{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:47Z","timestamp":1748751047424,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271361"},{"type":"electronic","value":"9783319271378"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27137-8_28","type":"book-chapter","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T11:24:23Z","timestamp":1447673063000},"page":"369-382","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Signature Generation Approach for Polymorphic Worms"],"prefix":"10.1007","author":[{"given":"Jie","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoxian","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,16]]},"reference":[{"issue":"3","key":"28_CR1","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/SURV.2014.022714.00160","volume":"16","author":"R Kaur","year":"2014","unstructured":"Kaur, R., Singh, M.: A survey on zero-day polymorphic worm detection techniques. IEEE Commun. Surv. Tutorials 16(3), 1520\u20131549 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"28_CR2","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1016\/j.comnet.2011.11.007","volume":"56","author":"B Bayoglu","year":"2012","unstructured":"Bayoglu, B., Sogukpinar, L.: Graph based signature classes for detecting polymorphic worms via content analysis. Comput. Netw. 56(2), 832\u2013844 (2012)","journal-title":"Comput. Netw."},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Mohammed, M.M.Z.E., Chan, H.A., Ventura, N., Pathan, A.S.K.: An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model. In: Proceedings of 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuching, pp. 450\u2013455, December 2013","DOI":"10.1109\/ACSAT.2013.94"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Comar, P.M., Liu, L., Saha, S., Tan, P.N., Nucci, A.: Combining supervised and unsupervised learning for zero-day malware detection. In: Proceedings of 32nd Annual IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, pp. 2022\u20132030, April 2013","DOI":"10.1109\/INFCOM.2013.6567003"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Kaur, R., Singh, M.: Efficient hybrid technique for detecting zero-day polymorphic worms. In: Proceedings of 2014 IEEE International on Advance Computing Conference (IACC), pp. 95\u2013100, February 2014","DOI":"10.1109\/IAdCC.2014.6779301"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Perdisci, R., Dagon, D., Lee, W., Fogla, P., Sharif, M.: Misleading worm signature generators using deliberate noise injection. In: Proceedings of 2006 IEEE Symposium on Security and Privacy, Atlanta, GA, USA, pp. 17\u201331 (2006)","DOI":"10.1109\/SP.2006.26"},{"issue":"9","key":"28_CR7","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TC.2009.63","volume":"58","author":"B Stephenson","year":"2009","unstructured":"Stephenson, B., Sikdar, B.: A quasi-species model for the propagation and containment of polymorphic worms. IEEE Trans. Comput. 58(9), 1289\u20131296 (2009)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"28_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11416-008-0089-x","volume":"5","author":"M Talbi","year":"2009","unstructured":"Talbi, M., Mejri, M., Bouhoula, A.: Specification and evaluation of polymorphic shellcode properties using a new temporal logic. J. Comput. Virol. 5(3), 171\u2013186 (2009)","journal-title":"J. Comput. Virol."},{"issue":"1","key":"28_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"M Codi","year":"2013","unstructured":"Codi, M., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Ranjan, S., Shah, S., Nucci, A., Munafo, M., Cruz, R., Muthukrishnan, S.: DoWitcher: effective worm detection and containment in the internet core. In: IEEE Infocom, Anchorage, Alaska, pp. 2541\u20132545 (2007)","DOI":"10.1109\/INFCOM.2007.317"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TDSC.2007.1000","volume":"5","author":"M Cai","year":"2007","unstructured":"Cai, M., Hwang, K., Pan, J., Christos, P.: WormShield: fast worm signature generation with distributed fingerprint aggregation. IEEE Trans. Dependable Secure Comput. 5(2), 88\u2013104 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: automatically generation signatures for polymorphic worms. In: Proceedings of 2005 IEEE Symposium on Security and Privacy Symposium, Oakland, California, pp. 226\u2013241 (2005)","DOI":"10.1109\/SP.2005.15"},{"key":"28_CR13","unstructured":"Li, Z., Sanghi, M., Chen, Y., Kao, M., Chavez, B.: Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience. In: Proceedings of IEEE Symposium on Security and Privacy, Washington, DC, pp. 32\u201347 (2006)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Cavallaro, L., Lanzi, A., Mayer, L., Monga, M.: LISABETH: automated content-based signature generator for zero-day polymorphic worms. In: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, Leipzig, Germany, pp. 41\u201348 (2008)","DOI":"10.1145\/1370905.1370911"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Bayoglu, B., Sogukpinar, L.: Polymorphic worm detection using token-pair signatures. In: Proceedings of the 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Sorrento, Italy, pp. 7\u201312 (2008)","DOI":"10.1145\/1387329.1387331"},{"issue":"4","key":"28_CR16","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TC.2010.130","volume":"60","author":"Y Tang","year":"2011","unstructured":"Tang, Y., Xiao, B., Lu, X.: Signature tree generation for polymorphic worms. IEEE Trans. Comput. 60(4), 565\u2013579 (2011)","journal-title":"IEEE Trans. Comput."},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TPDS.2007.1050","volume":"18","author":"Y Tang","year":"2007","unstructured":"Tang, Y., Chen, S.: An automated signature-based approach against polymorphic internet worms. IEEE Trans. Parallel Distrib. Syst. 18, 879\u2013892 (2007)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, J.X., Chen, J.E., Zhang, X.: An automated signature generation approach for polymorphic worm based on color coding. In: IEEE ICC 2009, Dresden, Germany, pp. 1\u20136 (2009)","DOI":"10.1109\/ICC.2009.5198721"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27137-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:04:48Z","timestamp":1748693088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27137-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271361","9783319271378"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27137-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}