{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:37Z","timestamp":1725549997224},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291138"},{"type":"electronic","value":"9783540319986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11560326_5","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:29:26Z","timestamp":1127831366000},"page":"54-75","source":"Crossref","is-referenced-by-count":2,"title":["Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes"],"prefix":"10.1007","author":[{"given":"Douglas","family":"Summerville","sequence":"first","affiliation":[]},{"given":"Victor","family":"Skormin","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Volynkin","sequence":"additional","affiliation":[]},{"given":"James","family":"Moronski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-45116-1_15","volume-title":"Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security","author":"V. Skormin","year":"2001","unstructured":"Skormin, V., et al.: BASIS: A Biological Approach to System Information Security. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.\u00a02052, pp. 127\u2013142. Springer, Heidelberg (2001)"},{"key":"5_CR2","first-page":"210","volume-title":"Immunocomputing. Theory and Applications","author":"A. Tarakanov","year":"2003","unstructured":"Tarakanov, A., Skormin, V., Sokolova, S.: Immunocomputing. Theory and Applications, p. 210. Springer, NY (2003)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-45215-7_16","volume-title":"Computer Network Security","author":"V. Skormin","year":"2003","unstructured":"Skormin, V., Summerville, D., Moronski, J.: Detecting Malicious Codes by the presence of their Gene of Self-Replication. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 195\u2013205. Springer, Heidelberg (2003)"},{"key":"5_CR4","unstructured":"Fu, K.S.: Syntactic Methods in Pattern Recognition. Academic Press Inc., NY (1974)"},{"key":"5_CR5","unstructured":"Symantec Security Response, \n                    \n                      http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.chiton.gen.html"},{"key":"5_CR6","unstructured":"Ludwig, M.A.: The Giant Black Book of Computer Viruses, 2nd edn. American Eagle Publications (1998)"},{"key":"5_CR7","unstructured":"Russinovich, M.E., Solomon, D.A.: Microsoft Windows Internals. 4th edn., Microsoft Windows Server 2003, Windows XP, and Windows 2000. Microsoft Press (2005)"},{"key":"5_CR8","unstructured":"Nebbett, G.: Windows NT\/2000 Native API Reference. Macmillan Technical Publishing, IN (2000)"},{"key":"5_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2341-0","volume-title":"An Introduction to Signal Detection and Estimation","author":"H.V. Poor","year":"1994","unstructured":"Poor, H.V.: An Introduction to Signal Detection and Estimation, 2nd edn. Springer, Heidelberg (1994)","edition":"2"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45023-8_42","volume-title":"Multi-Agent Systems and Applications III","author":"V. Skormin","year":"2003","unstructured":"Skormin, V., Summerville, D., Moronski, J., McGee, D.: Biological Approach to System Information Security (BASIS): A Multi-Agent Approach to Information Security. In: Ma\u0159\u00edk, V., M\u00fcller, J.P., P\u011bchou\u010dek, M. (eds.) CEEMAS 2003. LNCS, vol.\u00a02691. Springer, Heidelberg (2003)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A Taxonomy of Computer Worms. In: Proc. ACM CCS Workshop on Rapid Malcode (October 2003)","DOI":"10.1145\/948187.948190"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Kienzle, D., Elder, M.: Recent Worms: A Survey and Trends. In: Proc. ACM Workshop on Rapid Malcode (October 2003)","DOI":"10.1145\/948187.948189"},{"key":"5_CR13","volume-title":"Compilers: Principles, Techniques, and Tools","author":"A.V. Aho","year":"1986","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading (1986)"},{"key":"5_CR14","unstructured":"Grune, D., Jacobs, J.H.: Parsing Techniques: A Practical Guide. Ellis Horwood (1990)"},{"key":"5_CR15","unstructured":"Whalley, I., Arnold, B., Chess, D., Morar, J., Segal, A., Swimmer, M.: An Environment for Controlled Worm Replication and Analysis. IBM TJ Watson Research Center (September 2000)"},{"key":"5_CR16","unstructured":"Weaver, N., Paxton, V.: A worst case worm. In: 3rd Annual Workshop on Economics and Information Security (WEIS 2004), University of Minnesota, Digital Technology Center, May 13\u201314 (2004)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Smith, M.D.: Access for Sale: A New Class of Worm. In: The ACM CCS Workshop on Rapid Malcode (WORM 2003), Washington, DC (October 2003)","DOI":"10.1145\/948187.948191"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Ellis, D.: Worm anatomy and model. In: Proc. ACM CCS Workshop on Rapid Malcode (October 2003)","DOI":"10.1145\/948187.948196"},{"key":"5_CR19","unstructured":"Arnold, W., Tesauro, G.: Automatically Generated Win32 Heuristic Virus Detection. In: Virus Bulletin Conference (2000)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11560326_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:13:00Z","timestamp":1619507580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11560326_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291138","9783540319986"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11560326_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}