{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:16:51Z","timestamp":1730315811655,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["Award No. FA9550-10-1-0289"],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,24]]},"DOI":"10.1145\/2016039.2016085","type":"proceedings-article","created":{"date-parts":[[2011,8,10]],"date-time":"2011-08-10T16:16:32Z","timestamp":1312992992000},"page":"166-172","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Using randomized projection techniques to aid in detecting high-dimensional malicious applications"],"prefix":"10.1145","author":[{"given":"Jan","family":"Durand","sequence":"first","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]},{"given":"Travis","family":"Atkison","sequence":"additional","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]}],"member":"320","published-online":{"date-parts":[[2011,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"R. Richardson 2008 CSI Computer Crime and Security Survey Computer Security Institute 2008. R. Richardson 2008 CSI Computer Crime and Security Survey Computer Security Institute 2008."},{"key":"e_1_3_2_1_2_1","unstructured":"R. Richardson 2007 CSI Computer Crime and Security Survey Computer Security Institute 2007. R. Richardson 2007 CSI Computer Crime and Security Survey Computer Security Institute 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900008.1900117"},{"key":"e_1_3_2_1_5_1","first-page":"193","article-title":"Detection of New Malicious Code Using N-grams Signatures,\" in Proceedings of the 2nd Annual Conference on Privacy, Security and Trust, New Brunswick","author":"Abou-Assaleh T.","year":"2004","journal-title":"Canada"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248646"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0027-8"},{"volume-title":"Princeton University Press","year":"1961","author":"Bellman R.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"P. Cunningham \"Dimension Reduction \" University College Dublin Belfield Ireland Tech Rep. UCD-CSI-2007-7 Aug. 2007. P. Cunningham \"Dimension Reduction \" University College Dublin Belfield Ireland Tech Rep. UCD-CSI-2007-7 Aug. 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1994.365733"},{"volume-title":"IL","year":"2001","author":"Mannila H.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1566445.1566477"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502546"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2000.1711"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"S. Vempala The Random Projection Method DIMACS Series in Discrete Mathematics and Theoretical Computer Science 2004. S. Vempala The Random Projection Method DIMACS Series in Discrete Mathematics and Theoretical Computer Science 2004.","DOI":"10.1090\/dimacs\/065"},{"key":"e_1_3_2_1_17_1","unstructured":"S. Kaski \"Dimensionality Reduction by Random Mapping: Fast Similarity Computation for Clustering \" in The 1998 IEEE International Joint Conference on Neural Networks 1998. S. Kaski \"Dimensionality Reduction by Random Mapping: Fast Similarity Computation for Clustering \" in The 1998 IEEE International Joint Conference on Neural Networks 1998."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044450270-4\/50029-2"},{"key":"e_1_3_2_1_19_1","unstructured":"J. Lin and D. Gunopulos \"Dimensionality reduction by random projection and latent semantic indexing \" in Proceedings of the Text Mining Workshop at the 3rd SIAM International Conference on Data Mining 2003. J. Lin and D. Gunopulos \"Dimensionality reduction by random projection and latent semantic indexing \" in Proceedings of the Text Mining Workshop at the 3rd SIAM International Conference on Data Mining 2003."},{"issue":"3","key":"e_1_3_2_1_20_1","first-page":"4","article-title":"Random projection experiments with chemometric data","volume":"24","author":"Varmuza K.","year":"2010","journal-title":"Journal of Chemometrics"},{"volume-title":"England","year":"1999","author":"Baeza-Yates R.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031240"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"issue":"4","key":"e_1_3_2_1_24_1","first-page":"35","article-title":"Modern Information Retrieval: A Brief Overview","volume":"24","author":"Singhal A.","year":"2001","journal-title":"Bulletin of the Technical Committee on Data Engineering"},{"volume-title":"COMPSAC.","year":"2004","author":"Abou-Assaleh T.","key":"e_1_3_2_1_25_1"},{"first-page":"985","volume-title":"CA, 1995","author":"Kephart J. O.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366197"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/026\/737400"},{"key":"e_1_3_2_1_30_1","unstructured":"Symantec Symantec Internet Security Threat Report: Trends for January 05 - June 05 Sep. 2005. Symantec Symantec Internet Security Threat Report: Trends for January 05 - June 05 Sep. 2005."},{"key":"e_1_3_2_1_31_1","unstructured":"Symantec Symantec Internet Security Threat Report: Trends for 2009 Apr. 2010. Symantec Symantec Internet Security Threat Report: Trends for 2009 Apr. 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02776078"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"I. Santos Y. Penya J. Devesa P. Bringas \"N-Grams-based file signatures for malware detection \" in Proceedings of the 11th International Conference on Enter-prise Information Systems (ICEIS) vol. aidss. pp. 317--320 2009. I. Santos Y. Penya J. Devesa P. Bringas \"N-Grams-based file signatures for malware detection \" in Proceedings of the 11th International Conference on Enter-prise Information Systems (ICEIS) vol. aidss. pp. 317--320 2009.","DOI":"10.5220\/0001863603170320"},{"first-page":"626","volume-title":"June 2010","author":"Zhang M.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375608"}],"event":{"name":"ACM SE '11: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Kennesaw Georgia","acronym":"ACM SE '11"},"container-title":["Proceedings of the 49th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2016039.2016085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T06:39:02Z","timestamp":1672987142000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2016039.2016085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,24]]},"references-count":34,"alternative-id":["10.1145\/2016039.2016085","10.1145\/2016039"],"URL":"https:\/\/doi.org\/10.1145\/2016039.2016085","relation":{},"subject":[],"published":{"date-parts":[[2011,3,24]]},"assertion":[{"value":"2011-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}