{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:25:33Z","timestamp":1758709533741,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_9","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"157-174","source":"Crossref","is-referenced-by-count":6,"title":["RScam: Cloud-Based Anti-Malware via Reversible Sketch"],"prefix":"10.1007","author":[{"given":"Hao","family":"Sun","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinshu","family":"Su","sequence":"additional","affiliation":[]},{"given":"Peixin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Symantec Corporation Internet Security Threat Report 2015, vol. 20 (2015). \n                    http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp"},{"key":"9_CR2","unstructured":"McAfee threats report: fourth quarter (2014). \n                    http:\/\/www.mcafee.com\/us\/mcafee-labs.aspx"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TIFS.2009.2025847","volume":"4","author":"Z Chen","year":"2009","unstructured":"Chen, Z., Ji, C.: An information-theoretic view of network aware malware attacks. IEEE Transactions on Information Forensics and Security 4(3), 530\u2013541 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Comm. of the ACM 18, 333\u2013340 (1975)","journal-title":"Comm. of the ACM"},{"key":"9_CR5","unstructured":"Wu, S., Manber, U.: A fast algorithm for multi-pattern searching. Technical Report TR-94-17, University of Arizona (1994)"},{"key":"9_CR6","unstructured":"Clamav. \n                    http:\/\/www.clamav.net"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-15512-3_5","volume-title":"Recent Advances in Intrusion Detection","author":"G Vasiliadis","year":"2010","unstructured":"Vasiliadis, G., Ioannidis, S.: GrAVity: a massively parallel antivirus engine. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 79\u201396. Springer, Heidelberg (2010)"},{"key":"9_CR8","unstructured":"AV-comparative.: On-demand detection of malicious software. Technical Report, AV-comparative (2010)"},{"key":"9_CR9","unstructured":"Cha, S.K., et al.: Splitscreen: enabling efficient, distributed malware detection. In: Proc. of NSDI, pp. 12\u201325 (2010)"},{"key":"9_CR10","unstructured":"Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: Proc. of the 17th USENIX Security Symposium, pp. 91\u2013106 (2008)"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1504\/IJSN.2007.012824","volume":"2","author":"O Erdogan","year":"2007","unstructured":"Erdogan, O., Cao, P.: Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2, 50\u201359 (2007)","journal-title":"International Journal of Security and Networks"},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1155\/2008\/712353","volume":"4","author":"D Venugopal","year":"2008","unstructured":"Venugopal, D., Hu, G.: Efficient signature based malware detection on mobile devices. Mobile Information Systems 4(1), 33\u201349 (2008)","journal-title":"Mobile Information Systems"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proc. of the First Workshop on Virtualization in Mobile Computing, pp. 31\u201335 (2008)","DOI":"10.1145\/1622103.1629656"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Xu, J., Yan, J., He, L., Su, P., Feng, D.: CloudSEC: a cloud architecture for composing collaborative security services. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 703\u2013711 (2010)","DOI":"10.1109\/CloudCom.2010.16"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Server-side detection of malware infection. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop, pp. 11\u201322. ACM (2009)","DOI":"10.1145\/1719030.1719033"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/Time Trade-offs in Hash Coding with Allowable Errors. Comm. of the ACM 13, 422\u2013426 (1970)","journal-title":"Comm. of the ACM"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2013.2252341","volume":"8","author":"MH Haghighat","year":"2013","unstructured":"Haghighat, M.H., Tavakoli, M., Kharrazi, M.: Payload Attribution via Character Dependent Multi-Bloom Filters. IEEE Transactions on Information Forensics and Security 8(5), 705\u2013716 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Muthukrishnan, S.: Data streams: Algorithms and application. Foundations and Trends in Theoretical Computer Science 1(2) (2005)","DOI":"10.1561\/0400000002"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Sen, S., Zhang, Y., Chen, Y.: Sketch-based change detection: methods, evaluation, and applications. In: Proceeding of ACM SIGCOMM IMC, pp. 234\u2013247 (2003)","DOI":"10.1145\/948234.948236"},{"issue":"5","key":"9_CR20","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/TNET.2007.896150","volume":"15","author":"R Schweller","year":"2007","unstructured":"Schweller, R., Li, Z., Chen, Y., Gao, Y., et al.: Reversible sketches: enabling monitoring and analysis over high-speed data streams. IEEE\/ACM Transactions on Networking 15(5), 1059\u20131072 (2007)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"9_CR21","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TC.2010.130","volume":"60","author":"Y Tang","year":"2011","unstructured":"Tang, Y., Xiao, B., Lu, X.: Signature Tree Generation for Polymorphic Worms. IEEE Transactions on Computers 60(4), 565\u2013579 (2011)","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"9_CR22","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1007\/s12083-013-0216-4","volume":"8","author":"M He","year":"2015","unstructured":"He, M., Gong, Z., Chen, L.: Securing network coding against pollution attacks in P2P converged ubiquitous networks. Peer-to-Peer Networking and Applications 8(4), 642\u2013650 (2015)","journal-title":"Peer-to-Peer Networking and Applications"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:19:39Z","timestamp":1559373579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}