{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:11:37Z","timestamp":1725559897411},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283126"},{"type":"electronic","value":"9783540318309"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11539506_78","type":"book-chapter","created":{"date-parts":[[2010,7,21]],"date-time":"2010-07-21T14:15:58Z","timestamp":1279721758000},"page":"629-634","source":"Crossref","is-referenced-by-count":11,"title":["Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code"],"prefix":"10.1007","author":[{"given":"Boyun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Jingbo","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"78_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/52.877857","volume":"5","author":"G. McGraw","year":"2000","unstructured":"McGraw, G., Morisett, G.: Attacking malicious code: A report to the Infosec Research Council. IEEE Software\u00a05, 33\u201341 (2000)","journal-title":"IEEE Software"},{"key":"78_CR2","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/0167-4048(95)00012-W","volume":"14","author":"R. Lo","year":"1995","unstructured":"Lo, R., Levitt, K., Olsson, R.: MCF: A malicious code filter. Computers & Security\u00a014, 541\u2013566 (1995)","journal-title":"Computers & Security"},{"key":"78_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/64.511768","volume":"11","author":"G. Tesauro","year":"1996","unstructured":"Tesauro, G., Kephart, J., Sorkin, G.: Neural networks for computer virus recognition. IEEE Expert\u00a011, 5\u20136 (1996)","journal-title":"IEEE Expert"},{"key":"78_CR4","first-page":"38","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"M. Schultz","year":"2001","unstructured":"Schultz, M., Eskin, E., Zadok, E., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 38\u201349. IEEE Press, Los Alamitos (2001)"},{"key":"78_CR5","first-page":"7","volume":"6","author":"B. Zhang","year":"2005","unstructured":"Zhang, B., Yin, J., Zhang, D., Hao, J.: Unkown computer virus detection based on K-nearest neighbor algorithm. Computer Engineering and Applications\u00a06, 7\u201310 (2005)","journal-title":"Computer Engineering and Applications"}],"container-title":["Lecture Notes in Computer Science","Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11539506_78.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:54:38Z","timestamp":1619506478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11539506_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283126","9783540318309"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/11539506_78","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}