{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:32:45Z","timestamp":1730323965296,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,26]]},"DOI":"10.1145\/3459637.3481896","type":"proceedings-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T15:53:43Z","timestamp":1636991623000},"page":"3777-3786","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["AutoCombo"],"prefix":"10.1145","author":[{"given":"Min","family":"Du","sequence":"first","affiliation":[{"name":"Palo Alto Networks, Santa Clara, CA, USA"}]},{"given":"Wenjun","family":"Hu","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, Santa Clara, CA, USA"}]},{"given":"William","family":"Hewlett","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2850932"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.2000.1693"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433203"},{"key":"e_1_3_2_2_5_1","unstructured":"Karin Ask. 2006. Automatic malware signature generation. Karin Ask. 2006. Automatic malware signature generation."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2874502"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9629-z"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"volume-title":"Cuckoo: Automated malware analysis. https:\/\/cuckoosandbox.org\/. [Online","year":"2021","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.008"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653730"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340510"},{"volume-title":"Workshop on Frequent Itemset Mining Implementations (FIMI'03)","year":"2003","author":"El-Hajj Mohammad","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_6"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/KBEI.2015.7436153"},{"volume-title":"Kaggle competitions. https:\/\/www.kaggle.com\/competitions. [Online","year":"2021","key":"e_1_3_2_2_19_1"},{"volume-title":"Antivirus fundamentals: Viruses, signatures, disinfection. https:\/\/usa.kaspersky.com\/blog\/signature-virus-disinfection\/7790\/. [Online","year":"2021","key":"e_1_3_2_2_20_1"},{"volume-title":"Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks. Neural Computing and Applications","year":"2019","author":"Kaur Sanmeet","key":"e_1_3_2_2_21_1"},{"volume-title":"Knapsack problems","author":"Kellerer Hans","key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24777-7"},{"volume-title":"Proc. 4th Virus Bulletin International Conference","year":"1994","author":"Kephart Jeffrey O","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251394"},{"key":"e_1_3_2_2_25_1","first-page":"90","article-title":"Review on determining number of Cluster in K-Means Clustering","volume":"1","author":"Kodinariya Trupti M","year":"2013","journal-title":"International Journal"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2609907"},{"volume-title":"AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. New York;, 50--56","year":"1997","author":"Lee Wenke","key":"e_1_3_2_2_27_1"},{"volume-title":"2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, 237--246","year":"2008","author":"Li Zhuowei","key":"e_1_3_2_2_28_1"},{"key":"e_1_3_2_2_29_1","unstructured":"McAfee. 2018. McAfee Endpoint Security 10.6.0 - Threat Prevention Product Guide - Windows: How signatures protect applications and systems. https:\/\/docs.mcafee.com\/bundle\/endpoint-security-10.6.0-threat-prevention-product-guide-windows\/page\/GUID-D5EE4D68-0CE5-4B9F-A22D-9DE54EABC345.html. [Online; accessed 25-May-2021]. McAfee. 2018. McAfee Endpoint Security 10.6.0 - Threat Prevention Product Guide - Windows: How signatures protect applications and systems. https:\/\/docs.mcafee.com\/bundle\/endpoint-security-10.6.0-threat-prevention-product-guide-windows\/page\/GUID-D5EE4D68-0CE5-4B9F-A22D-9DE54EABC345.html. [Online; accessed 25-May-2021]."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_9"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.01.003"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2018.94019"},{"volume-title":"PAN-OS\u00ae Administrator's Guide: Threat Signatures. https:\/\/docs.paloaltonetworks.com\/pan-os\/8--1\/pan-os-admin\/threat-prevention\/threat-signatures. [Online","year":"2021","author":"Networks Palo Alto","key":"e_1_3_2_2_33_1"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575130"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855711.1855737"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.10.013"},{"key":"e_1_3_2_2_38_1","unstructured":"Yutaka Sasaki. 2007. The truth of the F-measure. Yutaka Sasaki. 2007. The truth of the F-measure."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2068544"},{"volume-title":"sklearn.model_selection.GridSearchCV. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.model_selection.GridSearchCV.html. [Online","year":"2021","key":"e_1_3_2_2_40_1"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128596.1128760"},{"key":"e_1_3_2_2_42_1","unstructured":"Giovanni Squillero Andrea Atzeni Andrea Marcelli and Luca Cetro. 2018a. Automatic Malware Signature Generation. (2018). Giovanni Squillero Andrea Atzeni Andrea Marcelli and Luca Cetro. 2018a. Automatic Malware Signature Generation. (2018)."},{"volume-title":"Dott Andrea Marcelli, and Luca Mannella","year":"2018","author":"Squillero Giovanni","key":"e_1_3_2_2_43_1"},{"volume-title":"Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis. In 2019 IEEE Security and Privacy Workshops (SPW). IEEE, 218--223","year":"2019","author":"Starov Oleksii","key":"e_1_3_2_2_44_1"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0119-3"},{"key":"e_1_3_2_2_46_1","unstructured":"Shobha Venkataraman Avrim Blum and Dawn Song. 2008. Limits of learning-based signature generation with adversaries. (2008). Shobha Venkataraman Avrim Blum and Dawn Song. 2008. Limits of learning-based signature generation with adversaries. (2008)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053002"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49638.2020.9123267"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2037978"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.846291"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489345"}],"event":{"name":"CIKM '21: The 30th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Queensland Australia","acronym":"CIKM '21"},"container-title":["Proceedings of the 30th ACM International Conference on Information & Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3459637.3481896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:03:09Z","timestamp":1673222589000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459637.3481896"}},"subtitle":["Automatic Malware Signature Generation Through Combination Rule Mining"],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":51,"alternative-id":["10.1145\/3459637.3481896","10.1145\/3459637"],"URL":"https:\/\/doi.org\/10.1145\/3459637.3481896","relation":{},"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"2021-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}