (1997)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 470\u2013478 (2004)","DOI":"10.1145\/1014052.1014105"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen, F.: Computer Viruses - Theory and Experiments. IFIP-TC11 Computers and Security\u00a06, 22\u201335 (1987)","journal-title":"IFIP-TC11 Computers and Security"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11416-006-0027-8","volume":"2","author":"D.K.S. Reddy","year":"2006","unstructured":"Reddy, D.K.S., Pujari, A.K.: N-gram analysis for computer virus detection. Journal in Computer Virology\u00a02(3), 231\u2013239 (2006)","journal-title":"Journal in Computer Virology"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s11416-007-0036-2","volume":"3","author":"B. Morin","year":"2007","unstructured":"Morin, B., M\u00e9, L.: Intrusion detection and virology: an analysis of differences, similarities and complementariness. Journal of Computer Virology, vol\u00a03, 39\u201349 (2007)","journal-title":"Journal of Computer Virology, vol"},{"key":"11_CR9","volume-title":"Computer viruses: from theory to applications","author":"E. Filiol","year":"2005","unstructured":"Filiol, E.: Computer viruses: from theory to applications. Springer, New York (2005)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/0-387-34799-2_28","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"L.M. Adleman","year":"1990","unstructured":"Adleman, L.M.: An Abstract Theory of Computer Viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 354\u2013374. Springer, Heidelberg (1990)"},{"key":"11_CR11","first-page":"2721","volume":"7","author":"J.Z. Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. The Journal of Machine Learning Research\u00a07, 2721\u20132744 (2006)","journal-title":"The Journal of Machine Learning Research"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-540-27868-9_42","volume-title":"Structural, Syntactic, and Statistical Pattern Recognition","author":"B. Minaei-Bidgoli","year":"2004","unstructured":"Minaei-Bidgoli, B., Kortemeyer, G., Punch, W.F.: Optimizing Classification Ensembles via a Genetic Algorithm for a Web-Based Educational System. In: Fred, A., Caelli, T.M., Duin, R.P.W., Campilho, A.C., de Ridder, D. (eds.) SSPR&SPR 2004. LNCS, vol.\u00a03138, pp. 397\u2013406. Springer, Heidelberg (2004)"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1214\/aos\/1024691079","volume":"26","author":"L. Breiman","year":"1998","unstructured":"Breiman, L.: Arcing classifiers. The Annals of Statistics\u00a026(3), 801\u2013823 (1998)","journal-title":"The Annals of Statistics"},{"key":"11_CR14","unstructured":"http:\/\/vx.netlux.org\/"}],"container-title":["Lecture Notes in Computer Science","Adaptive and Natural Computing Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20267-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T23:25:31Z","timestamp":1592436331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20267-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642202667","9783642202674"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20267-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}