{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:13:22Z","timestamp":1742966002187,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319179957"},{"type":"electronic","value":"9783319179964"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17996-4_14","type":"book-chapter","created":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T14:35:44Z","timestamp":1429626944000},"page":"151-161","source":"Crossref","is-referenced-by-count":2,"title":["A New Method of Virus Detection Based on Maximum Entropy Model"],"prefix":"10.1007","author":[{"given":"Nhu Tuan","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Van Huong","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Ba Cuong","family":"Le","sequence":"additional","affiliation":[]},{"given":"Duc Thuan","family":"Le","sequence":"additional","affiliation":[]},{"given":"Thi Hong","family":"Van Le","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"14_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5120\/14572-2695","volume":"84","author":"S. Shah","year":"2013","unstructured":"Shah, S., Jani, H., Shetty, S., Bhowmick, K.: Virus Detection using Artificial Neural Networks. International Journal of Computer Applications\u00a084(5), 17\u201323 (2013)","journal-title":"International Journal of Computer Applications"},{"key":"14_CR2","first-page":"202","volume":"15","author":"D. Stopel","year":"2006","unstructured":"Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y.: Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques. Transactions on Engineering, Computing and Technology\u00a015, 202\u2013208 (2006)","journal-title":"Transactions on Engineering, Computing and Technology"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-04342-0_6","volume-title":"Recent Advances in Intrusion Detection","author":"K. Griffin","year":"2009","unstructured":"Griffin, K., Schneider, S., Hu, X., Chiueh, T.-C.: Automatic Generation of String Signatures for Malware Detection. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 101\u2013120. Springer, Heidelberg (2009)"},{"unstructured":"Kephart, J., Arnold, W.: Automatic Extraction of Computer Virus Signatures. In: Proceedings of the Virus Bulletin International Conference, Abingdon, England, pp. 179\u2013194 (1994)","key":"14_CR4"},{"unstructured":"Assaleh, T.A., Cercone, N., Keselj, V., Sweidan, R.: Detection of New Malicious Code Using N-grams Signatures. In: PST, pp. 193\u2013196 (2004)","key":"14_CR5"},{"doi-asserted-by":"crossref","unstructured":"Chaumette, S., Ly, O., Tabary, R.: Automated extraction of polymorphic virus signatures using abstract interpretation. In: NSS, pp. 41\u201348. IEEE (2011)","key":"14_CR6","DOI":"10.1109\/ICNSS.2011.6059958"},{"unstructured":"John, A.: Computer Viruses and Malware, pp. 27\u201345. Springer (2006) ISBN 978-0-387-30236-2","key":"14_CR7"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-540-24663-3_2","volume-title":"Performance Tools and Applications to Networked Systems","author":"G. Serazzi","year":"2004","unstructured":"Serazzi, G., Zanero, S.: Computer Virus Propagation Models. In: Calzarossa, M.C., Gelenbe, E. (eds.) MASCOTS 2003. LNCS, vol.\u00a02965, pp. 26\u201350. Springer, Heidelberg (2004)"},{"unstructured":"Jussi, P.: Digital Contagions: A Media Archaeology of Computer Viruses, pp. 50\u201370. Peter Lang, New York (2007) ISBN 978-0-8204-8837-0","key":"14_CR9"},{"unstructured":"Yu, Z., et al.: A Novel Immune Based Approach For Detection of Windows PE Virus. In: Proceeding of ADMA, Chengdu, China, pp. 250\u2013260 (2008)","key":"14_CR10"},{"unstructured":"Ratnaparkhi, R.: A simple introduction to maximum entropy models for natural language processing. Technical Report 97-08, Institute for Research in Cognitive Science, University of Pennsylvania, pp. 1\u201318 (1997)","key":"14_CR11"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/BF03023004","volume":"7","author":"S. Guiasu","year":"1985","unstructured":"Guiasu, S., Shenitzer, C.: The principle of maximum entropy. The Mathematical Intelligencer\u00a07, 42\u201348 (1985)","journal-title":"The Mathematical Intelligencer"},{"issue":"3S","key":"14_CR13","first-page":"90","volume":"24","author":"P.V. Huong","year":"2008","unstructured":"Huong, P.V., et al.: Some Approaches to N\u00f4m Optical Character Recognition. VNU, Hanoi. J. of Science, Natural Sciences and Technology\u00a024(3S), 90\u201399 (2008)","journal-title":"VNU, Hanoi. J. of Science, Natural Sciences and Technology"},{"unstructured":"Chistopher, D.M., Schutze, H.: Foundations of Statistical Natural Language Processing, pp. 5\u201325. MIT Press (1999)","key":"14_CR14"},{"unstructured":"Database of virus patterns, \n                      http:\/\/samples.virussign.com\/samples\/\n                    , \n                      http:\/\/virusshare.com\/","key":"14_CR15"},{"issue":"2","key":"14_CR16","first-page":"123","volume":"1","author":"E.A. Daoud","year":"2008","unstructured":"Daoud, E.A., Jebril, I., Zaquaibeh, B.: Computer virus strategies and detection methods. Int. J. Open problems Compt. Math.\u00a01(2), 123\u2013130 (2008)","journal-title":"Int. J. Open problems Compt. Math."}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computational Methods for Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17996-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T12:21:16Z","timestamp":1677068476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17996-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319179957","9783319179964"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17996-4_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}