{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:25:43Z","timestamp":1730316343420,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["20120006492"],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,23]]},"DOI":"10.1145\/2401603.2401672","type":"proceedings-article","created":{"date-parts":[[2012,11,27]],"date-time":"2012-11-27T14:28:59Z","timestamp":1354026539000},"page":"316-321","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Malware classification method via binary content comparison"],"prefix":"10.1145","author":[{"given":"Boojoong","family":"Kang","sequence":"first","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]},{"given":"Taekeun","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]},{"given":"Heejun","family":"Kwon","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]},{"given":"Yangseo","family":"Choi","sequence":"additional","affiliation":[{"name":"ETRI, Daejeon, Korea"}]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2012,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Panda Research. Mal(ware)formation statistics - Panda Research Blog. Available: http:\/\/research.pandasecurity.com\/archive\/Mal_2800_ware_2900_formation-statistics.aspx 2007 Panda Research. Mal(ware)formation statistics - Panda Research Blog. Available: http:\/\/research.pandasecurity.com\/archive\/Mal_2800_ware_2900_formation-statistics.aspx 2007"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076735"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"first-page":"411","volume-title":"Proceedings of the 23rd annual computer security applications Conf","year":"2007","author":"Zhang","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2007.31"},{"volume-title":"Distributed Malware Detection. In Proceedings of the NSDI'10","year":"2010","author":"Cha Sang Kil","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"ClamAV http:\/\/clamav.net\/ ClamAV http:\/\/clamav.net\/"},{"volume-title":"Proceedings of the 2nd Annual Conference on Privacy, Security and Trust, 193--196","year":"2004","author":"Cercone T. A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690851"},{"key":"e_1_3_2_1_13_1","unstructured":"Ollydbg http:\/\/www.ollydbg.de\/ Ollydbg http:\/\/www.ollydbg.de\/"},{"issue":"1","key":"e_1_3_2_1_14_1","first-page":"4","article-title":"Full-class set classification using the Hungarian algorithm","volume":"1","author":"Kuncheva Ludmila I.","year":"2010","journal-title":"Journal of Machine Learning and Cybernetics"},{"key":"e_1_3_2_1_15_1","unstructured":"Vxheaven http:\/\/vx.netlux.org\/ Vxheaven http:\/\/vx.netlux.org\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403019"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0023-z"},{"volume-title":"Engin Kirda. Limits of Static Analysis for Malware Detection. In Proceedings of the 23rd IEEE Annual Computer Security Applications Conference(ACSAC), 421--430","year":"2007","author":"Moser Andreas","key":"e_1_3_2_1_18_1"},{"volume-title":"Springer","year":"2009","author":"Webster Matt","key":"e_1_3_2_1_19_1"},{"volume-title":"Jaime Devesa and Pablo G. Bringas. N-Grams-Based File Signatures for Malware Detection. In Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS)","year":"2009","author":"Santos Igor","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103380.2103441"}],"event":{"name":"RACS '12: Research in Applied Computation Symposium","sponsor":["ACCT Association of Convergent Computing Technology","SIGAPP ACM Special Interest Group on Applied Computing"],"location":"San Antonio Texas","acronym":"RACS '12"},"container-title":["Proceedings of the 2012 ACM Research in Applied Computation Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2401603.2401672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T17:02:28Z","timestamp":1673715748000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2401603.2401672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,23]]},"references-count":21,"alternative-id":["10.1145\/2401603.2401672","10.1145\/2401603"],"URL":"https:\/\/doi.org\/10.1145\/2401603.2401672","relation":{},"subject":[],"published":{"date-parts":[[2012,10,23]]},"assertion":[{"value":"2012-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}