{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:33:34Z","timestamp":1762868014433,"version":"3.37.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030378370"},{"type":"electronic","value":"9783030378387"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37838-7_12","type":"book-chapter","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T20:02:45Z","timestamp":1577995365000},"page":"122-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Neural Swarm Virus"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6603-392X","authenticated-orcid":false,"given":"Thanh Cong","family":"Truong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3858-7340","authenticated-orcid":false,"given":"Ivan","family":"Zelinka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5839-4263","authenticated-orcid":false,"given":"Roman","family":"Senkerik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"12_CR1","unstructured":"Anderson, H.S., Kharkar, A., Filar, B., Evans, D., Roth, P.: Learning to evade static PE machine learning malware models via reinforcement learning. arXiv:1801.08917 (2018)"},{"key":"12_CR2","unstructured":"Anderson, H.S., Kharkar, A., Filar, B., Roth, P.: Evading machine learning malware detection. Black Hat (2017)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Anderson, H.S., Woodbridge, J., Filar, B.: DeepDGA: adversarially-tuned domain generation and detection. In: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 13\u201321. ACM (2016)","DOI":"10.1145\/2996758.2996767"},{"key":"12_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34188-9","volume-title":"Computer Viruses and Malware","author":"J Aycock","year":"2006","unstructured":"Aycock, J.: Computer Viruses and Malware, vol. 22. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/0-387-34188-9"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"042806","DOI":"10.1103\/PhysRevE.90.042806","volume":"90","author":"G Bianconi","year":"2014","unstructured":"Bianconi, G., Darst, R.K., Iacovacci, J., Fortunato, S.: Triadic closure as a basic generating mechanism of communities in complex networks. Phys. Rev. E 90(4), 042806 (2014)","journal-title":"Phys. Rev. E"},{"key":"12_CR6","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","volume-title":"Swarm Intelligence: From Natural to Artificial Systems. No. 1","author":"E Bonabeau","year":"1999","unstructured":"Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. No. 1. Oxford University Press, Oxford (1999)"},{"key":"12_CR7","unstructured":"Brundage, M., et al.: The malicious use of artificial intelligence: forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228 (2018)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Cani, A., Gaudesi, M., Sanchez, E., Squillero, G., Tonda, A.P.: Towards automated malware creation: code generation and code integration. In: SAC, pp. 157\u2013160 (2014)","DOI":"10.1145\/2554850.2555157"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F Cohen","year":"1987","unstructured":"Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22\u201335 (1987)","journal-title":"Comput. Secur."},{"key":"12_CR10","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-28161-2_1","volume-title":"Self-Organizing Migrating Algorithm","author":"I Zelinka","year":"2016","unstructured":"Zelinka, I.: SOMA\u2014self-organizing migrating algorithm. In: Davendra, D., Zelinka, I. (eds.) Self-Organizing Migrating Algorithm. SCI, vol. 626, pp. 3\u201349. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-28161-2_1"},{"key":"12_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30164-8","volume-title":"Encyclopedia of Machine Learning","author":"M Dorigo","year":"2011","unstructured":"Dorigo, M., Birattari, M.: Ant colony optimization. In: Sammut, C., Webb, G.I. (eds.) Encyclopedia of Machine Learning. Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-0-387-30164-8"},{"key":"12_CR12","unstructured":"Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, MHS 1995, pp. 39\u201343. IEEE (1995)"},{"key":"12_CR13","unstructured":"Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the Bradley virus. Ph.D. thesis, INRIA (2004)"},{"key":"12_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/2-287-28099-5","volume-title":"Computer Viruses: From Theory to Applications","author":"E Filiol","year":"2006","unstructured":"Filiol, E.: Computer Viruses: From Theory to Applications. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/2-287-28099-5"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"191","DOI":"10.3233\/JCS-2012-0460","volume":"21","author":"A Geigel","year":"2013","unstructured":"Geigel, A.: Neural network Trojan. J. Comput. Secur. 21(2), 191\u2013232 (2013)","journal-title":"J. Comput. Secur."},{"key":"12_CR16","unstructured":"Geigel, A.: Unsupervised learning Trojan. Ph.D. thesis, Nova Southeastern University (2014)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Grosse, K., Papernot, N., Manoharan, P., Backes, M., McDaniel, P.: Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435 (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"12_CR18","unstructured":"Hu, W., Tan, Y.: Generating adversarial malware examples for black-box attacks based on GAN. arXiv preprint arXiv:1702.05983 (2017)"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/0-387-27705-6_6","volume-title":"Handbook of Nature-Inspired and Innovative Computing","author":"J Kennedy","year":"2006","unstructured":"Kennedy, J.: Swarm intelligence. In: Zomaya, A.Y. (ed.) Handbook of Nature-Inspired and Innovative Computing, pp. 187\u2013219. Springer, Boston (2006). https:\/\/doi.org\/10.1007\/0-387-27705-6_6"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Kudo, T., Kimura, T., Inoue, Y., Aman, H., Hirata, K.: Behavior analysis of self-evolving botnets. In: 2016 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/CITS.2016.7546428"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.comcom.2018.04.010","volume":"124","author":"T Kudo","year":"2018","unstructured":"Kudo, T., Kimura, T., Inoue, Y., Aman, H., Hirata, K.: Stochastic modeling of self-evolving botnets with vulnerability discovery. Comput. Commun. 124, 101\u2013110 (2018)","journal-title":"Comput. Commun."},{"issue":"50","key":"12_CR22","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSPEC.2013.6471059","volume":"3","author":"D Kushner","year":"2013","unstructured":"Kushner, D.: The real story of stuxnet. IEEE Spectr. 3(50), 48\u201353 (2013)","journal-title":"IEEE Spectr."},{"issue":"30","key":"12_CR23","doi-asserted-by":"publisher","first-page":"1750228","DOI":"10.1142\/S0217979217502289","volume":"31","author":"S Lazfi","year":"2017","unstructured":"Lazfi, S., Lamzabi, S., Rachadi, A., Ez-Zahraouy, H.: The impact of neighboring infection on the computer virus spread in packets on scale-free networks. Int. J. Mod. Phys. B 31(30), 1750228 (2017)","journal-title":"Int. J. Mod. Phys. B"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Meng, G., et al.: Mystique: evolving android malware for auditing anti-malware tools. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 365\u2013376. ACM (2016)","DOI":"10.1145\/2897845.2897856"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Noreen, S., Murtaza, S., Shafiq, M.Z., Farooq, M.: Evolvable malware. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, pp. 1569\u20131576. ACM (2009)","DOI":"10.1145\/1569901.1570111"},{"key":"12_CR26","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.amc.2017.09.044","volume":"320","author":"W Pan","year":"2018","unstructured":"Pan, W., Jin, Z.: Edge-based modeling of computer virus contagion on a tripartite graph. Appl. Math. Comput. 320, 282\u2013291 (2018)","journal-title":"Appl. Math. Comput."},{"issue":"3\u20134","key":"12_CR27","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s12064-017-0253-2","volume":"136","author":"MR Parsaei","year":"2017","unstructured":"Parsaei, M.R., Javidan, R., Kargar, N.S., Nik, H.S.: On the global stability of an epidemic model of computer viruses. Theory Biosci. 136(3\u20134), 169\u2013178 (2017)","journal-title":"Theory Biosci."},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-319-71246-8_5","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P Prasse","year":"2017","unstructured":"Prasse, P., Machlica, L., Pevn\u00fd, T., Havelka, J., Scheffer, T.: Malware detection by analysing encrypted network traffic with neural networks. In: Ceci, M., Hollm\u00e9n, J., Todorovski, L., Vens, C., D\u017eeroski, S. (eds.) ECML PKDD 2017. LNCS (LNAI), vol. 10535, pp. 73\u201388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71246-8_5"},{"issue":"8","key":"12_CR29","first-page":"74","volume":"12","author":"BB Rad","year":"2012","unstructured":"Rad, B.B., Masrom, M., Ibrahim, S.: Camouflage in malware: from encryption to metamorphism. Int. J. Comput. Sci. Netw. Secur. 12(8), 74\u201383 (2012)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.physa.2017.05.038","volume":"486","author":"J Ren","year":"2017","unstructured":"Ren, J., Xu, Y.: A compartmental model for computer virus propagation with kill signals. Phys. A 486, 446\u2013454 (2017)","journal-title":"Phys. A"},{"key":"12_CR31","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/j.amc.2017.08.048","volume":"316","author":"J Singh","year":"2018","unstructured":"Singh, J., Kumar, D., Hammouch, Z., Atangana, A.: A fractional epidemiological model for computer viruses pertaining to a new fractional derivative. Appl. Math. Comput. 316, 504\u2013515 (2018)","journal-title":"Appl. Math. Comput."},{"issue":"3","key":"12_CR32","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1162\/artl.1994.1.3.249","volume":"1","author":"EH Spafford","year":"1994","unstructured":"Spafford, E.H.: Computer viruses as artificial life. Artif. Life 1(3), 249\u2013265 (1994)","journal-title":"Artif. Life"},{"key":"12_CR33","volume-title":"The Art of Computer Virus Research and Defense","author":"P Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Pearson Education, London (2005)"},{"issue":"2","key":"12_CR34","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00175354","volume":"4","author":"D Whitley","year":"1994","unstructured":"Whitley, D.: A genetic algorithm tutorial. Stat. Comput. 4(2), 65\u201385 (1994)","journal-title":"Stat. Comput."},{"key":"12_CR35","unstructured":"Xu, W., Qi, Y., Evans, D.: Automatically evading classifiers. In: Proceedings of the 2016 Network and Distributed Systems Symposium, pp. 21\u201324 (2016)"},{"key":"12_CR36","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-39930-8_7","volume-title":"New Optimization Techniques in Engineering","author":"I Zelinka","year":"2004","unstructured":"Zelinka, I.: SOMA - self organizing migrating algorithm. In: Onwubolu, G.C., Babu, B.V. (eds.) New Optimization Techniques in Engineering. STUDFUZZ, vol. 141, pp. 167\u2013217. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-39930-8_7"},{"key":"12_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-55663-4","volume-title":"Evolutionary Algorithms, Swarm Dynamics and Complex Networks: Methodology, Perspectives and Implementation","author":"I Zelinka","year":"2017","unstructured":"Zelinka, I., Chen, G.: Evolutionary Algorithms, Swarm Dynamics and Complex Networks: Methodology, Perspectives and Implementation, vol. 26. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-55663-4"},{"key":"12_CR38","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.swevo.2018.05.003","volume":"43","author":"I Zelinka","year":"2018","unstructured":"Zelinka, I., Das, S., Sikora, L., \u0160enke\u0159\u00edk, R.: Swarm virus - next-generation virus and antivirus paradigm? Swarm Evol. Comput. 43, 207\u2013224 (2018)","journal-title":"Swarm Evol. Comput."},{"key":"12_CR39","unstructured":"Zelinka, I., Jouni, L.: Soma - self-organizing migrating algorithm. In: Mendel 2000, 6th International Conference on Soft Computing, Brno, Czech Republic, pp. 177\u2013187 (2000)"},{"key":"12_CR40","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1016\/j.physa.2017.08.085","volume":"490","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Gan, C.: Global attractivity and optimal dynamic countermeasure of a virus propagation model in complex networks. Phys. A 490, 1004\u20131018 (2018)","journal-title":"Phys. A"}],"container-title":["Communications in Computer and Information Science","Swarm, Evolutionary, and Memetic Computing and Fuzzy and Neural Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37838-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T19:27:32Z","timestamp":1665343652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37838-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030378370","9783030378387"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37838-7_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FANCCO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fuzzy and Neural Computing Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fancco2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fancco2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}