{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:53:40Z","timestamp":1726408420672},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_22","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:02:50Z","timestamp":1545994970000},"page":"407-416","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Malware Detection for Healthcare Data Security"],"prefix":"10.1007","author":[{"given":"Mozammel","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Sharmin","family":"Jahan","sequence":"additional","affiliation":[]},{"given":"Rafiqul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Junbin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"22_CR1","unstructured":"http:\/\/www.malwarebytes.com . Accessed 12 Mar 2018"},{"key":"22_CR2","unstructured":"Paster, M.: Why healthcare security needs a new approach to Malware. Health IT Security-Cybersecurity News, January 2015. http:\/\/www.healthitsecurity.com"},{"key":"22_CR3","unstructured":"Healthcare Cybersecurity: https:\/\/www.hipaajournal.com\/category\/healthcare-cybersecurity\/"},{"key":"22_CR4","unstructured":"Healthcare Data Breach Report: April 2018, posted by HIPPA Journal on 18 May 2018. https:\/\/www.hipaajournal.com\/healthcare-data-breach-report-april-2018\/"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36, 646\u2013656 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"22_CR6","first-page":"114","volume":"8","author":"K Tang","year":"2010","unstructured":"Tang, K., Zhou, M.T., Zuo, Z.-H.: An enhanced automated signature generation algorithm for polymorphic malware detection. J. Electron. Sci. Technol. China 8, 114\u2013121 (2010)","journal-title":"J. Electron. Sci. Technol. China"},{"key":"22_CR7","series-title":"Lecture notes in computer science (lecture notes in artificial intelligence)","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/11527503_82","volume-title":"Advanced Data Mining and Applications","author":"X Xu","year":"2005","unstructured":"Xu, X., Wang, X.: An adaptive network intrusion detection method based on PCA and support vector machines. In: Li, X., Wang, S., Dong, Z.Y. (eds.) ADMA 2005. LNCS (LNAI), vol. 3584, pp. 696\u2013703. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11527503_82"},{"issue":"3","key":"22_CR8","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1109\/TIFS.2013.2242890","volume":"8","author":"P O\u2019Kane","year":"2013","unstructured":"O\u2019Kane, P., Sezer, S., McLaughlin, K., Im, E.: SVM training phase reduction using dataset feature filtering for malware detection. IEEE Trans. Inf. Forensics Secur. 8(3), 500\u2013509 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR9","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-33338-5_18","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"D Had\u017eiosmanovi\u0107","year":"2012","unstructured":"Had\u017eiosmanovi\u0107, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-gram against the machine: on the feasibility of the N-Gram network analysis for binary protocols. In: Balzarotti, D., Stolfo, Salvatore J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354\u2013373. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33338-5_18"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Chowdhury, M., Rahman, A., Islam, R.: Protecting data from malware threats using machine learning technique. In: IEEE Conference on Industrial Electronics and Applications (ICIEA 2017), Siem Reap, Cambodia, 18\u201320 June 2017","DOI":"10.1109\/ICIEA.2017.8283111"},{"key":"22_CR11","series-title":"Advances in intelligent systems and computing","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-319-67071-3_33","volume-title":"International Conference on Applications and Techniques in Cyber Security and Intelligence","author":"M Chowdhury","year":"2018","unstructured":"Chowdhury, M., Rahman, A., Islam, R.: Malware analysis and detection using data mining and machine learning classification. In: Abawajy, J., Choo, K.-K.R., Islam, R. (eds.) ATCI 2017. AISC, vol. 580, pp. 266\u2013274. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-67071-3_33"},{"key":"22_CR12","unstructured":"Devesa, J., Santos, I., Cantero, X., Penya, Y.K., Bringas, P.G.: Automatic behaviour-based analysis and classification system for malware detection. In: Proceedings of the 12th International Conference on Enterprise Information Systems (ICEIS) (2010)"},{"issue":"5","key":"22_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2011.98","volume":"9","author":"P Okane","year":"2011","unstructured":"Okane, P., Sezer, S., McLaughlin, K.: Obfuscation: the hidden malware. IEEE Secur. Priv. 9(5), 41\u201347 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC \u201907), pp. 421\u2013430, December 2007","DOI":"10.1109\/ACSAC.2007.21"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-70542-0_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"L Cavallaro","year":"2008","unstructured":"Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143\u2013163. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70542-0_8"},{"key":"22_CR16","unstructured":"PEid Unpacker. http:\/\/www.peid.info\/"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Tian, R., Islam, M.R., Batten, L., Versteeg, S.: Differentiating malware from cleanware using behavioural analysis. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), Nancy, France, pp. 23\u201330 October 2010","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Shankarapani, M., Kancherla, K., Ramammoorthy, S., Movva, R., Mukkamala, S.: Kernel machines for malware classification and similarity analysis. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN \u201910), pp. 1\u20136, July 2010","DOI":"10.1109\/IJCNN.2010.5596339"},{"issue":"2","key":"22_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s11416-010-0141-5","volume":"7","author":"MK Shankarapani","year":"2011","unstructured":"Shankarapani, M.K., Ramamoorthy, S., Movva, R.S., Mukkamala, S.: Malware detection using assembly and API call sequences. J. Comput. Virol. 7(2), 107\u2013119 (2011)","journal-title":"J. Comput. Virol."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Ahmed, F., Hameed, H., Shafq, M.Z., Farooq, M.: Using spatio-temporal information in API calls with machine learning algorithms for malware detection. In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, pp. 55\u201362, November 2009","DOI":"10.1145\/1654988.1655003"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Yang, Y., Ji, L., He, J.: Analyzing malware by abstracting the frequent item sets in API call sequences. In: Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom \u201913), pp. 265\u2013270, July 2013","DOI":"10.1109\/TrustCom.2013.36"},{"issue":"3","key":"22_CR22","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TDSC.2006.41","volume":"3","author":"M Rajagopalan","year":"2006","unstructured":"Rajagopalan, M., Hiltunen, M.A., Jim, T., Schlichting, R.D.: System call monitoring using authenticated system calls. IEEE Trans. Dependable Secure Comput. 3(3), 216\u2013229 (2006)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 340\u2013353, November 2005","DOI":"10.1145\/1102120.1102165"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Tian, R., Islam, R., Batten, L., Versteeg, S.: Differentiating malware from cleanware using behavioural analysis. In: International Conference on Malicious and Unwanted Software: MALWARE 2010, pp. 23\u201330 (2010)","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"22_CR25","unstructured":"VirtualBox. https:\/\/www.virtualbox.org"},{"key":"22_CR26","unstructured":"http:\/\/msdn.microsoft.com\/enus\/library\/aa383749%28VS.85%29.aspx . January 2010"},{"key":"22_CR27","unstructured":"Weka library. Data mining software in Java. http:\/\/www.cs.waikato.ac.nz\/ml\/weka"},{"key":"22_CR28","unstructured":"VX Heaven collection. VX Heaven website. http:\/\/vx.netlux.org"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Huda, S. et al.: Hybrids of support vector machine wrapper and filter-based framework for malware detection, Future Gener. Comput. Syst. 55, 376\u2013390","DOI":"10.1016\/j.future.2014.06.001"},{"key":"22_CR30","doi-asserted-by":"publisher","first-page":"15941","DOI":"10.1109\/ACCESS.2018.2815660","volume":"6","author":"S Sharmeen","year":"2018","unstructured":"Sharmeen, S., Huda, S., Abawajy, J.H., Ismail, W.N., Hassan, M.M.: Malware threats and detection for industrial mobile-IoT networks. IEEE Access 6, 15941\u201315957 (2018)","journal-title":"IEEE Access"},{"key":"22_CR31","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2018.1437651","author":"S Jahan","year":"2018","unstructured":"Jahan, S., Chowdhury, M., Islam, R.: Robust user authentication model for securing electronic healthcare system using fingerprint biometrics. Int. J. Comput. Appl. (2018). https:\/\/doi.org\/10.1080\/1206212X.2018.1437651","journal-title":"Int. J. Comput. Appl."},{"key":"22_CR32","series-title":"Communications in computer and information science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-94421-0_16","volume-title":"Future Network Systems and Security","author":"S Jahan","year":"2018","unstructured":"Jahan, S., Chowdhury, M., Islam, R., Gao, J.: Security and privacy protection for ehealth data. In: Doss, R., Piramuthu, S., Zhou, W. (eds.) FNSS 2018. CCIS, vol. 878, pp. 197\u2013205. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94421-0_16"},{"key":"22_CR33","series-title":"Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-78816-6_10","volume-title":"Security and Privacy in Communication Networks","author":"S Jahan","year":"2018","unstructured":"Jahan, S., Chowdhury, M., Islam, R., Chaudhry, J.: Securing healthcare data using biometric authentication. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 239, pp. 123\u2013132. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78816-6_10"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Jahan, S., Chowdhury, M., Islam, R.: Robust fingerprint verification for enhancing security in healthcare system. In: Image and Vision Computing New Zealand conference (IVCNZ 2017), 4\u20136 December 2017, Christchurch, New Zealand (2017)","DOI":"10.1109\/IVCNZ.2017.8402502"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:03:23Z","timestamp":1573607003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}