{"_id":"RdovuWw7TDMa7faf2","bibbaseid":"fattahi-mejri-ziadia-pricop-samoud-introductiontosinjaranewtoolforreverseengineeringjavaapplicationsandtracingitsmaliciousactionsusinghiddenmarkovmodels-2017","author_short":["Fattahi, J.","Mejri, M.","Ziadia, M.","Pricop, E.","Samoud, O."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Jaouhar"],"propositions":[],"lastnames":["Fattahi"],"suffixes":[]},{"firstnames":["Mohamed"],"propositions":[],"lastnames":["Mejri"],"suffixes":[]},{"firstnames":["Marwa"],"propositions":[],"lastnames":["Ziadia"],"suffixes":[]},{"firstnames":["Emil"],"propositions":[],"lastnames":["Pricop"],"suffixes":[]},{"firstnames":["Ouejdene"],"propositions":[],"lastnames":["Samoud"],"suffixes":[]}],"editor":[{"firstnames":["Hamido"],"propositions":[],"lastnames":["Fujita"],"suffixes":[]},{"firstnames":["Ali"],"propositions":[],"lastnames":["Selamat"],"suffixes":[]},{"firstnames":["Sigeru"],"propositions":[],"lastnames":["Omatu"],"suffixes":[]}],"title":"Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models","booktitle":"New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 16th International Conference, SoMeT_17, Kitakyushu City, Japan, September 26-28, 2017","series":"Frontiers in Artificial Intelligence and Applications","volume":"297","pages":"441–453","publisher":"IOS Press","year":"2017","url":"https://doi.org/10.3233/978-1-61499-800-6-441","doi":"10.3233/978-1-61499-800-6-441","timestamp":"Fri, 02 Nov 2018 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/somet/FattahiMZPS17.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/somet/FattahiMZPS17,\n author = {Jaouhar Fattahi and\n Mohamed Mejri and\n Marwa Ziadia and\n Emil Pricop and\n Ouejdene Samoud},\n editor = {Hamido Fujita and\n Ali Selamat and\n Sigeru Omatu},\n title = {Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications)\n and Tracing Its Malicious Actions Using Hidden Markov Models},\n booktitle = {New Trends in Intelligent Software Methodologies, Tools and Techniques\n - Proceedings of the 16th International Conference, SoMeT{\\_}17, Kitakyushu\n City, Japan, September 26-28, 2017},\n series = {Frontiers in Artificial Intelligence and Applications},\n volume = {297},\n pages = {441--453},\n publisher = {{IOS} Press},\n year = {2017},\n url = {https://doi.org/10.3233/978-1-61499-800-6-441},\n doi = {10.3233/978-1-61499-800-6-441},\n timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/somet/FattahiMZPS17.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Fattahi, J.","Mejri, M.","Ziadia, M.","Pricop, E.","Samoud, O."],"editor_short":["Fujita, H.","Selamat, A.","Omatu, S."],"key":"DBLP:conf/somet/FattahiMZPS17","id":"DBLP:conf/somet/FattahiMZPS17","bibbaseid":"fattahi-mejri-ziadia-pricop-samoud-introductiontosinjaranewtoolforreverseengineeringjavaapplicationsandtracingitsmaliciousactionsusinghiddenmarkovmodels-2017","role":"author","urls":{"Paper":"https://doi.org/10.3233/978-1-61499-800-6-441"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/141/8033.bib","dataSources":["WKGTRRZ82WRAAb4BL","hJ9b6eCN8bT9KvtQ6"],"keywords":[],"search_terms":["introduction","sinjar","new","tool","reverse","engineering","java","applications","tracing","malicious","actions","using","hidden","markov","models","fattahi","mejri","ziadia","pricop","samoud"],"title":"Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models","year":2017}