{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:11:55Z","timestamp":1769011915933,"version":"3.49.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030290283","type":"print"},{"value":"9783030290290","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29029-0_28","type":"book-chapter","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T04:04:51Z","timestamp":1565755491000},"page":"305-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files"],"prefix":"10.1007","author":[{"given":"Ryusei","family":"Fuji","sequence":"first","affiliation":[]},{"given":"Shotaro","family":"Usuzaki","sequence":"additional","affiliation":[]},{"given":"Kentaro","family":"Aburada","sequence":"additional","affiliation":[]},{"given":"Hisaaki","family":"Yamaba","sequence":"additional","affiliation":[]},{"given":"Tetsuro","family":"Katayama","sequence":"additional","affiliation":[]},{"given":"Mirang","family":"Park","sequence":"additional","affiliation":[]},{"given":"Norio","family":"Shiratori","sequence":"additional","affiliation":[]},{"given":"Naonobu","family":"Okazaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"key":"28_CR1","unstructured":"Two years after WannaCry, a million computers remain at risk. \n                    https:\/\/techcrunch.com\/2019\/05\/12\/wannacry-two-years-on\/\n                    \n                  . Accessed 17 May 2019"},{"key":"28_CR2","unstructured":"Sultan, H., et\u00a0al.: A survey on ransomware: evolution, growth, and impact. Int. J. Adv. Res. Comput. Sci. 9(2) (2018)"},{"key":"28_CR3","unstructured":"Barrera, D., Molloy, I., Huang, H.: IDIoT: Securing the Internet of Things like it\u2019s 1994. arXiv preprint \n                    arXiv:1712.03623\n                    \n                   (2017)"},{"key":"28_CR4","unstructured":"AV-Test \u201cSecurity report 2017\/18\u201d. \n                    https:\/\/www.av-test.org\/fileadmin\/pdf\/security_report\/AV-TEST_Security_Report_2017-2018.pdf\n                    \n                  . Accessed 02 Dec 2018"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Bazrafshan, Z., et\u00a0al.: A survey on heuristic malware detection techniques. In: Information and Knowledge Technology (IKT) 2013 5th Conference, pp. 113\u2013120 (2013)","DOI":"10.1109\/IKT.2013.6620049"},{"key":"28_CR6","unstructured":"Hashimoto, R., Yoshioka, K., Matsumoto, T.: Evaluation of anti-virus software based on the correspondence to non-detected malware. Distributed Processing System (DPS), pp. 1\u20138 (2012). (in Japanese)"},{"key":"28_CR7","unstructured":"Fuji, R., et\u00a0al.: Investigation on sharing signatures of suspected malware files using blockchain technology. In: International Multi Conference of Engineers and Computer Scientists (IMECS), pp. 94\u201399 (2019)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Zheng, Z., et\u00a0al.: An overview of blockchain technology: architecture, consensus, and future trends. In: IEEE 6th International Congress on Big Data, pp. 557\u2013564 (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"28_CR9","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"W\u00fcst, K., Gervais, A.: Do you need a Blockchain? In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 45\u201354. IEEE (2018)","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"12118","DOI":"10.1109\/ACCESS.2018.2805783","volume":"6","author":"J Gu","year":"2018","unstructured":"Gu, J., et al.: Consortium blockchain-based malware detection in mobile devices. IEEE Access 6, 12118\u201312128 (2018)","journal-title":"IEEE Access"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Graf, R., King, R.: Neural network and blockchain based technique for cyber threat intelligence and situational awareness. In: 2018 10th International Conference on Cyber Conflict (CyCon). IEEE (2018)","DOI":"10.23919\/CYCON.2018.8405028"},{"key":"28_CR13","unstructured":"Ethereum Project. \n                    https:\/\/www.ethereum.org\/\n                    \n                  . Accessed 02 Dec 2018"},{"key":"28_CR14","unstructured":"Hyperledger - Open Source Blockchain Technologies. \n                    https:\/\/www.hyperledger.org\/\n                    \n                  . Accessed 02 Dec 2018"},{"key":"28_CR15","unstructured":"uPort.me. \n                    https:\/\/www.uport.me\/\n                    \n                  . Accessed 02 Dec 2018"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.eswa.2016.01.002","volume":"52","author":"Y Fan","year":"2016","unstructured":"Fan, Y., Ye, Y., Chen, L.: Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52, 16\u201325 (2016)","journal-title":"Expert Syst. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Networked-based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29029-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T04:17:46Z","timestamp":1565756266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29029-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"ISBN":["9783030290283","9783030290290"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29029-0_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,15]]},"assertion":[{"value":"15 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS - 2019","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oita","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}