{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:45:30Z","timestamp":1743144330377,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257532"},{"type":"electronic","value":"9783319257549"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25754-9_43","type":"book-chapter","created":{"date-parts":[[2015,11,21]],"date-time":"2015-11-21T09:12:37Z","timestamp":1448097157000},"page":"492-501","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Similarity Calculation Method for API Invocation Sequences"],"prefix":"10.1007","author":[{"given":"Yu Jin","family":"Shim","sequence":"first","affiliation":[]},{"given":"TaeGuen","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"The Independent IT-Security Institute. http:\/\/www.av-test.org\/en\/","key":"43_CR1"},{"unstructured":"The site for providing information about computer viruses. http:\/\/vxheaven.org\/","key":"43_CR2"},{"unstructured":"Cuckoo Sandbox. http:\/\/www.cuckoosandbox.org\/","key":"43_CR3"},{"unstructured":"Wu, L., Ping, R., Ke, L., Hai-xin, D.: Behavior-based Malware analysis and detection. In: First International Workshop on Complexity and Data Mining, pp. 39\u201342. IEEE, Nanjing (2011)","key":"43_CR4"},{"doi-asserted-by":"crossref","unstructured":"Apel, M., Bockermann, C., Meier, M.: Measuring similarity of malware behavior. In: The 5th LCN Workshop on Security in Communications Networks, pp. 891\u2013898. IEEE, Zurich (2009)","key":"43_CR5","DOI":"10.1109\/LCN.2009.5355037"},{"key":"43_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"K Rieck","year":"2008","unstructured":"Rieck, K., Holz, T., Willems, C., D\u00fcssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108\u2013125. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Alazab, M., Venkataraman, S., Watters, P.: Towards understanding malware behaviour by the extraction of API calls. In: 2010 Cybercrime and Trustworthy Computing Workshop, pp. 52\u201359. IEEE, Ballarat (2010)","key":"43_CR7","DOI":"10.1109\/CTC.2010.8"},{"unstructured":"Bayer, U., Habibi, I., Balzarotti, D.: A view on current malware behaviors. In: USENIX conference on Large-scale Exploits and Emergent Threats, p. 8. ACM, Boston (2009)","key":"43_CR8"},{"doi-asserted-by":"crossref","unstructured":"Xu, J.-Y., Sung, A.H., Chavez, P., Mukkzmala, S.: Polymorphic malicious executable scanner by API sequence analysis. In: Hybrid Intelligent Systems, pp. 378\u2013383. IEEE, Kitakyushu (2004)","key":"43_CR9","DOI":"10.1109\/ICHIS.2004.75"},{"unstructured":"Natani, P., Vidyarthi, D.: Malware detection using API function frequency with ensemble based classifier. In: Security in Computing and Communications, pp. 379\u2013388. IEEE, Mysore (2004)","key":"43_CR10"},{"doi-asserted-by":"crossref","unstructured":"Soo, H.K., Kyoung, K.I., Gyu, I.E.: Malware family classification method using API sequential characteristic. In: The International Conference on IT Convergence and Security, pp. 613\u2013626. Springer, Huangshi (2011)","key":"43_CR11","DOI":"10.1007\/978-94-007-2911-7_60"},{"doi-asserted-by":"crossref","unstructured":"De Huang, H., Lee, C.-S., Kao, H.-Y., Tsai, Y.L., Chang, J.-G.: Malware behavioral analysis system: twman. In: Intelligent Agent, pp. 1\u20138. IEEE, Paris (2011)","key":"43_CR12","DOI":"10.1109\/IA.2011.5953604"},{"key":"43_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"K Rieck","year":"2008","unstructured":"Rieck, K., Holz, T., Willems, C., D\u00fcssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108\u2013125. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Purui, S., Lingyun, Y., Dengguo, F.: Exploring malware behaviors based on environment constitution. In: Computational Intelligence and Security, pp. 320\u2013325. IEEE, Suzhou (2008)","key":"43_CR14","DOI":"10.1109\/CIS.2008.130"},{"doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Security and Privacy, pp. 231\u2013245. IEEE, Berkeley (2008)","key":"43_CR15","DOI":"10.1109\/SP.2007.17"},{"unstructured":"Moser, A., Kruegel, C., Kirda, E.: Byte level nGram analysis for malware detection. In: 5th International Conference on Information Processing, pp. 51\u201359. Bangalore (2011)","key":"43_CR16"},{"doi-asserted-by":"crossref","unstructured":"Jian, L., Ning, Z., Ming, X., YongQing, S., JiouChuan, L.: Malware behavior extracting via maximal patterns. In: The 1st International Conference on Information Science and Engineering, pp. 1759\u20131764. IEEE, Nanjing (2009)","key":"43_CR17","DOI":"10.1109\/ICISE.2009.725"},{"unstructured":"Moser, A., Kruegel, C., Kirda, E.: Analysis of machine learning techniques used in behavior-based malware detection. Advances in Computing. Control and Telecommunication Technologies, pp. 201\u2013203. IEEE, Jakarta (2010)","key":"43_CR18"},{"key":"43_CR19","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11416-006-0012-2","volume":"2","author":"U Bayer","year":"2006","unstructured":"Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. J. Comput. Virology 2, 67\u201377 (2006)","journal-title":"J. Comput. Virology"},{"issue":"1","key":"43_CR20","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/0022-2836(81)90087-5","volume":"147","author":"TF Smith","year":"1981","unstructured":"Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147(1), 195\u2013197 (1981)","journal-title":"J. Mol. Biol."}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25754-9_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T16:07:58Z","timestamp":1729094878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-25754-9_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257532","9783319257549"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25754-9_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}