{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:19:06Z","timestamp":1743005946816,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030510404"},{"type":"electronic","value":"9783030510411"}],"license":[{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-51041-1_51","type":"book-chapter","created":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T17:03:07Z","timestamp":1593277387000},"page":"385-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Feature Based Comparative Analysis of Online Malware Scanners (OMS)"],"prefix":"10.1007","author":[{"given":"Ahmed Husnain","family":"Johar","sequence":"first","affiliation":[]},{"given":"Akash","family":"Gerard","sequence":"additional","affiliation":[]},{"given":"Nawal","family":"Athar","sequence":"additional","affiliation":[]},{"given":"Umer","family":"Asgher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,28]]},"reference":[{"issue":"16","key":"51_CR1","first-page":"25","volume":"67","author":"IA Saeed","year":"2013","unstructured":"Saeed, I.A., Selamat, A., Abuagoub, A.M.A.: A survey on malware and malware detection systems. Int. J. Comput. Appl. 67(16), 25\u201331 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"51_CR2","unstructured":"Gasse. \nhttps:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/malwaretrends-2019\/28098\/\n\n. Accessed 30 Jan 2020"},{"key":"51_CR3","first-page":"83","volume":"800","author":"M Souppaya","year":"2013","unstructured":"Souppaya, M., Scarfone, K.: Guide to malware incident prevention and handling for desktops and laptops. NIST Spec. Publ. 800, 83 (2013)","journal-title":"NIST Spec. Publ."},{"key":"51_CR4","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.3844\/ajassp.2017.1049.1069","volume":"14","author":"GAN Mohamed","year":"2017","unstructured":"Mohamed, G.A.N., Norafida, I.: Survey on representation techniques for malware detection system. Am. J. Appl. Sci. 14, 1049\u20131069 (2017). \nhttps:\/\/doi.org\/10.3844\/ajassp.2017.1049.1069","journal-title":"Am. J. Appl. Sci."},{"key":"51_CR5","unstructured":"https:\/\/www.reversinglabs.com\/solutions\/sandbox-malware-analysis\n\n. Accessed 31 Jan 2020"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Ozsoy, M., et al.: Malware-aware processors: a framework for efficient online malware detection. In: 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA). IEEE (2015)","DOI":"10.1109\/HPCA.2015.7056070"},{"issue":"1","key":"51_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A Damodaran","year":"2017","unstructured":"Damodaran, A., et al.: A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech. 13(1), 1\u201312 (2017)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"51_CR8","unstructured":"Juwono, J.T., Lim, C., Erwin, A.: A comparative study of behavior analysis sandboxes in malware detection. In: International Conference on New Media (CONMEDIA) (2015)"},{"issue":"1","key":"51_CR9","first-page":"103","volume":"4","author":"D Uppal","year":"2014","unstructured":"Uppal, D., Mehra, V., Verma, V.: Basic survey on malware analysis, tools and techniques. Int. J. Comput. Sci. Appl. (IJCSA) 4(1), 103 (2014)","journal-title":"Int. J. Comput. Sci. Appl. (IJCSA)"},{"issue":"2","key":"51_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11416-015-0244-0","volume":"12","author":"HS Galal","year":"2016","unstructured":"Galal, H.S., Mahdy, Y.B., Atiea, M.A.: Behavior-based features model for malware detection. J. Comput. Virol. Hacking Tech. 12(2), 59\u201367 (2016)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Bhattacharya, A., Goswami, R.T.: Comparative analysis of different feature ranking techniques in data mining-based Android malware detection. In: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Springer, Singapore (2017)","DOI":"10.1007\/978-981-10-3153-3_5"},{"key":"51_CR12","unstructured":"Ranveer, S., Hiray, S.: Comparative analysis of feature extraction methods of malware detection. Int. J. Comput. Appl. 120(5), 1\u20137 (2015)"},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Kolbitsch, C., Comparetti, P.M.: Detecting environment-sensitive malware. In: International Workshop on Recent Advances in Intrusion Detection. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-23644-0_18"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Pandey, S.K., Mehtre, B.M.: Performance of malware detection tools: a comparison. In: 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies. IEEE (2014)","DOI":"10.1109\/ICACCCT.2014.7019422"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Bekerman, D., et al.: Unknown malware detection using network traffic classification. In: 2015 IEEE Conference on Communications and Network Security (CNS). IEEE (2015)","DOI":"10.1109\/CNS.2015.7346821"},{"key":"51_CR16","unstructured":"Tuvell, G., Lee, C.: Malware detection system and method for limited access mobile platforms. U.S. Patent No. 9,064,115, 23 June 2015"},{"key":"51_CR17","unstructured":"https:\/\/www.opswat.jp\/blog\/metadefender-more-private-alternativevirustotal#hash-lookup\n\n. Accessed 19 Feb 2020"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Neuroergonomics and Cognitive Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51041-1_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T17:15:51Z","timestamp":1593278151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-51041-1_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,28]]},"ISBN":["9783030510404","9783030510411"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51041-1_51","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,28]]},"assertion":[{"value":"28 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ahfe2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}