{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T11:54:51Z","timestamp":1718106891286},"reference-count":21,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1016\/j.diin.2014.06.003","type":"journal-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T21:48:56Z","timestamp":1404251336000},"page":"323-335","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":13,"title":["Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering"],"prefix":"10.1016","volume":"11","author":[{"given":"BooJoong","family":"Kang","sequence":"first","affiliation":[]},{"given":"Kyoung Soo","family":"Han","sequence":"additional","affiliation":[]},{"given":"Byeongho","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.diin.2014.06.003_bib1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00153759","article-title":"Instance-based learning algorithms","volume":"6","author":"Aha","year":"1991","journal-title":"Mach Learn"},{"key":"10.1016\/j.diin.2014.06.003_bib2","series-title":"Modern information retrieval","author":"Baeza-Yates","year":"1999"},{"issue":"2","key":"10.1016\/j.diin.2014.06.003_bib3","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","article-title":"Opcodes as predictor for malware","volume":"1","author":"Bilar","year":"2007","journal-title":"Int J Electron Secur Digit Forensics"},{"issue":"1","key":"10.1016\/j.diin.2014.06.003_bib4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach Learn"},{"key":"10.1016\/j.diin.2014.06.003_bib5","series-title":"Proceedings of the 15th conference on uncertainty in artificial intelligence","first-page":"101","article-title":"Comparing Bayesian network classifiers","author":"Cheng","year":"1999"},{"key":"10.1016\/j.diin.2014.06.003_bib6","series-title":"Proceedings of the 12th international conference on machine learning","first-page":"115","article-title":"Fast effective rule induction","author":"Choen","year":"1995"},{"issue":"1","key":"10.1016\/j.diin.2014.06.003_bib7","doi-asserted-by":"crossref","DOI":"10.1145\/1656274.1656278","article-title":"The WEKA data mining software: an update","volume":"11","author":"Hall","year":"2009","journal-title":"SIGKDD Explor"},{"key":"10.1016\/j.diin.2014.06.003_bib8","series-title":"A practical guide to support vector classification","author":"Hsu","year":"2010"},{"key":"10.1016\/j.diin.2014.06.003_bib9","article-title":"Basic architecture","volume":"vol. 1","author":"Intel","year":"2014"},{"key":"10.1016\/j.diin.2014.06.003_bib10","article-title":"Instruction set reference, A\u2013Z","volume":"vol. 2","author":"Intel","year":"2014"},{"key":"10.1016\/j.diin.2014.06.003_bib11","series-title":"Compiler construction: principles and practice","author":"Louden","year":"1997"},{"key":"10.1016\/j.diin.2014.06.003_bib12","series-title":"Proceedings of the 10th international symposium on code generation and optimization","first-page":"114","article-title":"PinADX: an interface for customizable debugging with dynamic instrumentation","author":"Lueck","year":"2012"},{"key":"10.1016\/j.diin.2014.06.003_bib13","series-title":"An undirected attack against critical infrastructure","author":"Nash","year":"2005"},{"issue":"3","key":"10.1016\/j.diin.2014.06.003_bib14","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1109\/TIFS.2013.2242890","article-title":"SVM training phase reduction using dataset feature filtering for malware detection","volume":"8","author":"O'Kane","year":"2013","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.diin.2014.06.003_bib15","author":"OllyDbg"},{"key":"10.1016\/j.diin.2014.06.003_bib16","series-title":"Sequential minimal optimization: a fast algorithm for training support vector machines","author":"Platt","year":"1998"},{"key":"10.1016\/j.diin.2014.06.003_bib17","series-title":"Proceedings of the 14th WSEAS international conference on COMPUTERS","first-page":"147","article-title":"Metamorphic virus variants classification using opcode frequency histogram","author":"Rad","year":"2010"},{"key":"10.1016\/j.diin.2014.06.003_bib18","author":"Santamarta"},{"key":"10.1016\/j.diin.2014.06.003_bib19","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","article-title":"Opcode sequences as representation of executables for data-mining-based unknown malware detection","volume":"231","author":"Santos","year":"2011","journal-title":"Inf Sci"},{"key":"10.1016\/j.diin.2014.06.003_bib20","author":"Symantec"},{"key":"10.1016\/j.diin.2014.06.003_bib21","series-title":"Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining","first-page":"95","article-title":"Automatic malware categorization using cluster ensemble","author":"Ye","year":"2010"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287614000772?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287614000772?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T20:50:28Z","timestamp":1538427028000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287614000772"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["S1742287614000772"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2014.06.003","relation":{},"ISSN":["1742-2876"],"issn-type":[{"value":"1742-2876","type":"print"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering","name":"articletitle","label":"Article Title"},{"value":"Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.diin.2014.06.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}